The code contains a weakness determined by static analysis.
The code uses a dependency with a known vulnerability.
The code contains a secret that has now been compromised and must be revoked.
The code has an unspecified vulnerability type
The code contains a weakness determined by static analysis.