Supply chain security6 min readLayered defense for dependencies: Why dependabot needs an upstream gatekeeper
Supply chain security6 min readSlopsquatting and Typosquatting: How to Detect AI-Hallucinated Malicious Packages