{"id":10644,"date":"2025-12-01T08:39:00","date_gmt":"2025-12-01T06:39:00","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=10644"},"modified":"2025-12-03T07:02:40","modified_gmt":"2025-12-03T05:02:40","slug":"socket-israel","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/socket-israel\/","title":{"rendered":"\u05d0\u05e0\u05d7\u05e0\u05d5 \u05e0\u05e6\u05d9\u05d2\u05d9 Socket \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc"},"content":{"rendered":"\n<p>\u05d0\u05e0\u05d9 \u05e9\u05de\u05d7 \u05dc\u05e2\u05d3\u05db\u05df \u05e9\u05d1\u05de\u05e1\u05d2\u05e8\u05ea \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4- ALM \u05d5\u05d4- DevSecOps \/ AppSec \/ DevOps \u05e9\u05dc\u05e0\u05d5<br>\u05d0\u05e0\u05d5 \u05de\u05e6\u05d9\u05e2\u05d9\u05dd (\u05de\u05d0\u05d6 2024) \u05d2\u05dd \u05d0\u05ea \u05d4\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Socket &#8211; \u05d4\u05de\u05e6\u05d9\u05e2\u05d4 \u05e4\u05ea\u05e8\u05d5\u05df \u05de\u05ea\u05e7\u05d3\u05dd \u05d1\u05d9\u05d5\u05ea\u05e8 \u05dc\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05e7\u05d5\u05d3 \u05d5\u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d5\u05ea.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/06\/social-share.jpg\" alt=\"socket logo\" class=\"wp-image-10651\" style=\"aspect-ratio:2.2211538461538463;object-fit:cover;width:569px;height:auto\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/06\/social-share.jpg 1000w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/06\/social-share-300x150.jpg 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/06\/social-share-768x384.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>Socket \u05d4\u05d5\u05d0 \u05db\u05dc\u05d9 \u05e2\u05d6\u05e8 \u05dc\u05de\u05e4\u05ea\u05d7\u05d9 \u05ea\u05d5\u05db\u05e0\u05d4 \u05d5\u05dc\u05e6\u05d5\u05d5\u05ea\u05d9 Security, <br>\u05e9\u05e2\u05d5\u05d6\u05e8 \u05dc\u05d4\u05d2\u05df \u05e2\u05dc \u05d4\u05e7\u05d5\u05d3 \u05de\u05e4\u05e0\u05d9 \u05d7\u05d1\u05d9\u05dc\u05d5\u05ea \u05e7\u05d5\u05d3 \u05e6\u05d3 \u05d2' (Dependencies) <br>\u05d4\u05de\u05db\u05d9\u05dc\u05d5\u05ea \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea (Vulnerabilities), \u05d5\u05d2\u05dd \u05de\u05e4\u05e0\u05d9 \u05d7\u05d1\u05d9\u05dc\u05d5\u05ea \u05e7\u05d5\u05d3 \u05d6\u05d3\u05d5\u05e0\u05d9\u05d5\u05ea (Malware).<\/p>\n\n\n\n<p>Socket \u05de\u05d6\u05d4\u05d4 \u05e0\u05e7\u05d5\u05d3\u05d5\u05ea \u05ea\u05d5\u05e8\u05e4\u05d4 \u05de\u05e1\u05d5\u05e8\u05ea\u05d9\u05d5\u05ea (CVEs) , \u05d0\u05da \u05e1\u05d5\u05e8\u05e7 \u05d2\u05dd \u05de\u05e2\u05d1\u05e8 \u05dc\u05db\u05da \u05d5\u05de\u05d5\u05e6\u05d0 \u05ea\u05dc\u05d5\u05d9\u05d5\u05ea \u05d1\u05e7\u05d5\u05d3 \u05d6\u05d3\u05d5\u05e0\u05d9. <br>\u05d4\u05d5\u05d0 \u05de\u05d6\u05d4\u05d4 \u05d5\u05d7\u05d5\u05e1\u05dd \u05d1\u05d0\u05d5\u05e4\u05df \u05d9\u05d6\u05d5\u05dd \u05ea\u05dc\u05d5\u05d9\u05d5\u05ea \u05e2&quot;\u05e4 \u05de\u05e2\u05dc 70 \u05e1\u05d9\u05d2\u05e0\u05dc\u05d9\u05dd \u05e9\u05dc \u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05d1\u05e9\u05e8\u05e9\u05e8\u05ea \u05d0\u05e1\u05e4\u05e7\u05d4 \u200b\u200b\u05d1\u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7, \u05dc\u05d4\u05d2\u05e0\u05d4 \u05de\u05e7\u05d9\u05e4\u05d4. <br>\u05d1\u05db\u05da \u05d4\u05d5\u05d0 \u05e9\u05d5\u05e0\u05d4 \u05de\u05d4\u05db\u05dc\u05d9\u05dd \u05d4\u05d5\u05ea\u05d9\u05e7\u05d9\u05dd \u05d1\u05ea\u05d7\u05d5\u05dd.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u05d7\u05dc\u05e7 \u05de\u05d9\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea Socket:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u05e4\u05ea\u05e8\u05d5\u05df \u05de\u05ea\u05e7\u05d3\u05dd \u05dc- Supply Chain Attacks<\/li>\n\n\n\n<li>\u05e4\u05ea\u05e8\u05d5\u05df \u05e9\u05de\u05db\u05e1\u05d4 SCA , IAST \u05d5\u05d2\u05dd \u05d8\u05d9\u05e4\u05d5\u05dc \u05d1- Malwares<\/li>\n\n\n\n<li>\u05e4\u05ea\u05e8\u05d5\u05df Reachability<\/li>\n\n\n\n<li>\u05ea\u05d5\u05e8\u05dd \u05dc\u05e9\u05d9\u05e4\u05d5\u05e8 \u05d0\u05d9\u05db\u05d5\u05ea \u05d4\u05de\u05d5\u05e6\u05e8 \u05d5\u05d4- Releases \u05e9\u05dc\u05db\u05dd<\/li>\n\n\n\n<li>\u05e4\u05ea\u05e8\u05d5\u05df \u05e9\u05de\u05d1\u05d5\u05e1\u05e1 \u05d2\u05dd \u05e2\u05dc AI<\/li>\n\n\n\n<li>\u05d6\u05d9\u05d4\u05d5\u05d9 \u05e9\u05d9\u05de\u05d5\u05e9 \u05dc\u05d0 \u05ea\u05e7\u05d9\u05df \u05d1\u05e8\u05e9\u05d9\u05d5\u05df \u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7<\/li>\n\n\n\n<li>\u05d6\u05d9\u05d4\u05d5\u05d9 \u05d7\u05d1\u05d9\u05dc\u05d5\u05ea \u05d7\u05e9\u05d5\u05d3\u05d5\u05ea \u05d0\u05d1\u05d6\u05de\u05df \u05d0\u05de\u05ea (\u05d0\u05dd \u05d4\u05ea\u05e2\u05d3\u05db\u05e0\u05d5) &#8211; \u05de\u05e2\u05e0\u05d4 \u05de\u05d4\u05d9\u05e8 \u05dc- Zero days attacks !<\/li>\n\n\n\n<li>\u05db\u05dc\u05d9 \u05e9\u05d9\u05de\u05d5\u05e9\u05d9 \u05d5\u05d0\u05d4\u05d5\u05d1 \u05d2\u05dd \u05e2\u05dc \u05de\u05e4\u05ea\u05d7\u05d9\u05dd \u05d5\u05d2\u05dd \u05e2\u05dc \u05e6\u05d5\u05d5\u05ea\u05d9 Security<\/li>\n\n\n\n<li>\u05d4\u05d7\u05d6\u05e8 \u05d4\u05e9\u05e7\u05e2\u05d4 (ROI) \u05de\u05d5\u05db\u05d7 \u05d2\u05dd \u05d1\u05d6\u05de\u05df \u05e2\u05d1\u05d5\u05d3\u05d4 \u05e9\u05dc \u05de\u05e4\u05ea\u05d7\u05d9\u05dd \u05d5\u05d2\u05dd \u05d1\u05de\u05e0\u05d9\u05e2\u05ea \u05d1\u05d0\u05d2\u05d9\u05dd, \u05d3\u05dc\u05e3 \u05de\u05d9\u05d3\u05e2 \u05d5\u05d0\u05d5\u05d1\u05d3\u05df \u05de\u05d5\u05e0\u05d9\u05d8\u05d9\u05df \u05e9\u05dc \u05d4\u05d7\u05d1\u05e8\u05d4<\/li>\n\n\n\n<li>\u05e7\u05d9\u05d9\u05de\u05ea \u05d0\u05d9\u05e0\u05d8\u05d2\u05e8\u05e6\u05d9\u05d4 \u05e2\u05dd GitHub , GitLab CI , Bitbucket \u05d5\u05e2\u05d5\u05d3. <\/li>\n\n\n\n<li>\u05e7\u05d9\u05d9\u05de\u05ea \u05ea\u05de\u05d9\u05db\u05d4 \u05d3\u05e8\u05da API \u05d5- CLI<\/li>\n\n\n\n<li>\u05de\u05e2\u05e8\u05db\u05ea alerting \u05de\u05ea\u05e7\u05d3\u05de\u05ea \u05e9\u05e2\u05d5\u05d6\u05e8\u05ea \u05dc\u05ea\u05e2\u05d3\u05e3 \u05de\u05de\u05e6\u05d0\u05d9\u05dd \u05e9\u05d3\u05d5\u05e8\u05e9\u05d9\u05dd \u05d8\u05d9\u05e4\u05d5\u05dc <\/li>\n\n\n\n<li>\u05e7\u05d9\u05d9\u05de\u05ea \u05ea\u05de\u05d9\u05db\u05d4 \u05d1\u05e9\u05e4\u05d5\u05ea \u05e8\u05d1\u05d5\u05ea: Javascript, Typescript, Python, Go, Java, Kotlin, Ruby<\/li>\n\n\n\n<li>\u05ea\u05de\u05d9\u05db\u05d4 \u05d1- Package Managers \u05d4\u05d1\u05d0\u05d9\u05dd: npm, yarn, pnpm , pip, Poetry , Maven<\/li>\n\n\n\n<li>\u05ea\u05de\u05d9\u05db\u05d4 \u05d1- SBOM<\/li>\n\n\n\n<li>\u05ea\u05de\u05d9\u05db\u05d4 \u05d1- IDEs &#8211; \u05db\u05d5\u05dc\u05dc VS Code \u05d5\u05e2\u05d5\u05d3<\/li>\n\n\n\n<li>\u05e7\u05d9\u05d9\u05dd \u05e4\u05ea\u05e8\u05d5\u05df SaaS \u05d5\u05d2\u05dd On-prem (\u05db\u05d5\u05dc\u05dc \u05e8\u05e9\u05ea \u05e1\u05d2\u05d5\u05e8\u05d4 air-gapped)<\/li>\n\n\n\n<li>\u05e7\u05dc \u05dc\u05d4\u05ea\u05e7\u05e0\u05d4<\/li>\n\n\n\n<li>\u05d9\u05e9 \u05d0\u05e4\u05e9\u05e8\u05d5\u05ea \u05dc\u05d4\u05ea\u05d7\u05d1\u05e8\u05d5\u05ea \u05d3\u05e8\u05da SSO<\/li>\n\n\n\n<li>\u05d9\u05e9\u05e0\u05d4 \u05d2\u05dd \u05de\u05d4\u05d3\u05d5\u05e8\u05d4 \u05d7\u05d9\u05e0\u05de\u05d9\u05ea<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u05d1\u05d9\u05df \u05d4\u05d7\u05d1\u05e8\u05d5\u05ea \u05d4\u05de\u05e9\u05ea\u05de\u05e9\u05d5\u05ea \u05d1\u05de\u05d5\u05e6\u05e8:<\/h3>\n\n\n\n<p>Metamask , Chia, Vercel, Figma \u05d5\u05e2\u05d5\u05d3, \u05d5\u05db\u05df \u05d2\u05dd \u05d7\u05d1\u05e8\u05d5\u05ea \u05d9\u05e9\u05e8\u05d0\u05dc\u05d9\u05d5\u05ea.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u05d1\u05e0\u05d5\u05e1\u05e3, \u05d0\u05e0\u05d5 (ALM-Toolbox) \u05e0\u05d5\u05db\u05dc \u05dc\u05e2\u05d6\u05d5\u05e8 \u05dc\u05da:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u05dc\u05d7\u05d1\u05e8 \u05d0\u05ea \u05d4\u05de\u05d5\u05e6\u05e8 \u05dc\u05ea\u05d4\u05dc\u05d9\u05db\u05d9 \u05e4\u05d9\u05ea\u05d5\u05d7 \u05d5\u05dc- IDEs<\/li>\n\n\n\n<li>\u05dc\u05d7\u05d1\u05e8 \u05d0\u05ea Socket \u05dc\u05db\u05dc\u05d9 Version control \u05e0\u05e4\u05d5\u05e6\u05d9\u05dd,<br>\u05db\u05d2\u05d5\u05df git, GitLab, GitHub, Bitbucket, Azure DevOps (\u05d5\u05e2\u05d5\u05d3)<\/li>\n\n\n\n<li>\u05dc\u05d7\u05d1\u05e8 \u05d0\u05ea Socket \u05dc\u05db\u05dc\u05d9 CI\/CD \u05e0\u05e4\u05d5\u05e6\u05d9\u05dd \u05d5\u05db\u05df \u05dc- CI pipelines<\/li>\n\n\n\n<li>\u05e0\u05d5\u05db\u05dc \u05dc\u05e2\u05d6\u05d5\u05e8 \u05d1\u05d4\u05ea\u05e7\u05e0\u05ea \u05d4\u05de\u05d5\u05e6\u05e8 (\u05d1\u05e1\u05d1\u05d9\u05d1\u05d5\u05ea \u05e1\u05d2\u05d5\u05e8\u05d5\u05ea \u05d0\u05d5 On-premises)<\/li>\n\n\n\n<li>\u05dc\u05d1\u05d3\u05d5\u05e7 \u05d0\u05ea \u05de\u05d9\u05d3\u05ea \u05d4\u05d4\u05ea\u05d0\u05de\u05d4 \u05e9\u05dc \u05d4\u05de\u05d5\u05e6\u05e8 \u05dc\u05e6\u05e8\u05db\u05d9 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e9\u05dc\u05da<\/li>\n\n\n\n<li>\u05dc\u05e1\u05e4\u05e7 \u05ea\u05de\u05d9\u05db\u05d4 \u05d1\u05e2\u05d1\u05e8\u05d9\u05ea \u05d5\u05d1\u05d9\u05e9\u05e8\u05d0\u05dc \u05dc- Socket<\/li>\n\n\n\n<li>\u05dc\u05db\u05dc\u05d5\u05dc \u05d0\u05d5\u05ea\u05d5 \u05d1\u05de\u05e1\u05d2\u05e8\u05ea \u05e4\u05ea\u05e8\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05ea \u05e7\u05d5\u05d3 \/ AppSec \u05db\u05d5\u05dc\u05dc<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-background\" style=\"background-color:#fbf0cf\"><em>\u05dc\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd, \u05dc\u05d4\u05ea\u05e0\u05e1\u05d5\u05ea \u05d1\u05de\u05d5\u05e6\u05e8 \u05d5\u05dc\u05e7\u05d1\u05dc\u05ea \u05de\u05d7\u05d9\u05e8\u05d9\u05dd &#8211; \u05e4\u05e0\u05d5 \u05d0\u05dc\u05d9\u05e0\u05d5:<\/em><br><em><a href=\"mailto:socket@almtoolbox.com\" target=\"_blank\" rel=\"noreferrer noopener\">socket@almtoolbox.com<\/a> \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea: 072-240-5222<\/em><\/h4>\n\n\n\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u05e1\u05e7\u05d9\u05e8\u05d4 \u05d8\u05db\u05e0\u05d9\u05ea \u05e2\u05dc Socket (\u05d0\u05d9\u05e0\u05e4\u05d5\u05d2\u05e8\u05e4\u05d9\u05e7\u05d4):<\/h3>\n\n\n\n<p>(\u05dc\u05d7\u05e6\u05d5 \u05dc\u05d4\u05d2\u05d3\u05dc\u05d4)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/05\/socket-overview.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"559\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/05\/socket-overview-1024x559.jpg\" alt=\"\" class=\"wp-image-12954\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/05\/socket-overview-1024x559.jpg 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/05\/socket-overview-300x164.jpg 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/05\/socket-overview-768x419.jpg 768w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2024\/05\/socket-overview.jpg 1408w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u05d4\u05d3\u05d2\u05de\u05d4: Introducing Socket<\/h2>\n\n\n\n<div style=\"padding:75% 0 0 0;position:relative;\"><iframe src=\"https:\/\/player.vimeo.com\/video\/971874523?h=c2eb60deee&amp;badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write\" style=\"position:absolute;top:0;left:0;width:100%;height:100%;\" title=\"Demo: Socket\"><\/iframe><\/div><script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d5\u05d5\u05e0\u05d8\u05d9\u05dd:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/socket.dev\/case-study\/vercel\">\u05e1\u05d9\u05e4\u05d5\u05e8 \u05dc\u05e7\u05d5\u05d7: \u05d7\u05d1\u05e8\u05ea <\/a><a href=\"https:\/\/socket.dev\/case-study\/vercel\" target=\"_blank\" rel=\"noreferrer noopener\">Verc<\/a><a href=\"https:\/\/socket.dev\/case-study\/vercel\">el<\/a><\/li>\n\n\n\n<li>\u05d4\u05e9\u05d5\u05d5\u05d0\u05ea \u05de\u05d4\u05d3\u05d5\u05e8\u05d5\u05ea Socket \u05d4\u05e9\u05d5\u05e0\u05d5\u05ea\u00a0(\u05de\u05e1\u05de\u05da \u05e9\u05dc\u05e0\u05d5 \u05dc\u05d4\u05d5\u05e8\u05d3\u05d4)<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">\u05d4\u05de\u05d0\u05de\u05e8 \u05e4\u05d5\u05e8\u05e1\u05dd \u05dc\u05e8\u05d0\u05e9\u05d5\u05e0\u05d4 \u05d1\u05de\u05d0\u05d9 2024. \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d7\u05e8\u05d5\u05df: \u05d3\u05e6\u05de\u05d1\u05e8 2025.<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>\u05d0\u05e0\u05d7\u05e0\u05d5 \u05e9\u05de\u05d7\u05d9\u05dd \u05dc\u05e2\u05d3\u05db\u05df \u05e9\u05d1\u05de\u05e1\u05d2\u05e8\u05ea \u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05d4- ALM \u05d5- DevSecOps \u05e9\u05dc\u05e0\u05d5,<br \/>\n\u05d0\u05e0\u05d5 \u05de\u05e6\u05d9\u05e2\u05d9\u05dd \u05db\u05e2\u05ea \u05d2\u05dd \u05d0\u05ea \u05d4\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Socket<\/p>\n","protected":false},"author":5,"featured_media":10651,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"[]"},"categories":[745,60,189,866,1037],"tags":[874,717,871,872,873,867,868,1036,855,535],"class_list":["post-10644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-appsec","category-devops","category-devsecops","category-sca","category-socket","tag-iast","tag-israel","tag-malicious-detection","tag-malware","tag-reachability","tag-socket-israel","tag-socket-dev","tag-supply-chan-attacks","tag-vs-code","tag-535"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/10644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=10644"}],"version-history":[{"count":26,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/10644\/revisions"}],"predecessor-version":[{"id":12962,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/10644\/revisions\/12962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/10651"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=10644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=10644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=10644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}