Vulnerable base images, embedded secrets, and supply chain compromises start at the build stage and propagate through the entire deployment.