Poisoned dependencies: you are the blast radius
Attackers no longer need to breach your software directly. They compromise a package buried in your dependency tree and let routine installs spread the damage. Recent supply chain attacks show how fragile modern trust chains have become.