@MartinD the external audit hasn't started yet. They are still milling through their own code double checking everything. So they are running about a week behind, could end up being more. Once they are completely done with their internal patching and fixing, they will most likely have a third party perform an external audit, looking for possible ways to exploit the code. In all likelihood the external audit report will be the only one that will be published.
The catch 22 is that I don't know how much all of this will accomplish, because the exploits published on "localhost.re" were discovered by having access to the source which was most likely decoded with this:
http://idezender.com/
In any case, I hope for the best. The ideal result would be for them to clean up their code so that even if someone gains access to the source code again (or a portion of it), it wouldn't be exploitable.