Not that but supply chain attacks. Also can’t run an exploit if you can’t get code execution in the first place, which is especially useful if the attacker’s initial entrypoint is just being able to launch subprocesses for example.
Also, should probably enforce R^X and possibly even disable JIT-y behaviors.
