Hi there!
Through the xz backdoor incident, it was shown that even open source software can be vulnerable to sophisticated social engineering attacks.
I wonder, how is GOS prepared for such attacks?
Of course the circumstances are different: The project is active, with (I think) many people working on it.