Supply Chain Compromise #
Malicious or tampered software enters the build via compromised dependencies, base images, or third-party tooling.
Malicious or tampered software enters the build via compromised dependencies, base images, or third-party tooling.