Supply-chain security is no longer just about vulnerabilities. It is also about publishing, tokens, and malware detection.
Long-lived token habits are being pushed out in favor of trusted publishing and shorter-lived credentials.
Even if you do not publish public packages every day, your workflows still sit inside this dependency chain.
Security here is mostly workflow hygiene: remove weak token patterns, enable visibility, and assign ownership.
Supply-chain hygiene matters because weak workflows can hit build integrity, secrets handling, and deployment safety long before users see a visible incident.
Read the full article or see the Production Readiness Upgrade service if the workflow behind your product needs cleanup.