Shadow IT or careless configuration of container and artifact registries could give attackers access to sensitive data and inject malicious code. Researchers have found thousands of publicly exposed ...