{"id":21707,"date":"2025-09-22T16:54:22","date_gmt":"2025-09-22T14:54:22","guid":{"rendered":"https:\/\/www.transparentedge.eu\/en\/blog\/"},"modified":"2026-04-08T18:03:55","modified_gmt":"2026-04-08T16:03:55","slug":"cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack","status":"publish","type":"post","link":"https:\/\/www.transparentedge.eu\/en\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/","title":{"rendered":"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack"},"content":{"rendered":"\n<p>In the vast and trusted <a href=\"https:\/\/en.wikipedia.org\/wiki\/Npm\">npm<\/a> ecosystem, trust in our contributors and the security of package maintainers are fundamental pillars. However, the recent incident involving the account of Qix, a key author of essential packages like chalk and color-convert, has shown that even the most diligent can be vulnerable.<\/p>\n\n\n\n<p>The attack vector wasn&#8217;t a complex code flaw, but something much simpler and more malicious: an email phishing attack. For a senior programmer, this is a somber lesson and a reminder that the security of our supply chain goes beyond the code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A review of the attack<\/h2>\n\n\n\n<p>The attack did not exploit a vulnerability in npm itself, but rather social engineering.<\/p>\n\n\n\n<p>An attacker posed as a trusted entity and, using a well-crafted phishing email, tricked author Qix into handing over his npm credentials. Once the attacker gained access to his account, they were able to publish a malicious version of his packages.<\/p>\n\n\n\n<p>This is especially insidious because it attacks the trust we have in the system. Qix packages are critical dependencies for thousands of other projects. A simple npm install became a vector for injecting malware, compromising not only development systems but potentially end-user applications. As programmers, this forces us to think about security from a more human and social perspective, not just a technical one.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A senior programmer&#8217;s perspective beyond the code \ufe0f<\/h2>\n\n\n\n<p>The Qix incident reinforces the need for senior developers to take a leadership role in the security of their teams and projects. While dependency audits are crucial, we must recognize that the weakest link may be a person, not a line of code.<\/p>\n\n\n\n<p>Here are some concrete actions to consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Two-factor authentication (2FA) for everyone<\/strong>: <a href=\"https:\/\/www.transparentedge.eu\/blog\/2fa-security\/\">2FA<\/a> isn&#8217;t optional; it&#8217;s mandatory. This attack likely wouldn&#8217;t have been successful if 2FA had been enabled. As a community, we should push key package maintainers to enable it, and within our own teams, make it a requirement for all npm accounts and related services.<br><\/li>\n\n\n\n<li><strong>Phishing education and awareness<\/strong>: security training should be ongoing. Development teams should be informed about the risks of phishing, how to identify suspicious emails, and the importance of never clicking on links or entering credentials unless absolutely sure.<br><\/li>\n\n\n\n<li><strong>Validation of package publications<\/strong>: In enterprise projects, we must implement CI\/CD pipelines that validate package integrity before deploying them to production. Static scanning and behavioral analysis tools can help detect malicious code, even if it comes from a seemingly legitimate source.<br><\/li>\n\n\n\n<li><strong>Dependency and version management<\/strong>: While the <code>package-lock.json<\/code> file is a good practice, the Qix attack underscores the need to be more cautious with critical dependencies. In production environments, consider using a private npm registry or cache that restricts updates to tested and approved versions, avoiding exposure to newly released malicious versions.<br><\/li>\n\n\n\n<li>Do not overuse the caret symbol ^ in our package management (usually <code>package.json<\/code>) because it exposes us to uncontrolled updates.<br><\/li>\n\n\n\n<li>Finally, as always, keep our project as simple as possible, with as few dependencies as possible.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion: security is a mindset<\/h2>\n\n\n\n<p>The Qix attack is a reminder that security in the software supply chain is a multifaceted issue. It&#8217;s not enough to protect our own code; we must also be vigilant with the environments and tools we use. As senior programmers, our responsibility is to foster a security culture that prioritizes vigilance, education, and layered defenses. Trust is an invaluable resource in software development, and we must protect it with the same diligence we protect our code.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/anthonybr\/\">Antonio Bacete<\/a> is Frontend Solutions Architect in Transparent Edge.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>If Manchego cheese were code, it would have Antonio Bacete&#8217;s photo on it. A tireless developer, he&#8217;s in charge of the architecture and front-end development at Transparent Edge, where he applies buckets of patience to accommodate and shape all the features we can think of to incorporate into our dashboard.<\/em><\/p>\n<\/blockquote>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The phishing attack on the Qix account underscores the importance of security beyond the code. Learn how better dependency management is essential to protecting your projects.<\/p>\n","protected":false},"author":18,"featured_media":22881,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-21707","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in the JavaScript ecosystem, the Qix phishing attack - Transparent Edge<\/title>\n<meta name=\"description\" content=\"The phishing attack on the Qix account underscores the importance of security beyond the code. Learn how better dependency management is essential to protecting your projects.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"The phishing attack on the Qix account underscores the importance of security beyond the code. Learn how better dependency management is essential to protecting your projects.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-22T14:54:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T16:03:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/04\/TE_blog_Los_invisibles_CDN_EN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2063\" \/>\n\t<meta property=\"og:image:height\" content=\"1377\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sonia Ar\u00e9valo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tedgeservices\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/\"},\"author\":{\"name\":\"Sonia Ar\u00e9valo\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/c5e1c51b2f3403c743346f269ffa07ec\"},\"headline\":\"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack\",\"datePublished\":\"2025-09-22T14:54:22+00:00\",\"dateModified\":\"2026-04-08T16:03:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/\"},\"wordCount\":643,\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/TE_blog_Los_invisibles_CDN_EN.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/\",\"name\":\"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/TE_blog_Los_invisibles_CDN_EN.jpg\",\"datePublished\":\"2025-09-22T14:54:22+00:00\",\"dateModified\":\"2026-04-08T16:03:55+00:00\",\"description\":\"The phishing attack on the Qix account underscores the importance of security beyond the code. Learn how better dependency management is essential to protecting your projects.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/TE_blog_Los_invisibles_CDN_EN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/TE_blog_Los_invisibles_CDN_EN.jpg\",\"width\":2063,\"height\":1377},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/c5e1c51b2f3403c743346f269ffa07ec\",\"name\":\"Sonia Ar\u00e9valo\",\"description\":\"Nada como la sensaci\u00f3n de maravilla e infinitud que se despierta cuando aprendo algo nuevo, cuando descubro cu\u00e1l era la historia y c\u00f3mo funciona algo. Vivo en Madrid hace poco, desarrollo sitios web hace siempre.\",\"sameAs\":[\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"https:\\\/\\\/www.instagram.com\\\/aldeaglobal.web\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/soniaarevalo\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack - Transparent Edge","description":"The phishing attack on the Qix account underscores the importance of security beyond the code. Learn how better dependency management is essential to protecting your projects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack - Transparent Edge","og_description":"The phishing attack on the Qix account underscores the importance of security beyond the code. Learn how better dependency management is essential to protecting your projects.","og_url":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/","og_site_name":"Transparent Edge","article_published_time":"2025-09-22T14:54:22+00:00","article_modified_time":"2026-04-08T16:03:55+00:00","og_image":[{"width":2063,"height":1377,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/04\/TE_blog_Los_invisibles_CDN_EN.jpg","type":"image\/jpeg"}],"author":"Sonia Ar\u00e9valo","twitter_card":"summary_large_image","twitter_creator":"@tedgeservices","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/#article","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/"},"author":{"name":"Sonia Ar\u00e9valo","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/c5e1c51b2f3403c743346f269ffa07ec"},"headline":"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack","datePublished":"2025-09-22T14:54:22+00:00","dateModified":"2026-04-08T16:03:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/"},"wordCount":643,"publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/04\/TE_blog_Los_invisibles_CDN_EN.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/","url":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/","name":"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/04\/TE_blog_Los_invisibles_CDN_EN.jpg","datePublished":"2025-09-22T14:54:22+00:00","dateModified":"2026-04-08T16:03:55+00:00","description":"The phishing attack on the Qix account underscores the importance of security beyond the code. Learn how better dependency management is essential to protecting your projects.","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/04\/TE_blog_Los_invisibles_CDN_EN.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2026\/04\/TE_blog_Los_invisibles_CDN_EN.jpg","width":2063,"height":1377},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-in-the-javascript-ecosystem-the-qix-phishing-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in the JavaScript ecosystem, the Qix phishing attack"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]},{"@type":"Person","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/c5e1c51b2f3403c743346f269ffa07ec","name":"Sonia Ar\u00e9valo","description":"Nada como la sensaci\u00f3n de maravilla e infinitud que se despierta cuando aprendo algo nuevo, cuando descubro cu\u00e1l era la historia y c\u00f3mo funciona algo. Vivo en Madrid hace poco, desarrollo sitios web hace siempre.","sameAs":["https:\/\/www.transparentedge.eu\/","https:\/\/www.instagram.com\/aldeaglobal.web","https:\/\/www.linkedin.com\/in\/soniaarevalo\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/21707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=21707"}],"version-history":[{"count":5,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/21707\/revisions"}],"predecessor-version":[{"id":21988,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/21707\/revisions\/21988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/22881"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=21707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/categories?post=21707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/tags?post=21707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}