And while an informal policy is likely to be better than a complete disregard for security,
it would seem reasonable to assert that it’s precisely the formality of the process that yields applications that don’t leave loose ends trailing where vulnerabilities are concerned.