Comment by rpdillon
8 hours ago
The dependencies weren't vendored, meaning their behavior can change at any time if a malicious actor gains control of that third-party repo.
This is bad for security.
8 hours ago
The dependencies weren't vendored, meaning their behavior can change at any time if a malicious actor gains control of that third-party repo.
This is bad for security.
Yes, I agree. And it's sadly, as we can see, still fairly standard practice to ignore it.