{"id":948,"date":"2024-03-23T01:01:02","date_gmt":"2024-03-23T01:01:02","guid":{"rendered":"https:\/\/hacking.cool\/?p=948"},"modified":"2024-03-23T01:27:46","modified_gmt":"2024-03-23T01:27:46","slug":"hidden-treasures-of-websites-on-github","status":"publish","type":"post","link":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/","title":{"rendered":"Hidden Treasures of Websites on GitHub"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476-1024x585.webp\" alt=\"\" class=\"wp-image-956\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476-1024x585.webp 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476-300x171.webp 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476-768x439.webp 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476-1536x878.webp 1536w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476.webp 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p class=\"has-black-color has-text-color\">In the vast expanse of the internet, websites are mere islands in an ocean of code. And for the curious hacker, GitHub&#8217;s endless repositories hold the treasure maps to these islands. But what if these maps also contained hidden secrets? Keys to hidden doors, forgotten passages, and unguarded treasures? Today, we&#8217;re diving into the depths of GitHub to unearth these secrets, revealing how even the most secure websites might have vulnerabilities etched into their very blueprint, accessible for those who know where to look.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-black-color has-text-color\">The Treasure Hunt Begins: Understanding GitHub<\/h4>\n\n\n\n<p class=\"has-black-color has-text-color\">GitHub, the world&#8217;s largest host of source code, is a hacker&#8217;s haven for reconnaissance. It&#8217;s where developers store the heart of websites\u2014source code, configuration files, and scripts. But sometimes, they inadvertently check in sensitive data: API keys, passwords, and secret tokens that are meant to be kept out of public view.<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-black-color has-text-color\">Tools of the Trade: GitHub Dorking<\/h4>\n\n\n\n<p class=\"has-black-color has-text-color\">The hunt for secrets begins with <em>GitHub Dorking<\/em>\u2014using search queries to find sensitive information exposed in GitHub repositories. Similar to Google Dorking, it leverages GitHub&#8217;s search engine to sift through public code with precision.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Here&#8217;s how to start:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>Search for High-Value Targets<\/strong>: Keywords like <code>password<\/code>, <code>secret<\/code>, <code>key<\/code>, <code>token<\/code>, can yield interesting results. Combine them with specific file names like <code>config.yml<\/code>, <code>.env<\/code>, or <code>database.ini<\/code> for more focused hunting.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Let&#8217;s say, for instance, we want to find AWS credentials, which are often unintentionally committed to public repositories. AWS credentials are used to authenticate and authorize calls to AWS services. They typically consist of an Access Key ID and Secret Access Key. Because of their power and the level of access they can grant, finding exposed AWS credentials can lead to significant security vulnerabilities.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Here&#8217;s how you might structure your search queries to find AWS credentials:<\/p>\n\n\n\n<pre id=\"block-cdca63db-ad07-4219-97a4-fc66daed1ebb\" class=\"wp-block-code has-black-color has-text-color\"><code>Query: AWS_ACCESS_KEY_ID=AKIA&#91;0-9A-Z]{16}\nSearches for AWS Access Key IDs, which start with \"AKIA\" followed by 16 alphanumeric characters.\n\nQuery: aws_secret_access_key\nLooks for instances of the string \"aws_secret_access_key\", commonly found in AWS SDK configurations.\n\nQuery: filename:.properties aws_access_key_id\nTargets .properties files containing \"aws_access_key_id\", often used in Java applications.\n<\/code><\/pre>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>Explore Commit History<\/strong>: Sometimes, secrets are removed from the current version of the code but remain in the commit history. Exploring previous commits might reveal secrets not visible in the latest codebase.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>Look for Hidden Directories and Files<\/strong>: Directories named <code>.git<\/code> or files like <code>.htaccess<\/code> can sometimes be overlooked by developers when cleaning up sensitive data.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/f4370985-f564-45e8-b218-4fe8e01f9d93-1-1024x585.webp\" alt=\"\" class=\"wp-image-958\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/f4370985-f564-45e8-b218-4fe8e01f9d93-1-1024x585.webp 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/f4370985-f564-45e8-b218-4fe8e01f9d93-1-300x171.webp 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/f4370985-f564-45e8-b218-4fe8e01f9d93-1-768x439.webp 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/f4370985-f564-45e8-b218-4fe8e01f9d93-1-1536x878.webp 1536w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/f4370985-f564-45e8-b218-4fe8e01f9d93-1.webp 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h4 class=\"wp-block-heading has-black-color has-text-color\">Automating the Hunt: Tools to Enhance Your Search<\/h4>\n\n\n\n<p class=\"has-black-color has-text-color\">Several tools can automate GitHub Dorking, making the search for secrets more efficient:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>GitRob<\/strong>: A tool designed to find sensitive files pushed to public repositories on GitHub. GitRob will scan and flag potential sensitive files based on their names.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><code>gitrob analyze &lt;organization&gt;<\/code> &#8211; Analyzes all repositories belonging to a GitHub organization for sensitive files.<\/li>\n\n\n\n<li><code>gitrob analyze &lt;user&gt;<\/code> &#8211; Analyzes all repositories owned by a specific GitHub user for sensitive files.<\/li>\n\n\n\n<li><code>gitrob serve<\/code> &#8211; Starts the GitRob web interface to review findings from the analysis.<\/li>\n\n\n\n<li><code>gitrob -h<\/code> &#8211; Displays help information, listing all commands and options.<\/li>\n\n\n\n<li><code>gitrob version<\/code> &#8211; Displays the current version of GitRob.<\/li>\n<\/ol>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>TruffleHog<\/strong>: Digs deep into commit histories to find strings with high entropy, often indicative of sensitive keys.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><code>trufflehog --regex --entropy=False git@github.com:user\/repo.git<\/code> &#8211; Scans a repository&#8217;s git history for secrets, skipping entropy checks.<\/li>\n\n\n\n<li><code>trufflehog file:\/\/path\/to\/repo --since_commit=commit_hash<\/code> &#8211; Scans a local repository from a specific commit hash.<\/li>\n\n\n\n<li><code>trufflehog git@github.com:user\/repo.git --json<\/code> &#8211; Outputs findings in JSON format.<\/li>\n\n\n\n<li><code>trufflehog --exclude_paths=regexes.json git@github.com:user\/repo.git<\/code> &#8211; Excludes paths matching the regexes in <code>regexes.json<\/code>.<\/li>\n\n\n\n<li><code>trufflehog --rules=custom_rules.json git@github.com:user\/repo.git<\/code> &#8211; Uses custom rules defined in <code>custom_rules.json<\/code> for scanning.<\/li>\n<\/ol>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>Gitleaks<\/strong>: Provides a way to find unencrypted secrets shipped to the repository and supports a vast array of sources to cover your scanning needs comprehensively.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><code>gitleaks detect --source='https:\/\/github.com\/user\/repo.git'<\/code> &#8211; Detects secrets in the specified remote repository.<\/li>\n\n\n\n<li><code>gitleaks protect --staged<\/code> &#8211; Scans staged changes in your local git repository for secrets.<\/li>\n\n\n\n<li><code>gitleaks --path=\/path\/to\/repo --verbose<\/code> &#8211; Scans a local repository for secrets, with verbose output.<\/li>\n\n\n\n<li><code>gitleaks --config=config.toml --source='https:\/\/github.com\/user\/repo.git'<\/code> &#8211; Uses a custom configuration file for scanning the specified repository.<\/li>\n\n\n\n<li><code>gitleaks --source='https:\/\/github.com\/user\/repo.git' --report=report.json<\/code> &#8211; Outputs findings to a <code>report.json<\/code> file.<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the vast expanse of the internet, websites are mere islands in an ocean of code. And for the curious hacker, GitHub&#8217;s endless repositories hold the treasure maps to these islands. But what if these maps also contained hidden secrets? Keys to hidden doors, forgotten passages, and unguarded treasures? Today, we&#8217;re diving into the depths<span class=\"post-excerpt-end\">&hellip;<\/span><\/p>\n<p class=\"more-link\"><a href=\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/\" class=\"themebutton\">Read More<\/a><\/p>\n","protected":false},"author":3,"featured_media":956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hidden Treasures of Websites on GitHub - hacking.cool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hidden Treasures of Websites on GitHub - hacking.cool\" \/>\n<meta property=\"og:description\" content=\"In the vast expanse of the internet, websites are mere islands in an ocean of code. And for the curious hacker, GitHub&#8217;s endless repositories hold the treasure maps to these islands. But what if these maps also contained hidden secrets? Keys to hidden doors, forgotten passages, and unguarded treasures? Today, we&#8217;re diving into the depths&hellip;Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/\" \/>\n<meta property=\"og:site_name\" content=\"hacking.cool\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-23T01:01:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-23T01:27:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Atom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Atom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\",\"url\":\"https:\/\/hacking.cool\/atomanya\/\",\"name\":\"hacking.cool\",\"description\":\"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/#primaryimage\",\"url\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476.webp\",\"contentUrl\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476.webp\",\"width\":1792,\"height\":1024},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/\",\"url\":\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/\",\"name\":\"Hidden Treasures of Websites on GitHub - hacking.cool\",\"isPartOf\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/#primaryimage\"},\"datePublished\":\"2024-03-23T01:01:02+00:00\",\"dateModified\":\"2024-03-23T01:27:46+00:00\",\"author\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2\"},\"breadcrumb\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hacking.cool\/atomanya\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hidden Treasures of Websites on GitHub\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2\",\"name\":\"Atom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g\",\"caption\":\"Atom\"},\"url\":\"https:\/\/hacking.cool\/atomanya\/author\/atom\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hidden Treasures of Websites on GitHub - hacking.cool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/","og_locale":"en_US","og_type":"article","og_title":"Hidden Treasures of Websites on GitHub - hacking.cool","og_description":"In the vast expanse of the internet, websites are mere islands in an ocean of code. And for the curious hacker, GitHub&#8217;s endless repositories hold the treasure maps to these islands. But what if these maps also contained hidden secrets? Keys to hidden doors, forgotten passages, and unguarded treasures? Today, we&#8217;re diving into the depths&hellip;Read More","og_url":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/","og_site_name":"hacking.cool","article_published_time":"2024-03-23T01:01:02+00:00","article_modified_time":"2024-03-23T01:27:46+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476.webp","type":"image\/webp"}],"author":"Atom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Atom","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/hacking.cool\/atomanya\/#website","url":"https:\/\/hacking.cool\/atomanya\/","name":"hacking.cool","description":"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/#primaryimage","url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476.webp","contentUrl":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476.webp","width":1792,"height":1024},{"@type":"WebPage","@id":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/","url":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/","name":"Hidden Treasures of Websites on GitHub - hacking.cool","isPartOf":{"@id":"https:\/\/hacking.cool\/atomanya\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/#primaryimage"},"datePublished":"2024-03-23T01:01:02+00:00","dateModified":"2024-03-23T01:27:46+00:00","author":{"@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2"},"breadcrumb":{"@id":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hacking.cool\/atomanya\/hidden-treasures-of-websites-on-github\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hacking.cool\/atomanya\/"},{"@type":"ListItem","position":2,"name":"Hidden Treasures of Websites on GitHub"}]},{"@type":"Person","@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2","name":"Atom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g","caption":"Atom"},"url":"https:\/\/hacking.cool\/atomanya\/author\/atom\/"}]}},"jetpack_featured_media_url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/03\/0dd6a8b7-fd4e-4bae-8d33-b6800e855476.webp","_links":{"self":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/comments?post=948"}],"version-history":[{"count":14,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/948\/revisions"}],"predecessor-version":[{"id":970,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/948\/revisions\/970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media\/956"}],"wp:attachment":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media?parent=948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/categories?post=948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/tags?post=948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}