Protecting Your Code and Infrastructure: The Importance of Linting and Scanning for Security Vulnerabilities