a successful attack on Spoon would exfiltrate tons of proprietary code.
a successful attack on Spoon would exfiltrate tons of proprietary code.