Monday’s recap shows the same pattern in different places. A third-party tool becomes a way in, then leads to internal access ...