Event JSON
{
"id": "e89e53e82c1bfa629a541e4c34068ba5c9ab52c53d353407d90cf71e829d646f",
"pubkey": "4afb3830f7c5db05d5934438779f63c3ed1401aa03a2eb0cc3cda743633aea61",
"created_at": 1695140158,
"kind": 1,
"tags": [
[
"p",
"81cbff920b2104f1927223fa6f585b9068f6459ab8ef474280abf2b00ce5e587",
"wss://relay.mostr.pub"
],
[
"p",
"415e8c77fcede881647f1af6c67f4dfdce263a61dd17c5ac9b76340da7c86b56",
"wss://relay.mostr.pub"
],
[
"e",
"60aae07495e172c12628e1f258157267124a2cdf5f90391764b7d935f76079eb",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.town/notes/9ju2zubqfxfgdr99",
"activitypub"
]
],
"content": "nostr:npub1s89llystyyz0rynjy0ax7kzmjp50v3v6hrh5ws5q40etqr89ukrs8jf0yf I don't know if I agree with that. Many PoCs also serve as validators for exposure, especially for folks who do not have full vuln scanning in their environment.\n\nAlso, other researchers wanna run the thing to see how the attack works in practice.",
"sig": "366014082e3cfc740c24fdd098b7cde5b917d43e743b8573697244cfa6f5eba81dd808bdaaec9f222a8058cbe743ecefa1cfe81cc0572d5f40db4da1833b643a"
}