That sounds about right. A dedicated team of security experts can find a hole in anything, but not in everything (i.e. pre-mythos the bottleneck was going from “possible vuln” to “POC”).
That sounds about right. A dedicated team of security experts can find a hole in anything, but not in everything (i.e. pre-mythos the bottleneck was going from “possible vuln” to “POC”).