Event JSON
{
"id": "e891aa8190197b7d8888b67f831d09f26a65acb25299f0f22456ccdc3a34b3d9",
"pubkey": "c043dd0dc7eb1f350a58d13a3e6fd67cf6bb5bb56f81d8466d23e000c9222f1f",
"created_at": 1735314034,
"kind": 1,
"tags": [
[
"p",
"427bf147f85c6d2e7ddb3c49ad43e099fb79007120b1b31999914dc26b1e9822",
"wss://relay.mostr.pub"
],
[
"p",
"631927aed1f9a7f798b0435ef4d91e770868eaed6b10dc12db1695f55e3daf96",
"wss://relay.mostr.pub"
],
[
"e",
"ba12fc9963f7caaff21edfdfcf61d6dc4fde3e606f9bc512f2b389f7d725b1df",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://notnow.dev/objects/b67132f7-422b-43ab-968e-01f657f3d8d4",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqgfalz3lct3kjulwm83y66slqn8ahjqr3yzcmxxvej9xuy6c7nq3q5dm3p8 Anyways, the regex bypass should work just fine on Arm64 (https://github.com/rycbar77/V8-Sandbox-Escape-via-Regexp, overwrite https://source.chromium.org/chromium/chromium/src/+/main:v8/src/regexp/regexp-interpreter.cc;l=205;drc=e3f33e99674eab3881d2d65b82dfe436829bb831 and I get a nice memcpy)",
"sig": "c4d1f7b9c9b2ebeca1c0e2d8e72f6258bd08e6264ba6061202493915a4494ad4c4af25bb06c9446ce4ac4722f750e4873cd7b0b309e34dc5d29b79ac7a764594"
}