{"id":2688,"date":"2024-01-22T10:17:53","date_gmt":"2024-01-22T10:17:53","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=2688"},"modified":"2024-01-22T10:25:37","modified_gmt":"2024-01-22T10:25:37","slug":"ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/","title":{"rendered":"AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects"},"content":{"rendered":"<p>As per the report from Protect AI, a company that is exclusively working with Artificial Intelligence (AI) and ML (Machine Learning) systems, some major vulnerabilities have been identified in tools used within the AI\/ML open-source projects.<\/p>\n<p>These threats have surfaced over the past few months and the first detectors are the members of the Huntr bug bounty platform for AI and ML. Huntr is an active community-based bounty program with over 15,000 members who actively search for vulnerabilities in the AI\/ML space. This is the only bounty program that especially focuses on the AI and ML space.<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2690 alignleft\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-20-1-300x225.png\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-20-1-300x225.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-20-1-1024x768.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-20-1-768x576.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-20-1-16x12.png 16w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-20-1-500x375.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-20-1-800x600.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-20-1.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Protect AI launched the program back in August 2023 intending to furnish vital intelligence regarding possible risks and enable an expeditious reaction to safeguard AI systems. The bounty actively protects AI\/ML open-source software (OSS), systems and foundational models.<\/p>\n<p>\u201cWith over 15,000 members now, Protect AI\u2019s huntr is the largest and most concentrated set of threat researchers and hackers focused exclusively on AI\/ML security,\u201d Daryan Dehghanpisheh, president and co-founder of Protect AI. \u201cHuntr\u2019s operating model is focused on simplicity, transparency, and rewards. The automated features and Protect AI\u2019s triage expertise in contextualizing threats for maintainers help all contributors of open-source software in AI to build more secure software packages\u201d added Daryan.<\/p>\n<h2>Three Critical Vulnerabilities<\/h2>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2691 alignright\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-21-300x225.png\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-21-300x225.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-21-1024x768.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-21-768x576.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-21-16x12.png 16w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-21-500x375.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-21-800x600.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-21.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>MLflow Remote Code Execution<\/strong>: Server takeover and loss of sensitive data are the two potential outcomes of this flaw. Users may end up using evil data sources that are executed remotely. Besides, these malicious code actors could execute commands by mimicking real users.<\/p>\n<p><strong>MLflow Arbitrary File Overwrite<\/strong>: A bypass was detected in the MLflow function that validates the security of a file path. This flow allows a cybercriminal to overwrite files on the MLflow server from a remote location. Consequently, denial of service attacks, system takeover as well as destruction may take place.<\/p>\n<p><strong>MLflow Local File Include<\/strong>: Under this flaw, the MLflow is being manipulated when it is installed on any operating system. The manipulation is done at a scale where the OS displays the content of sensitive files even if they are encrypted. This leads to a system takeover and the stealing of sensitive information.<\/p>\n<p>In the full report, Protect AI highlights the urgency of focusing on these weaknesses as open-source platforms are gaining more traction these days. Furthermore, they have furnished a comprehensive list of suggestions for users if they are affected by any of the flaws.<\/p>\n<p>Protect AI\u2019s co-founder Daryan Dehghanpisheh told Metaverse Post, \u201cUrgency in addressing AI\/ML system vulnerabilities hinges on their business impact. With AI\/ML\u2019s critical role in contemporary business and the severe nature of potential exploits, most organizations will find this urgency high. The primary challenge in securing AI\/ML systems lies in comprehending risks across the MLOps lifecycle.\u201d<\/p>\n<p>\u201cTo mitigate these risks, companies must conduct threat modeling for their AI and ML systems, identify exposure windows, and implement suitable controls within an integrated and comprehensive MLSecOps program,\u201d he added.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>As per the report from Protect AI, a company that is exclusively working with Artificial Intelligence (AI) and ML (Machine&#8230;<\/p>","protected":false},"author":26,"featured_media":2692,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[],"class_list":["post-2688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects - Techknowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"As per the report from Protect AI, a company that is exclusively working with Artificial Intelligence (AI) and ML (Machine...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-22T10:17:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-22T10:25:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-22.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Gallacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Gallacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/\",\"url\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/\",\"name\":\"AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-22.png\",\"datePublished\":\"2024-01-22T10:17:53+00:00\",\"dateModified\":\"2024-01-22T10:25:37+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\"},\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-22.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-22.png\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest news\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\",\"name\":\"John Gallacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"caption\":\"John Gallacher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects - Techknowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/","og_locale":"fr_FR","og_type":"article","og_title":"AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects - Techknowledge","og_description":"As per the report from Protect AI, a company that is exclusively working with Artificial Intelligence (AI) and ML (Machine...","og_url":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/","og_site_name":"Techknowledge","article_published_time":"2024-01-22T10:17:53+00:00","article_modified_time":"2024-01-22T10:25:37+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-22.png","type":"image\/png"}],"author":"John Gallacher","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"John Gallacher","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/","url":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/","name":"AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-22.png","datePublished":"2024-01-22T10:17:53+00:00","dateModified":"2024-01-22T10:25:37+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46"},"breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-22.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-Copy-of-Copy-of-Copy-of-CSO-Paper-Confronting-Ransomware-and-Cryptojacking.pdf-Instagram-Post-1200-x-900-px-22.png","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/ai-ml-platforms-endangered-with-critical-vulnerabilities-high-time-to-secure-open-source-projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Latest news","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/"},{"@type":"ListItem","position":4,"name":"AI\/ML Platforms Endangered with Critical Vulnerabilities: High Time to Secure Open-Source Projects"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46","name":"John Gallacher","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","caption":"John Gallacher"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/2688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/comments?post=2688"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/2688\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media\/2692"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media?parent=2688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/categories?post=2688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/tags?post=2688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}