{"id":2188,"date":"2025-12-15T11:59:57","date_gmt":"2025-12-15T14:59:57","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2188"},"modified":"2025-12-15T11:59:57","modified_gmt":"2025-12-15T14:59:57","slug":"the-growing-risk-of-open-source-code-and-libraries","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/","title":{"rendered":"O crescente risco do uso de c\u00f3digos open source e bibliotecas abertas"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As bibliotecas open source (c\u00f3digo aberto) e APIs de uso livre t\u00eam sido amplamente adotadas pela comunidade de desenvolvedores devido a sua facilidade de acesso, flexibilidade e colabora\u00e7\u00e3o entre os membros do setor. Essas ferramentas fornecem uma ampla gama de funcionalidades pr\u00e9-desenvolvidas, permitindo que os programadores economizem tempo e esfor\u00e7o em seus projetos. No entanto, a ado\u00e7\u00e3o generalizada desses recursos tamb\u00e9m tem gerado um aumento no n\u00famero de riscos cibern\u00e9ticos associados a eles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">De acordo com um levantamento realizado pela Synopsys, 97% das aplica\u00e7\u00f5es existentes adotam ao menos um trecho de um projeto de c\u00f3digo aberto e 90% das corpora\u00e7\u00f5es empregam esse tipo de recurso em produtos comerciais para o p\u00fablico final \u2014 seja ele B2B (corporativo) ou B2C (pessoa f\u00edsica). A ideia \u00e9 acelerar o pipeline de desenvolvimento, automatizando grande parte do trabalho dos desenvolvedores ao utilizar funcionalidades e recursos j\u00e1 existentes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infelizmente, os criminosos cibern\u00e9ticos tamb\u00e9m j\u00e1 identificaram essa tend\u00eancia e est\u00e3o tirando proveito deste cen\u00e1rio, ligando, assim, o sinal de alerta para um uso mais consciente de c\u00f3digos abertos.<\/span><\/p>\n<h2><b>Envenenando o po\u00e7o de \u00e1gua<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Uma das principais preocupa\u00e7\u00f5es com o uso de bibliotecas e APIs open source \u00e9 a possibilidade de conterem vulnerabilidades e brechas de seguran\u00e7a desconhecidas. Por conta da natureza aberta desses recursos, qualquer pessoa pode contribuir com o c\u00f3digo, o que significa que nem sempre h\u00e1 um controle rigoroso sobre sua qualidade e seguran\u00e7a. Uma vulnerabilidade n\u00e3o detectada em uma biblioteca de c\u00f3digo aberto pode ser explorada por atacantes para comprometer a seguran\u00e7a de um sistema ou aplicativo que a utilize.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Outro ponto cr\u00edtico \u00e9 a complexidade das depend\u00eancias entre bibliotecas e APIs. Muitas vezes, um software pode depender de v\u00e1rias bibliotecas de c\u00f3digo aberto, que, por sua vez, podem depender de outras bibliotecas. Dessa maneira, cria-se uma cadeia de confian\u00e7a na qual qualquer vulnerabilidade em uma biblioteca pode se propagar para outras partes do sistema. Al\u00e9m disso, \u00e9 comum que os desenvolvedores n\u00e3o atualizem regularmente suas bibliotecas e depend\u00eancias, tornando o sistema vulner\u00e1vel a amea\u00e7as conhecidas e corrigidas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por fim, precisamos nos preocupar ainda com a possibilidade de inclus\u00e3o de c\u00f3digo malicioso. Embora a maioria das contribui\u00e7\u00f5es seja leg\u00edtima e bem-intencionada, um desenvolvedor malicioso pode introduzir um c\u00f3digo comprometido em uma biblioteca, que ser\u00e1 distribu\u00eddo amplamente aos usu\u00e1rios para envenenar projetos. Al\u00e9m disso, as APIs podem ser exploradas por criminosos para realizar ataques de inje\u00e7\u00e3o de c\u00f3digo, como SQL injection ou cross-site scripting (XSS), comprometendo a integridade dos sistemas.<\/span><\/p>\n<h2><b>Dicas de boas pr\u00e1ticas<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Diante desses riscos, \u00e9 fundamental adotar medidas de seguran\u00e7a para mitigar as amea\u00e7as cibern\u00e9ticas. Algumas boas pr\u00e1ticas incluem:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avaliar a reputa\u00e7\u00e3o e a comunidade de desenvolvedores da biblioteca ou API antes de adot\u00e1-la;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Manter todas as bibliotecas e depend\u00eancias atualizadas, aplicando patches de seguran\u00e7a regularmente;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Realizar auditorias de seguran\u00e7a no c\u00f3digo-fonte das bibliotecas de c\u00f3digo aberto;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implementar mecanismos de controle de acesso e autentica\u00e7\u00e3o adequados nas APIs abertas;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Utilizar ferramentas de an\u00e1lise est\u00e1tica de c\u00f3digo e scanners de vulnerabilidades para identificar poss\u00edveis problemas de seguran\u00e7a;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Estabelecer pol\u00edticas de revis\u00e3o de c\u00f3digo e testes rigorosos para todas as bibliotecas e APIs utilizadas.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Com algumas medidas simples, \u00e9 poss\u00edvel aproveitar os benef\u00edcios desses recursos de maneira consciente e segura, sem colocar toda a sua esteira de desenvolvimento em risco.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Open-source libraries and free-to-use APIs have been widely adopted by the developer community thanks to their ease of access, flexibility, and collaboration among industry members. These tools provide a wide range of pre-developed functionalities, saving programmers time and effort on their projects. However, the widespread adoption of these resources has also led to an increase [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2189,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[64,132,131],"class_list":["post-2188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-open-source","tag-open-source-libraries"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The growing risk of open-source code and libraries | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Explore the growing security risks of open-source code and libraries, and learn best practices to safely use APIs and dependencies .\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The growing risk of open-source code and libraries | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Explore the growing security risks of open-source code and libraries, and learn best practices to safely use APIs and dependencies .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-15T14:59:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"The growing risk of open-source code and libraries\",\"datePublished\":\"2025-12-15T14:59:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/\"},\"wordCount\":486,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png\",\"keywords\":[\"cybersecurity\",\"open-source\",\"open-source libraries\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/\",\"name\":\"The growing risk of open-source code and libraries | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png\",\"datePublished\":\"2025-12-15T14:59:57+00:00\",\"description\":\"Explore the growing security risks of open-source code and libraries, and learn best practices to safely use APIs and dependencies .\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png\",\"width\":1500,\"height\":1000,\"caption\":\"open source libraries\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The growing risk of open-source code and libraries\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The growing risk of open-source code and libraries | Hacker Rangers","description":"Explore the growing security risks of open-source code and libraries, and learn best practices to safely use APIs and dependencies .","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"The growing risk of open-source code and libraries | Hacker Rangers","og_description":"Explore the growing security risks of open-source code and libraries, and learn best practices to safely use APIs and dependencies .","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-15T14:59:57+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"The growing risk of open-source code and libraries","datePublished":"2025-12-15T14:59:57+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/"},"wordCount":486,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png","keywords":["cybersecurity","open-source","open-source libraries"],"articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/","name":"The growing risk of open-source code and libraries | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png","datePublished":"2025-12-15T14:59:57+00:00","description":"Explore the growing security risks of open-source code and libraries, and learn best practices to safely use APIs and dependencies .","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/open-source-libraries.png","width":1500,"height":1000,"caption":"open source libraries"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/the-growing-risk-of-open-source-code-and-libraries\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"The growing risk of open-source code and libraries"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2188"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2188\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2189"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}