Should we add a new reconnaissance technique along the lines of "look for signs of localized deployment"? The idea here is that attackers are actively looking for evidence that there is an "out of band" deployment script or process that they can hijack to get malicious code into the target app. The most common way I've seen this happen is via a package.json file with embedded deployment commands or calling a malicious script.