"source software is publicly available, which may make it easier for hackers and other third parties to determine how to breach our sites and systems that rely on open source software." . . . .