The documentation at https://github.com/cisagov/manage.get.gov/tree/main/docs/developer#request-flow-fsm-diagram is out of date, specifically the diagram we link to ...
Successfully merging a pull request may close this issue.
Abstract: Logic obfuscation has been proposed as a counter-measure against supply chain threats such as overproduction and IP piracy. However, the functional corruption it offers can be exploited by ...