The vulnerabilities could have let malicious users masquerade as agency officials, potentially misleading researchers, contractors and others.
Self-hosted agents execute code with durable credentials and process untrusted input. This creates dual supply chain risk, ...