{"id":389,"date":"2025-07-01T16:31:54","date_gmt":"2025-07-01T19:31:54","guid":{"rendered":"https:\/\/devteriaio.com\/?p=389"},"modified":"2025-07-13T11:33:36","modified_gmt":"2025-07-13T14:33:36","slug":"vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes","status":"publish","type":"post","link":"https:\/\/devteriaio.com\/index.php\/2025\/07\/01\/vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes\/","title":{"rendered":"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es."},"content":{"rendered":"\n<p> <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"957\" src=\"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new1-1024x957.png\" alt=\"\" class=\"wp-image-391\" srcset=\"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new1-1024x957.png 1024w, https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new1-300x280.png 300w, https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new1-768x718.png 768w, https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new1-1536x1435.png 1536w, https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new1.png 2042w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p> <\/p>\n\n\n\n<p>Um relat\u00f3rio recente da OX Security revelou uma falha cr\u00edtica no processo de verifica\u00e7\u00e3o de extens\u00f5es no Visual Studio Code (al\u00e9m de IDEs como IntelliJ e Cursor) . A falha permite que extens\u00f5es maliciosas se apresentem como \u201cverificadas\u201d mesmo contendo c\u00f3digo perigoso, execut\u00e1vel dentro da m\u00e1quina do desenvolvedor.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Como funciona o ataque<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>O VS Code envia um POST ao marketplace para verificar a autenticidade da extens\u00e3o.<\/li>\n\n\n\n<li>Um invasor pode replicar os tokens usados em extens\u00f5es leg\u00edtimas (por exemplo, da Microsoft), enganando o sistema e mantendo o s\u00edmbolo de verifica\u00e7\u00e3o ativo.<\/li>\n\n\n\n<li>Mesmo com extension sideloading, esse \u201cspoofing\u201d permite que scripts maliciosos sejam executados \u2014 foi demonstrada uma prova de conceito capaz de abrir o aplicativo Calculadora no Windows.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Riscos<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Executa c\u00f3digo malicioso com privil\u00e9gios do usu\u00e1rio.<\/li>\n\n\n\n<li>Atinge todos que instalam extens\u00f5es via VSIX, e n\u00e3o diretamente pelo marketplace.<\/li>\n\n\n\n<li>Credenciais, c\u00f3digo-fonte e recursos da empresa ficam vulner\u00e1veis.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Resposta do Microsoft<\/h3>\n\n\n\n<p>A Microsoft confirmou que, por design, o marketplace rejeitar\u00e1 pacotes VSIX spoofados, mas o bug ainda era explor\u00e1vel at\u00e9 29 de junho de 2025.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Recomenda\u00e7\u00f5es<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Instale extens\u00f5es somente via Visual Studio Marketplace.<\/li>\n\n\n\n<li>Evite extens\u00f5es side-loaded com arquivos VSIX baixados de terceiros.<\/li>\n\n\n\n<li>Acompanhe atualiza\u00e7\u00f5es do VS Code e dos plugins para garantir que patches estejam aplicados.<\/li>\n<\/ol>\n\n\n\n<p>As descobertas mostram mais uma vez que confiar apenas no s\u00edmbolo verificado das extens\u00f5es pode ser arriscado, pois os invasores podem induzir os desenvolvedores a executar c\u00f3digos maliciosos sem o seu conhecimento. Para mitigar esses riscos, \u00e9 recomend\u00e1vel instalar extens\u00f5es diretamente de marketplaces oficiais, em vez de usar arquivos de extens\u00e3o VSIX compartilhados online. <\/p>\n\n\n\n<p>&#8220;A capacidade de injetar c\u00f3digo malicioso em extens\u00f5es, compact\u00e1-las como arquivos VSIX\/ZIP e instal\u00e1-las, mantendo os s\u00edmbolos verificados em v\u00e1rias plataformas de desenvolvimento importantes, representa um s\u00e9rio risco&#8221;, disseram os pesquisadores. &#8220;Essa vulnerabilidade afeta particularmente os desenvolvedores que instalam extens\u00f5es de recursos online, como o GitHub.&#8221;<\/p>\n\n\n\n<p>Fontes: <a href=\"https:\/\/thehackernews.com\/2025\/07\/new-flaw-in-ides-like-visual-studio.html?utm_source=chatgpt.com\">The Hackernews<\/a> <\/p>\n\n\n<div class=\"wp-block-post-author\"><div class=\"wp-block-post-author__avatar\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/755f4199df39aa9a5bd103e89303b9e3ed38735133907d262d65096beb27741b?s=48&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/755f4199df39aa9a5bd103e89303b9e3ed38735133907d262d65096beb27741b?s=96&#038;d=mm&#038;r=g 2x' class='avatar avatar-48 photo' height='48' width='48' \/><\/div><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">Raphael Giusti<\/p><\/div><\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Um relat\u00f3rio recente da OX Security revelou uma falha cr\u00edtica no processo de verifica\u00e7\u00e3o de extens\u00f5es no Visual Studio Code (al\u00e9m de IDEs como IntelliJ&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/devteriaio.com\/index.php\/2025\/07\/01\/vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes\/\">Continuar leitura<span class=\"screen-reader-text\">Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es.<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1,15,45,22],"tags":[],"class_list":["post-389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ciberseguranca","category-ide","category-programacao","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es. - Devteria.io<\/title>\n<meta name=\"description\" content=\"Vulnerabilidade no VS\u202fCode, spoofing de verifica\u00e7\u00e3o, extens\u00f5es maliciosas, VSIX, marketplace, seguran\u00e7a de IDE\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es. - Devteria.io\" \/>\n<meta property=\"og:url\" content=\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes\" \/>\n<meta property=\"og:site_name\" content=\"Devteria.io\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-01T19:31:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-13T14:33:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2040\" \/>\n\t<meta property=\"og:image:height\" content=\"1884\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Raphael Giusti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raphael Giusti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#article\",\"isPartOf\":{\"@id\":\"https:\/\/devteriaio.com\/index.php\/2025\/07\/01\/vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes\/\"},\"author\":{\"name\":\"Raphael Giusti\",\"@id\":\"https:\/\/devteriaio.com\/#\/schema\/person\/2d7d984adb6457833fd39737aa53ac66\"},\"headline\":\"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es.\",\"datePublished\":\"2025-07-01T19:31:54+00:00\",\"dateModified\":\"2025-07-13T14:33:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/devteriaio.com\/index.php\/2025\/07\/01\/vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes\/\"},\"wordCount\":356,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/devteriaio.com\/#\/schema\/person\/2d7d984adb6457833fd39737aa53ac66\"},\"image\":{\"@id\":\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png\",\"articleSection\":[\"Blog\",\"Ciberseguran\u00e7a\",\"IDE\",\"Programa\u00e7\u00e3o\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/devteriaio.com\/index.php\/2025\/07\/01\/vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes\/\",\"url\":\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes\",\"name\":\"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es. - Devteria.io\",\"isPartOf\":{\"@id\":\"https:\/\/devteriaio.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#primaryimage\"},\"image\":{\"@id\":\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png\",\"datePublished\":\"2025-07-01T19:31:54+00:00\",\"dateModified\":\"2025-07-13T14:33:36+00:00\",\"description\":\"Vulnerabilidade no VS\u202fCode, spoofing de verifica\u00e7\u00e3o, extens\u00f5es maliciosas, VSIX, marketplace, seguran\u00e7a de IDE\",\"breadcrumb\":{\"@id\":\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#primaryimage\",\"url\":\"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png\",\"contentUrl\":\"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png\",\"width\":2040,\"height\":1884},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/devteriaio.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/devteriaio.com\/#website\",\"url\":\"https:\/\/devteriaio.com\/\",\"name\":\"DEVTERIA.io\",\"description\":\"Seu blog de tecnologia\",\"publisher\":{\"@id\":\"https:\/\/devteriaio.com\/#\/schema\/person\/2d7d984adb6457833fd39737aa53ac66\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/devteriaio.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/devteriaio.com\/#\/schema\/person\/2d7d984adb6457833fd39737aa53ac66\",\"name\":\"Raphael Giusti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/devteriaio.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/devteriaio.com\/wp-content\/uploads\/2024\/09\/1000000046-edited.png\",\"contentUrl\":\"https:\/\/devteriaio.com\/wp-content\/uploads\/2024\/09\/1000000046-edited.png\",\"width\":500,\"height\":281,\"caption\":\"Raphael Giusti\"},\"logo\":{\"@id\":\"https:\/\/devteriaio.com\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/devteriaio.com\"],\"url\":\"https:\/\/devteriaio.com\/index.php\/author\/devteria-io\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es. - Devteria.io","description":"Vulnerabilidade no VS\u202fCode, spoofing de verifica\u00e7\u00e3o, extens\u00f5es maliciosas, VSIX, marketplace, seguran\u00e7a de IDE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes","og_locale":"pt_BR","og_type":"article","og_title":"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es. - Devteria.io","og_url":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes","og_site_name":"Devteria.io","article_published_time":"2025-07-01T19:31:54+00:00","article_modified_time":"2025-07-13T14:33:36+00:00","og_image":[{"width":2040,"height":1884,"url":"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png","type":"image\/png"}],"author":"Raphael Giusti","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Raphael Giusti","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#article","isPartOf":{"@id":"https:\/\/devteriaio.com\/index.php\/2025\/07\/01\/vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes\/"},"author":{"name":"Raphael Giusti","@id":"https:\/\/devteriaio.com\/#\/schema\/person\/2d7d984adb6457833fd39737aa53ac66"},"headline":"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es.","datePublished":"2025-07-01T19:31:54+00:00","dateModified":"2025-07-13T14:33:36+00:00","mainEntityOfPage":{"@id":"https:\/\/devteriaio.com\/index.php\/2025\/07\/01\/vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes\/"},"wordCount":356,"commentCount":0,"publisher":{"@id":"https:\/\/devteriaio.com\/#\/schema\/person\/2d7d984adb6457833fd39737aa53ac66"},"image":{"@id":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#primaryimage"},"thumbnailUrl":"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png","articleSection":["Blog","Ciberseguran\u00e7a","IDE","Programa\u00e7\u00e3o"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#respond"]}]},{"@type":"WebPage","@id":"https:\/\/devteriaio.com\/index.php\/2025\/07\/01\/vulnerabilidade-grave-no-visual-studio-code-permite-spoofing-de-verificacao-de-extensoes\/","url":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes","name":"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es. - Devteria.io","isPartOf":{"@id":"https:\/\/devteriaio.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#primaryimage"},"image":{"@id":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#primaryimage"},"thumbnailUrl":"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png","datePublished":"2025-07-01T19:31:54+00:00","dateModified":"2025-07-13T14:33:36+00:00","description":"Vulnerabilidade no VS\u202fCode, spoofing de verifica\u00e7\u00e3o, extens\u00f5es maliciosas, VSIX, marketplace, seguran\u00e7a de IDE","breadcrumb":{"@id":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#primaryimage","url":"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png","contentUrl":"https:\/\/devteriaio.com\/wp-content\/uploads\/2025\/07\/verified_vscode_new.png","width":2040,"height":1884},{"@type":"BreadcrumbList","@id":"https:\/\/devteriaio.com\/vulnerabilidade-visual-studio-code-spoofing-extensoes#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/devteriaio.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilidade grave no Visual Studio Code permite spoofing de verifica\u00e7\u00e3o de extens\u00f5es."}]},{"@type":"WebSite","@id":"https:\/\/devteriaio.com\/#website","url":"https:\/\/devteriaio.com\/","name":"DEVTERIA.io","description":"Seu blog de tecnologia","publisher":{"@id":"https:\/\/devteriaio.com\/#\/schema\/person\/2d7d984adb6457833fd39737aa53ac66"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/devteriaio.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":["Person","Organization"],"@id":"https:\/\/devteriaio.com\/#\/schema\/person\/2d7d984adb6457833fd39737aa53ac66","name":"Raphael Giusti","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/devteriaio.com\/#\/schema\/person\/image\/","url":"https:\/\/devteriaio.com\/wp-content\/uploads\/2024\/09\/1000000046-edited.png","contentUrl":"https:\/\/devteriaio.com\/wp-content\/uploads\/2024\/09\/1000000046-edited.png","width":500,"height":281,"caption":"Raphael Giusti"},"logo":{"@id":"https:\/\/devteriaio.com\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/devteriaio.com"],"url":"https:\/\/devteriaio.com\/index.php\/author\/devteria-io\/"}]}},"_links":{"self":[{"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/posts\/389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/comments?post=389"}],"version-history":[{"count":1,"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/posts\/389\/revisions"}],"predecessor-version":[{"id":392,"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/posts\/389\/revisions\/392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/media\/390"}],"wp:attachment":[{"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/media?parent=389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/categories?post=389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devteriaio.com\/index.php\/wp-json\/wp\/v2\/tags?post=389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}