<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Anaconda</provider_name><provider_url>https://www.anaconda.com</provider_url><author_name>Kyle Leaders</author_name><title>5 Common Cybersecurity Attacks on Open-Source Software | Anaconda</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="UcgU0A6Dyy"&gt;&lt;a href="https://www.anaconda.com/blog/5-common-cybersecurity-attacks-on-open-source-software"&gt;5 Common Cybersecurity Attacks on Open-Source Software&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.anaconda.com/blog/5-common-cybersecurity-attacks-on-open-source-software/embed#?secret=UcgU0A6Dyy" width="600" height="338" title="&#x201C;5 Common Cybersecurity Attacks on Open-Source Software&#x201D; &#x2014; Anaconda" data-secret="UcgU0A6Dyy" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.anaconda.com/wp-content/uploads/2023/07/Blog-Featured-Images-360-&#xD7;-260-px-16.png</thumbnail_url><thumbnail_width>360</thumbnail_width><thumbnail_height>260</thumbnail_height><description>Open-source platforms can be vulnerable to various types of attacks that can introduce insecure or malicious code into your systems. Here are five attacks to guard against in your development environments.</description></oembed>
