An attacker who is in a position to manage a step in the availability chain can alter the product for malicious intents that range from introducing backdoors within the supply code to including vulnerable libraries in the ultimate product. The mission owner will dictate which steps are to cost carried out inwards the availability chain…