Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure ...