Event JSON
{
"id": "e9ac9cd60049c662fe9bad92c130a624bfd7a286cedfb0b44c86c4c2b051fd52",
"pubkey": "38710f1c39a6351a46a073049a61e8eaf39e14168a2a81a2549950699dcbb9d9",
"created_at": 1716344880,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@hdm/112482378075978712",
"web"
],
[
"proxy",
"https://infosec.exchange/users/hdm/statuses/112482378075978712",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/hdm/statuses/112482378075978712",
"pink.momostr"
]
],
"content": "For anyone considering \"Skip this update\" due to ITerm2's silly AI thing - NOT updating means missing patches for this fun bag of exploits: https://vin01.github.io/piptagole/escape-sequences/iterm2/hyper/url-handlers/code-execution/2024/05/21/arbitrary-url-schemes-terminal-emulators.html\n\nMaybe time for a new terminal?",
"sig": "a97f1869f9b61e75b19c68e45a55b30adc38e13099421fc07663e4c05f69c436505ca3104c3db03778274602637239c324359e4dc9f7053756c63ef55f0ede81"
}