They would have to maintain a server side hashmap of every open source file in existence
And it'd be trivial to spoof. Just change a few lines and now it doesn't know if it's closed or open
But then I suspect lots of parts in a closed source project are similar to open source code, so you can't just refuse to analyze any code that contains open source parts, and an attacker could put a few open source files into "fake" closed source code, and presumably the llm would not flag them because the ratio open/closed source code is good. But that would raise the costs for attackers.