The media: "HACKERS BREACH TEA DATABASE IN SOPHISTICATED CYBERATTACK!"
The actual "hack": requests.get(PUBLIC_URL)
Nothing screams "senior developer energy" like seeing Python code that's just fetching publicly available JPG files being labeled a "hack." It's like calling yourself a master chef for successfully boiling water.
The real security breach here is whoever decided that putting files in a publicly accessible URL with zero authentication was a good architecture decision. That person probably also uses "password123" and wonders why they keep getting "hacked."