From Item 3 here:
#2
Should we include that there should be processes to deal with unauthorized open source contributions? i.e. what happens when someone does not follow the processes outlined. This should also be documented and communicated to the program participants.