Open-source attacks move through normal development workflows