Bypassing the subsystem-API and directly accessing the internal implementation of the component is a practice that is not only common, but also potentially fatal. The clients actually unauthorizedly expand the subsystem-API.
Related smells: Leaky Encapsulation Visibility of Dependency Graphs
All rights reserved (c) Tushar Sharma 2017-23.