How do open source programs not get hacked to pieces?

Often MD5 checksums are used to verify the integrity of data being downloaded. This makes it more difficult to pass off modified code as the genuine article.