A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/LMGsecurity/statuses/114636935924188054",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-06-06T14:40:24Z",
"url": "https://infosec.exchange/@LMGsecurity/114636935924188054",
"attributedTo": "https://infosec.exchange/users/LMGsecurity",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/LMGsecurity/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/LMGsecurity/statuses/114636935924188054",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2025-06-06:objectId=278559827:objectType=Conversation",
"content": "<p>AI is the new attack surface—are you ready?</p><p>From shadow AI to deepfake-driven threats, attackers are finding creative ways to exploit your organization’s AI tools, often without you realizing it.</p><p>Watch our new 3-minute video, How Attackers Target Your Company’s AI Tools, for advice on:</p><p> ▪️ The rise of shadow AI (yes, your team is probably using it!)<br /> ▪️ Real-world examples of AI misconfigurations and account takeovers<br /> ▪️ What to ask vendors about their AI usage<br /> ▪️ How to update your incident response plan for deepfakes<br /> ▪️ Actionable steps for AI risk assessments and inventories</p><p>Don’t let your AI deployment become your biggest security blind spot.</p><p>Watch now: <a href=\"https://youtu.be/R9z9A0eTvp0\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">youtu.be/R9z9A0eTvp0</span><span class=\"invisible\"></span></a></p><p><a href=\"https://infosec.exchange/tags/AIsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>AIsecurity</span></a> <a href=\"https://infosec.exchange/tags/ShadowAI\" class=\"mention hashtag\" rel=\"tag\">#<span>ShadowAI</span></a> <a href=\"https://infosec.exchange/tags/Deepfakes\" class=\"mention hashtag\" rel=\"tag\">#<span>Deepfakes</span></a> <a href=\"https://infosec.exchange/tags/AItools\" class=\"mention hashtag\" rel=\"tag\">#<span>AItools</span></a> <a href=\"https://infosec.exchange/tags/CyberRisk\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberRisk</span></a> <a href=\"https://infosec.exchange/tags/AI\" class=\"mention hashtag\" rel=\"tag\">#<span>AI</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/SMB\" class=\"mention hashtag\" rel=\"tag\">#<span>SMB</span></a> <a href=\"https://infosec.exchange/tags/CEO\" class=\"mention hashtag\" rel=\"tag\">#<span>CEO</span></a> <a href=\"https://infosec.exchange/tags/IncidentResponse\" class=\"mention hashtag\" rel=\"tag\">#<span>IncidentResponse</span></a> <a href=\"https://infosec.exchange/tags/GenAI\" class=\"mention hashtag\" rel=\"tag\">#<span>GenAI</span></a> <a href=\"https://infosec.exchange/tags/DataPrivacy\" class=\"mention hashtag\" rel=\"tag\">#<span>DataPrivacy</span></a> <a href=\"https://infosec.exchange/tags/Cyberaware\" class=\"mention hashtag\" rel=\"tag\">#<span>Cyberaware</span></a> <a href=\"https://infosec.exchange/tags/CISO\" class=\"mention hashtag\" rel=\"tag\">#<span>CISO</span></a></p>",
"contentMap": {
"en": "<p>AI is the new attack surface—are you ready?</p><p>From shadow AI to deepfake-driven threats, attackers are finding creative ways to exploit your organization’s AI tools, often without you realizing it.</p><p>Watch our new 3-minute video, How Attackers Target Your Company’s AI Tools, for advice on:</p><p> ▪️ The rise of shadow AI (yes, your team is probably using it!)<br /> ▪️ Real-world examples of AI misconfigurations and account takeovers<br /> ▪️ What to ask vendors about their AI usage<br /> ▪️ How to update your incident response plan for deepfakes<br /> ▪️ Actionable steps for AI risk assessments and inventories</p><p>Don’t let your AI deployment become your biggest security blind spot.</p><p>Watch now: <a href=\"https://youtu.be/R9z9A0eTvp0\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">youtu.be/R9z9A0eTvp0</span><span class=\"invisible\"></span></a></p><p><a href=\"https://infosec.exchange/tags/AIsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>AIsecurity</span></a> <a href=\"https://infosec.exchange/tags/ShadowAI\" class=\"mention hashtag\" rel=\"tag\">#<span>ShadowAI</span></a> <a href=\"https://infosec.exchange/tags/Deepfakes\" class=\"mention hashtag\" rel=\"tag\">#<span>Deepfakes</span></a> <a href=\"https://infosec.exchange/tags/AItools\" class=\"mention hashtag\" rel=\"tag\">#<span>AItools</span></a> <a href=\"https://infosec.exchange/tags/CyberRisk\" class=\"mention hashtag\" rel=\"tag\">#<span>CyberRisk</span></a> <a href=\"https://infosec.exchange/tags/AI\" class=\"mention hashtag\" rel=\"tag\">#<span>AI</span></a> <a href=\"https://infosec.exchange/tags/Cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>Cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/SMB\" class=\"mention hashtag\" rel=\"tag\">#<span>SMB</span></a> <a href=\"https://infosec.exchange/tags/CEO\" class=\"mention hashtag\" rel=\"tag\">#<span>CEO</span></a> <a href=\"https://infosec.exchange/tags/IncidentResponse\" class=\"mention hashtag\" rel=\"tag\">#<span>IncidentResponse</span></a> <a href=\"https://infosec.exchange/tags/GenAI\" class=\"mention hashtag\" rel=\"tag\">#<span>GenAI</span></a> <a href=\"https://infosec.exchange/tags/DataPrivacy\" class=\"mention hashtag\" rel=\"tag\">#<span>DataPrivacy</span></a> <a href=\"https://infosec.exchange/tags/Cyberaware\" class=\"mention hashtag\" rel=\"tag\">#<span>Cyberaware</span></a> <a href=\"https://infosec.exchange/tags/CISO\" class=\"mention hashtag\" rel=\"tag\">#<span>CISO</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/aisecurity",
"name": "#aisecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/shadowai",
"name": "#shadowai"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/deepfakes",
"name": "#deepfakes"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/aitools",
"name": "#aitools"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberrisk",
"name": "#cyberrisk"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/ai",
"name": "#ai"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/smb",
"name": "#smb"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/ceo",
"name": "#ceo"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/incidentresponse",
"name": "#incidentresponse"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/genai",
"name": "#genai"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/dataprivacy",
"name": "#dataprivacy"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cyberaware",
"name": "#cyberaware"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/ciso",
"name": "#ciso"
}
],
"replies": {
"id": "https://infosec.exchange/users/LMGsecurity/statuses/114636935924188054/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/LMGsecurity/statuses/114636935924188054/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/LMGsecurity/statuses/114636935924188054/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/LMGsecurity/statuses/114636935924188054/likes",
"type": "Collection",
"totalItems": 0
},
"shares": {
"id": "https://infosec.exchange/users/LMGsecurity/statuses/114636935924188054/shares",
"type": "Collection",
"totalItems": 1
}
}