If app developers are able to sneak an emulator into their iPhone apps, they could also (potentially) smuggle in malicious code designed to exploit your shiny Apple gadget.