. "is publicly available, which may make it easier for hackers and other third parties to determine how to breach our sites and systems that rely on open source software." . . .