This introduces interesting attack vectors that will need to be mitigated. E.g. When a person gets hacked, then that could introduce many "scam" apps to people that followed the person.