Security misconfigurations, careless use of third-party components, and malicious exploits of development supply chain vulnerabilities need to be reined-in