Supply chain security5 min readSix Hours Too Late: Why Malware Detection Must Be Built Into Artifact Management