Extensions have the downside that a malicious actor can buy out the original dev and start using them as an intrusion point.