The attacks will continue until they cease to work. They will only cease to work once we either A) start auditing one another as providers of dependencies; B) only uptake certain versions thereof after carefully reading them. Or C) make good enough stdlibs where we don't need a gajillion nested levels of dependency on dependency to get a project working sufficiently. Physical manufacturers actually do audit suppliers btw. That's a normal part of the QA loop that most software companies are completely unwilling to allocate manpower for.