Open aaguiarz opened 3 months ago
Source tags can be overwritten in case of a supply chain attack and a compromised image may be pulled down.
The risk is greater in the case of external, third party dependencies not under the projects control.
Source tags can be overwritten in case of a supply chain attack and a compromised image may be pulled down.
The risk is greater in the case of external, third party dependencies not under the projects control.