
The flood of dormant packages expands the supply‑chain attack surface, allowing attackers to push malicious code to a large developer base, and the token‑gaming undermines confidence in open‑source incentive models, prompting tighter registry oversight.
Comments
Want to join the conversation?
Loading comments...