{"id":33201,"date":"2026-02-23T09:14:27","date_gmt":"2026-02-23T09:14:27","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=33201"},"modified":"2026-04-17T18:07:34","modified_gmt":"2026-04-17T18:07:34","slug":"protecting-ai-security-2025-hot-security-incident","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/protecting-ai-security-2025-hot-security-incident\/","title":{"rendered":"Protecting AI Security: 2025 Hot Security Incident"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\"><strong>GitHub MCP Cross-Repository Data Leak Vulnerability<\/strong><\/h2>\n\n\n\n<p>In May 2025, Invariant disclosed a critical vulnerability in GitHub&#8217;s Machine Collaboration Protocol (MCP), where attackers embedded malicious commands within public repository Issues to hijack developers&#8217; locally running AI Agents. When an AI Agent was triggered to read and &#8220;assist&#8221; in processing the Issue, it indiscriminately executed the embedded commands, actively pulling and exfiltrating sensitive data&acirc;&euro;&rdquo;such as private repository source code and cryptographic keys&acirc;&euro;&rdquo;from the user&#8217;s private repositories. This attack chain entirely bypassed GitHub&#8217;s permission control system, enabling unauthorized cross-repository data theft.<\/p>\n\n\n\n<p>The incident exposed significant blind spots in the MCP protocol&#8217;s trust boundary definitions. At the protocol level, there is a lack of mandatory isolation mechanisms to distinguish between &#8220;call origins&#8221; and &#8220;data content.&#8221; GitHub&#8217;s MCP integration fundamentally operates as a nested RPC call chain: AI Agent &acirc;&dagger;&rsquo; MCP Server &acirc;&dagger;&rsquo; GitHub API &acirc;&dagger;&rsquo; Issue Content Parsing. When an Agent executes actions using a user&#8217;s GitHub credentials, it fails to differentiate between &#8220;user task descriptions&#8221; and &#8220;attacker-injected commands&#8221; within Issues. Since developers grant their AI Agents global-level GitHub permissions, and the MCP protocol lacks fine-grained security domain segmentation for read\/write\/execute operations, this vulnerability allows attackers to hijack local AI Agents and steal sensitive data, including private repository source code and encryption keys.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>AI Browser Comet Hidden Command Account Hijacking Vulnerability<\/strong><\/h2>\n\n\n\n<p>In August 2025, Perplexity&acirc;&euro;&trade;s AI-powered browser Comet was exposed to a critical &#8220;indirect prompt injection&#8221; vulnerability. Attackers embedded hidden commands in Reddit comment sections, which, when users activated Comet&acirc;&euro;&trade;s &#8220;summarize current page&#8221; feature, triggered the AI to automatically execute the concealed instructions. Within 150 seconds, the AI could log into the user&acirc;&euro;&trade;s email, bypass captchas, and transmit credentials back to the attacker&acirc;&euro;&rdquo;all without the user&acirc;&euro;&trade;s awareness and with no visible anomalies on the interface.<\/p>\n\n\n\n<p>The root cause of this vulnerability lay in Comet&acirc;&euro;&trade;s default trust assumption for all web page content, combined with a lack of security validation for input sources. Attackers exploited Markdown&acirc;&euro;&trade;s &#8220;spoiler tag&#8221; syntax (&gt;!&acirc;&euro;&brvbar;!&lt;) to embed malicious commands, disguising them as white text to evade user detection. Additionally, Comet failed to implement sandbox isolation during page rendering, allowing malicious actions to execute unrestricted. As a result, the browser automatically transmitted stored login credentials to attackers, leading to sensitive data leaks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>AI-Generated Malware Attacks 230,000+&nbsp;Computing Clusters<\/strong><\/h2>\n\n\n\n<p>In November 2025, Oligo Security disclosed that attackers exploited a historical vulnerability in the Ray framework (CVE-2023-48022). Using AI-assisted tools, they generated attack scripts to compromise over 230,000 publicly exposed Ray AI computing clusters worldwide. The attackers deployed modular malicious payloads capable of cryptomining, data theft, and DDoS attacks, creating a large-scale botnet.<\/p>\n\n\n\n<p>The core tactic involved&nbsp;was&nbsp;using&nbsp;LLMs&nbsp;to rapidly generate automated intrusion scripts tailored to different Ray versions and Linux distributions. This significantly shortened the time from vulnerability detection to payload deployment. While the AI-generated code contained redundancies and incomplete error handling, the use of AI Code and ReAct frameworks enabled rapid iteration, allowing attackers to compromise exposed clusters within weeks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Directions for AI Security Development<\/strong><\/h2>\n\n\n\n<p>As AI applications evolve from intelligent chatbots&Acirc;&nbsp;to autonomous agent systems, the detection and prevention of AI security risks are becoming more sophisticated. Based on major AI security incidents and technological trends from 2024 to 2025, the AI security threat landscape is expanding&acirc;&euro;&rdquo;shifting from model content and system security to multimodal security, agent security, and threats that cause substantial system damage (as referenced in the NSFOCUS AI LLM Risk&Acirc;&nbsp;Threat Matrix). The attack surface for artificial intelligence is visibly broadening.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/NSFOCUS-AI-LLM-RISK-THREAT-MATRIX.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"965\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/NSFOCUS-AI-LLM-RISK-THREAT-MATRIX-1024x965.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-33140\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/NSFOCUS-AI-LLM-RISK-THREAT-MATRIX-1024x965.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/NSFOCUS-AI-LLM-RISK-THREAT-MATRIX-300x283.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/NSFOCUS-AI-LLM-RISK-THREAT-MATRIX-768x724.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/NSFOCUS-AI-LLM-RISK-THREAT-MATRIX-600x566.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/NSFOCUS-AI-LLM-RISK-THREAT-MATRIX-150x141.png 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2026\/01\/NSFOCUS-AI-LLM-RISK-THREAT-MATRIX.png 1342w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>To ensure the security of AI systems, a comprehensive defense framework must be constructed around multiple risk domains, including infrastructure security, data security, model security, application security, and identity security. This framework should span the three key stages of LLM&nbsp;development: training, deployment, and application.&nbsp;With this&nbsp;approach, trust can be rebuilt, and a multi-tiered security system can be established to meet the demands of secure, compliant AI applications and practical protection against evolving threats.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>GitHub MCP Cross-Repository Data Leak Vulnerability In May 2025, Invariant disclosed a critical vulnerability in GitHub&#8217;s Machine Collaboration Protocol (MCP), where attackers embedded malicious commands within public repository Issues to hijack developers&#8217; locally running AI Agents. When an AI Agent was triggered to read and &#8220;assist&#8221; in processing the Issue, it indiscriminately executed the embedded [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":32630,"comment_status":"open","ping_status":"open","sticky":false,"template":"post-templates\/single-layout-8.php","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[63,357],"class_list":["post-33201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-ai","tag-cybersecurity-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting AI Security: 2025 Hot Security Incident - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting AI Security: 2025 Hot Security Incident - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"GitHub MCP Cross-Repository Data Leak Vulnerability In May 2025, Invariant disclosed a critical vulnerability in GitHub&#039;s Machine Collaboration Protocol\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-23T09:14:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:34+00:00\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Protecting AI Security: 2025 Hot Security Incident - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"GitHub MCP Cross-Repository Data Leak Vulnerability In May 2025, Invariant disclosed a critical vulnerability in GitHub&#039;s Machine Collaboration Protocol\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Protecting AI Security: 2025 Hot Security Incident\",\"datePublished\":\"2026-02-23T09:14:27+00:00\",\"dateModified\":\"2026-04-17T18:07:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/\"},\"wordCount\":721,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"AI\",\"Cybersecurity Insights\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/\",\"name\":\"Protecting AI Security: 2025 Hot Security Incident - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2026-02-23T09:14:27+00:00\",\"dateModified\":\"2026-04-17T18:07:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/protecting-ai-security-2025-hot-security-incident\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting AI Security: 2025 Hot Security Incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting AI Security: 2025 Hot Security Incident - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/","og_locale":"pt_BR","og_type":"article","og_title":"Protecting AI Security: 2025 Hot Security Incident - NSFOCUS","og_description":"GitHub MCP Cross-Repository Data Leak Vulnerability In May 2025, Invariant disclosed a critical vulnerability in GitHub's Machine Collaboration Protocol","og_url":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/","og_site_name":"NSFOCUS","article_published_time":"2026-02-23T09:14:27+00:00","article_modified_time":"2026-04-17T18:07:34+00:00","author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Protecting AI Security: 2025 Hot Security Incident - NSFOCUS","twitter_description":"GitHub MCP Cross-Repository Data Leak Vulnerability In May 2025, Invariant disclosed a critical vulnerability in GitHub's Machine Collaboration Protocol","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Protecting AI Security: 2025 Hot Security Incident","datePublished":"2026-02-23T09:14:27+00:00","dateModified":"2026-04-17T18:07:34+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/"},"wordCount":721,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/#primaryimage"},"thumbnailUrl":"","keywords":["AI","Cybersecurity Insights"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/","url":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/","name":"Protecting AI Security: 2025 Hot Security Incident - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/#primaryimage"},"thumbnailUrl":"","datePublished":"2026-02-23T09:14:27+00:00","dateModified":"2026-04-17T18:07:34+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/protecting-ai-security-2025-hot-security-incident\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Protecting AI Security: 2025 Hot Security Incident"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/33201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=33201"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/33201\/revisions"}],"predecessor-version":[{"id":35592,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/33201\/revisions\/35592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=33201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=33201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=33201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}