11 Steps to Protect Open-Source Software from Lethal Attacks