Event JSON
{
"id": "7e81514d14e9b23a1bb65415acd1c6696844bf086afdadca2e158c5ced4a77dd",
"pubkey": "22bda3af52e1991a6b7072ff8c7ad94a2c499d2ec5f3611cf9ecd73fe74d5322",
"created_at": 1713305927,
"kind": 1,
"tags": [
[
"p",
"0d68fe859191e5b04b0b8b5a9b7c5c81889b5880088c6a8631e3ca53484c4b9d",
"wss://relay.mostr.pub"
],
[
"p",
"783f5e8607f5b88c53c6c6a334445e79376235013841bc40db7c59eeb7b9e94b",
"wss://relay.mostr.pub"
],
[
"e",
"0e52b3719d3b81716b94a3124ffe10178f4b5be8a9e09af90ccd10c6c7414c11",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://ioc.exchange/users/spmatich/statuses/112283217252523148",
"activitypub"
]
],
"content": "nostr:npub1p450apv3j8jmqjct3ddfklzusxyfkkyqpzxx4p33u099xjzvfwwsw789jz so the exploit just needs an update to include setting the user agent header to something else right, and it could be one of many many many different strings.",
"sig": "c7addffeb6dee3fc1e7fc2846db1233cc5b656af3a0e65fc9bdfc0ae39e1438b9b8e04b06e1ccd8599cb886f125e75ffbb10e84b2a3690f4950028bf932641b5"
}