I dunno, the process is normal but the issues raised are extreme. Too extreme. I'd expect things like "in edge cases X vulnerabilities start being an issue" rather than "at any point, anyone, can gain undtected full access to all our live infrastructure, equipment, and troop poaitions"
it feels like the bar for what are acceptable toothing issues is set unrealistically low here.
it feels like the bar for what are acceptable toothing issues is set unrealistically low here.