Secure extensibility access to application program interfaces (APIs) is
described. Techniques are described in which trust indicia are used
determine relative trustworthiness of an extensibility module attempting
to access of APIs of an application module. Access to APIs of the
application module is managed based upon trustworthiness of the
extensibility module.