claim
Attackers may compromise or impersonate reputable maintainers to infiltrate the software supply chain and distribute malware through trusted sources.

Authors

Sources

Referenced by nodes (2)