{"id":7442,"date":"2025-10-29T14:50:02","date_gmt":"2025-10-29T21:50:02","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=7442"},"modified":"2025-11-26T21:05:29","modified_gmt":"2025-11-27T05:05:29","slug":"s4x26","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/s4x26\/","title":{"rendered":"ObjectSecurity Presents &#8220;Recognizing &#038; Analyzing Compiled AI in OT Binaries &#038; Firmware&#8221; at S4x26"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><span>As artificial intelligence continues its rapid integration into operational technology (OT), industrial control systems (ICS), and IoT environments, a new layer of hidden risk is emerging. Increasingly, AI models are being compiled directly into binaries and deployed on embedded devices, quietly powering automation, safety, and decision-making functions while remaining opaque to traditional security tools. <\/span><\/p>\n<p><span>At S4x26, ObjectSecurity will present a technical session titled \u201cRecognizing &amp; Analyzing Compiled AI in OT Binaries &amp; Firmware.\u201d The session will offer practical insights into uncovering and assessing these embedded models. <\/span><\/p>\n<p><span>The presentation will explore how compiled AI components can introduce novel attack surfaces, including risks of tampering, unauthorized reuse, and intellectual property theft. ObjectSecurity will demonstrate techniques for identifying AI artifacts within binaries and firmware images, along with practical approaches to analyze them effectively and assess their security posture. <\/span><\/p>\n<p><span>These methods will be mapped to governance and compliance frameworks such as the NIST AI Risk Management Framework, showing how organizations can systematically evaluate and mitigate AI-related risks within OT systems. As AI becomes a core component of industrial software and embedded systems, visibility and accountability are more critical than ever. ObjectSecurity\u2019s work in this area helps bridge the gap between AI assurance and OT security, providing a foundation for protecting the next generation of intelligent infrastructure.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div ><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/s4xevents.com\/speakers\/\"><span class=\"fusion-button-text\">S4x26 Speakers<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div ><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Contact Us<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><h3 style=\"text-align: center;\">Check out ObjectSecurity&#8217;s presentation &#8220;<yt-formatted-string force-default-style=\"\" class=\"style-scope ytd-watch-metadata\" title=\"OT Security Score For Manufacturers\">OT Security Score For Manufacturers&#8221; l<\/yt-formatted-string><span style=\"font-size: 16px;\">ast year at S4x25<\/span><\/h3>\n<\/div><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:1050px;--awb-max-height:597px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"MVZLY8TUKFM\" class=\"landscape\" params=\"wmode=transparent&autoplay=1&amp;rel=0&amp;showinfo=0&enablejsapi=1\" title=\"YouTube video player 1\" width=\"1050\" height=\"597\" data-thumbnail-size=\"auto\"><\/lite-youtube><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-3 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/nct.objectsecurity.io\"><span class=\"fusion-button-text\">nct.objectsecurity.io<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-4 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/nct\/\"><span class=\"fusion-button-text\">Press Release: &#8220;NCT&#8221; NIST SBIR<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":7445,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[60,66,90,17,39],"tags":[],"class_list":["post-7442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","category-data-security","category-education","category-event","category-ot-ics-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ObjectSecurity Presents &quot;Recognizing &amp; Analyzing Compiled AI in OT Binaries &amp; Firmware&quot; at S4x26 - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"ObjectSecurity Presents &#8220;Recognizing &#038; Analyzing Compiled AI in OT Binaries &#038; Firmware&#8221; at S4x26\",\"datePublished\":\"2025-10-29T21:50:02+00:00\",\"dateModified\":\"2025-11-27T05:05:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/\"},\"wordCount\":4907,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/s4x26-FI.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Artificial Intelligence\",\"Data Security\",\"Education\",\"Event\",\"OT\\\/ICS Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/\",\"name\":\"ObjectSecurity Presents \\\"Recognizing & Analyzing Compiled AI in OT Binaries & Firmware\\\" at S4x26 - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/s4x26-FI.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-10-29T21:50:02+00:00\",\"dateModified\":\"2025-11-27T05:05:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/s4x26-FI.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/s4x26-FI.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/s4x26\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ObjectSecurity Presents &#8220;Recognizing &#038; Analyzing Compiled AI in OT Binaries &#038; Firmware&#8221; at S4x26\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ObjectSecurity Presents \"Recognizing & Analyzing Compiled AI in OT Binaries & Firmware\" at S4x26 - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/s4x26\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/s4x26\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"ObjectSecurity Presents &#8220;Recognizing &#038; Analyzing Compiled AI in OT Binaries &#038; Firmware&#8221; at S4x26","datePublished":"2025-10-29T21:50:02+00:00","dateModified":"2025-11-27T05:05:29+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/s4x26\/"},"wordCount":4907,"image":{"@id":"https:\/\/objectsecurity.com\/s4x26\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/10\/s4x26-FI.png?fit=600%2C337&ssl=1","articleSection":["Artificial Intelligence","Data Security","Education","Event","OT\/ICS Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/s4x26\/","url":"https:\/\/objectsecurity.com\/s4x26\/","name":"ObjectSecurity Presents \"Recognizing & Analyzing Compiled AI in OT Binaries & Firmware\" at S4x26 - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/s4x26\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/s4x26\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/10\/s4x26-FI.png?fit=600%2C337&ssl=1","datePublished":"2025-10-29T21:50:02+00:00","dateModified":"2025-11-27T05:05:29+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/s4x26\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/s4x26\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/s4x26\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/10\/s4x26-FI.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/10\/s4x26-FI.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/s4x26\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"ObjectSecurity Presents &#8220;Recognizing &#038; Analyzing Compiled AI in OT Binaries &#038; Firmware&#8221; at S4x26"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/10\/s4x26-FI.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=7442"}],"version-history":[{"count":6,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7442\/revisions"}],"predecessor-version":[{"id":7598,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7442\/revisions\/7598"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/7445"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=7442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=7442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=7442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}