Q&A: Supply-chain threats and client-side vulnerabilities