Though it is easy to insert malicious code into the source of any app, like adding the line "system("rm -rf /")" in one of the apps functions before compiling which would be undetectable, I don't mind adding assurance by scanning files with Clamav before uploading to the repo. That would detect any of the known malware functions that would be present, and also works on ELF binaries.
(emphasis added)
The emphasized part is the major problem with user-contributed binaries: once the source code is compiled, "customizations" made by the compiling person are no longer detectable. At least not with a reasonable effort.
The only solution that I see is to separate the
development of extensions from the actual
compilation of the source code. Let everyone upload build scripts [1] for new extensions, but let only a very small and hand-selected set of volunteers compile those scripts and send you the resulting binaries for inclusion in the repository [2]. Build scripts are easy to monitor for everyone with basic knowledge in shell syntax. Binaries that come out of such a process are way more trustworthy than binaries from nobody-can-really-tell-whom.
Just a suggestion, of course.
---
[1] Build scripts are used for example by gobolinux (called "recipes"), Slax (called "build scripts"), and SourceMage (called "spells"). Gentoo I have never used, but it must be based on something similar.
[2] If the process is well automated, then people will queue to volunteer their spare CPU cycles to this "distributed TCE compile farm."