The usb backdoor used to access scanner is called the SANE project is in this code: https://gitlab.com/sane-project/backends/blob/master/backend/canon_dr.c
"Smartmatic www.smartmatic.com provided testing and changes for DR-X10C support"
proof georgia used the scanner:
https://sos.ga.gov/admin/files/Unisyn%20RFI_Redacted.pdf
you can also see how much the scanner was used last election here:https://www.sos.state.co.us/pubs/elections/VotingSystems/audits/2014GeneralPEA/Delta2014GeneralPEA.pdf
You can see in the comments the developers didn't want to credit smartmatic: https://gitlab.com/sane-project/backends/-/merge_requests/12#note_139722740
There's no evidence of smartmatic using DR-X10C ballot scanner only dominion. They probably hired freelancers to make it compatible. If you don't think SANE can be used as a backdoor you should read more into SANE: https://sane-project.gitlab.io/standard/
You can say the same about the Linux kernel, network drivers, other open source software.
Many things can be "weaponized" and provide remote access, but it:
Do you know how many commits are pushed to the Linux kernel by Huawei (network part) and NSA (selinux part) not exactly the types of people you want to trust, but the community has thousands of eyes on every line of code, which makes open source beautiful and generally more secure.
I understand the public branch doesn't have malicious code but smartmatic hired people hired to add compatibility to the ballot scanner Dominion is using accross the country. It's suspicious and I wouldn't be surprised if this ballot scanner shows up with more errors or glitches.