A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"Hashtag": "as:Hashtag"
}
],
"id": "https://ieji.de/users/LorenzoAncora/statuses/114081805969054549",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-02-28T13:43:33Z",
"url": "https://ieji.de/@LorenzoAncora/114081805969054549",
"attributedTo": "https://ieji.de/users/LorenzoAncora",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://ieji.de/users/LorenzoAncora/followers"
],
"sensitive": false,
"atomUri": "https://ieji.de/users/LorenzoAncora/statuses/114081805969054549",
"inReplyToAtomUri": null,
"conversation": "tag:ieji.de,2025-02-28:objectId=156593332:objectType=Conversation",
"content": "<p>GNU Emacs: new critical remote shell injection vulnerability.</p><p>Red Hat discovered a command injection flaw in the text editor Emacs. It allows a remote, unauthenticated attacker to execute any command on your computer. The vulnerability is activated when you visit a malicious website or link.</p><p><a href=\"https://www.cve.org/CVERecord?id=CVE-2025-1244\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">cve.org/CVERecord?id=CVE-2025-</span><span class=\"invisible\">1244</span></a></p><p>---</p><p><a href=\"https://ieji.de/tags/news\" class=\"mention hashtag\" rel=\"tag\">#<span>news</span></a> <a href=\"https://ieji.de/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> <a href=\"https://ieji.de/tags/gnu\" class=\"mention hashtag\" rel=\"tag\">#<span>gnu</span></a> <a href=\"https://ieji.de/tags/emacs\" class=\"mention hashtag\" rel=\"tag\">#<span>emacs</span></a> <a href=\"https://ieji.de/tags/security\" class=\"mention hashtag\" rel=\"tag\">#<span>security</span></a> <a href=\"https://ieji.de/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://ieji.de/tags/terminal\" class=\"mention hashtag\" rel=\"tag\">#<span>terminal</span></a> <a href=\"https://ieji.de/tags/linux\" class=\"mention hashtag\" rel=\"tag\">#<span>linux</span></a> <a href=\"https://ieji.de/tags/cve\" class=\"mention hashtag\" rel=\"tag\">#<span>cve</span></a> <a href=\"https://ieji.de/tags/opensource\" class=\"mention hashtag\" rel=\"tag\">#<span>opensource</span></a> <a href=\"https://ieji.de/tags/freesoftware\" class=\"mention hashtag\" rel=\"tag\">#<span>freesoftware</span></a> </p><p>---</p><p>Mitigation: uninstall/update immediately.</p>",
"contentMap": {
"en": "<p>GNU Emacs: new critical remote shell injection vulnerability.</p><p>Red Hat discovered a command injection flaw in the text editor Emacs. It allows a remote, unauthenticated attacker to execute any command on your computer. The vulnerability is activated when you visit a malicious website or link.</p><p><a href=\"https://www.cve.org/CVERecord?id=CVE-2025-1244\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://www.</span><span class=\"ellipsis\">cve.org/CVERecord?id=CVE-2025-</span><span class=\"invisible\">1244</span></a></p><p>---</p><p><a href=\"https://ieji.de/tags/news\" class=\"mention hashtag\" rel=\"tag\">#<span>news</span></a> <a href=\"https://ieji.de/tags/software\" class=\"mention hashtag\" rel=\"tag\">#<span>software</span></a> <a href=\"https://ieji.de/tags/gnu\" class=\"mention hashtag\" rel=\"tag\">#<span>gnu</span></a> <a href=\"https://ieji.de/tags/emacs\" class=\"mention hashtag\" rel=\"tag\">#<span>emacs</span></a> <a href=\"https://ieji.de/tags/security\" class=\"mention hashtag\" rel=\"tag\">#<span>security</span></a> <a href=\"https://ieji.de/tags/hacking\" class=\"mention hashtag\" rel=\"tag\">#<span>hacking</span></a> <a href=\"https://ieji.de/tags/terminal\" class=\"mention hashtag\" rel=\"tag\">#<span>terminal</span></a> <a href=\"https://ieji.de/tags/linux\" class=\"mention hashtag\" rel=\"tag\">#<span>linux</span></a> <a href=\"https://ieji.de/tags/cve\" class=\"mention hashtag\" rel=\"tag\">#<span>cve</span></a> <a href=\"https://ieji.de/tags/opensource\" class=\"mention hashtag\" rel=\"tag\">#<span>opensource</span></a> <a href=\"https://ieji.de/tags/freesoftware\" class=\"mention hashtag\" rel=\"tag\">#<span>freesoftware</span></a> </p><p>---</p><p>Mitigation: uninstall/update immediately.</p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://ieji.de/tags/news",
"name": "#news"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/software",
"name": "#software"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/gnu",
"name": "#gnu"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/emacs",
"name": "#emacs"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/security",
"name": "#security"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/hacking",
"name": "#hacking"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/terminal",
"name": "#terminal"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/linux",
"name": "#linux"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/cve",
"name": "#cve"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/opensource",
"name": "#opensource"
},
{
"type": "Hashtag",
"href": "https://ieji.de/tags/freesoftware",
"name": "#freesoftware"
}
],
"replies": {
"id": "https://ieji.de/users/LorenzoAncora/statuses/114081805969054549/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://ieji.de/users/LorenzoAncora/statuses/114081805969054549/replies?only_other_accounts=true&page=true",
"partOf": "https://ieji.de/users/LorenzoAncora/statuses/114081805969054549/replies",
"items": []
}
},
"likes": {
"id": "https://ieji.de/users/LorenzoAncora/statuses/114081805969054549/likes",
"type": "Collection",
"totalItems": 13
},
"shares": {
"id": "https://ieji.de/users/LorenzoAncora/statuses/114081805969054549/shares",
"type": "Collection",
"totalItems": 16
}
}