A threat actor used the open source security tool to breach CI/CD workflows and steal cloud credentials, SSH keys, and other ...
You can create a release to package software, along with release notes and links to binary files, for other people to use. Learn more about releases in our docs.