We've discussed the kinds of threats that concern us.
Next we discuss how some Node.js projects mitigate these threats today and how we can make it easier for more Node.js projects to consistently mitigate these threats.
Readers may find it useful to refer back to the threat table which cross-indexes threats and mitigation strategies.