Detect potential lockfile tampering as your dependencies grow.
Picking Lockfiles: Attacking & Defending Your Supply Chain
Supported lockfiles:
Detect potential lockfile tampering as your dependencies grow.
Picking Lockfiles: Attacking & Defending Your Supply Chain
Supported lockfiles: