Over a few years, the software supply-chain has gone from being a largely ignored part of the development lifecycle to a deeply researched and utilized attack vector for adversaries. These adversaries discover new attack surface again and again as well as how to achieve massive impact. From a defenders point of view, your own stack can be secure, but if your supply-chain is left untouched, unexamined and unscrutinized, you don’t know what attackers know about an important piece of attack surface.