Hacker News new | past | comments | ask | show | jobs | submit
Catching, vulnerability scanning, supply chain integrity, insurance against upstream removal. All these things are true for other artifact types as well.

Own your dependency chain.