Even if the compromise wasn't on the developer's machine, it could have enabled a supply chain attack post-deployment.
Even if the compromise wasn't on the developer's machine, it could have enabled a supply chain attack post-deployment.