ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/beyondmachines1/statuses/114579450795268423", "type": "Note", "summary": null, "inReplyTo": null, "published": "2025-05-27T11:01:10Z", "url": "https://infosec.exchange/@beyondmachines1/114579450795268423", "attributedTo": "https://infosec.exchange/users/beyondmachines1", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/beyondmachines1/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/beyondmachines1/statuses/114579450795268423", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2025-05-27:objectId=275191897:objectType=Conversation", "content": "<p>Cursor app (and others) has bypass flaw of Transparency, Consent, and Control protections on macOS</p><p>Cybersecurity researcher Karol Mazurek discovered vulnerabilities in Electron-based applications like Cursor.app that allow malicious programs to bypass Apple&#39;s TCC privacy framework and gain unauthorized access to cameras, microphones, and sensitive files.</p><p>**Update Cursor to version 0.48.7 or later immediately to fix the TCC bypass vulnerability, and avoid granting camera or microphone permissions to code editors unless absolutely necessary. Be very cautious when prompted for permissions, as malware can now disguise itself as legitimate applications like Cursor or Visual Studio Code to trick you into allowing access to your private data.**<br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/knowledge\" class=\"mention hashtag\" rel=\"tag\">#<span>knowledge</span></a> <a href=\"https://infosec.exchange/tags/awareness\" class=\"mention hashtag\" rel=\"tag\">#<span>awareness</span></a><br /><a href=\"https://beyondmachines.net/event_details/cursor-app-has-bypass-flaw-of-transparency-consent-and-control-protections-on-macos-t-s-9-u-u/gD2P6Ple2L\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">beyondmachines.net/event_detai</span><span class=\"invisible\">ls/cursor-app-has-bypass-flaw-of-transparency-consent-and-control-protections-on-macos-t-s-9-u-u/gD2P6Ple2L</span></a></p>", "contentMap": { "en": "<p>Cursor app (and others) has bypass flaw of Transparency, Consent, and Control protections on macOS</p><p>Cybersecurity researcher Karol Mazurek discovered vulnerabilities in Electron-based applications like Cursor.app that allow malicious programs to bypass Apple&#39;s TCC privacy framework and gain unauthorized access to cameras, microphones, and sensitive files.</p><p>**Update Cursor to version 0.48.7 or later immediately to fix the TCC bypass vulnerability, and avoid granting camera or microphone permissions to code editors unless absolutely necessary. Be very cautious when prompted for permissions, as malware can now disguise itself as legitimate applications like Cursor or Visual Studio Code to trick you into allowing access to your private data.**<br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/knowledge\" class=\"mention hashtag\" rel=\"tag\">#<span>knowledge</span></a> <a href=\"https://infosec.exchange/tags/awareness\" class=\"mention hashtag\" rel=\"tag\">#<span>awareness</span></a><br /><a href=\"https://beyondmachines.net/event_details/cursor-app-has-bypass-flaw-of-transparency-consent-and-control-protections-on-macos-t-s-9-u-u/gD2P6Ple2L\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">beyondmachines.net/event_detai</span><span class=\"invisible\">ls/cursor-app-has-bypass-flaw-of-transparency-consent-and-control-protections-on-macos-t-s-9-u-u/gD2P6Ple2L</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/knowledge", "name": "#knowledge" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/awareness", "name": "#awareness" } ], "replies": { "id": "https://infosec.exchange/users/beyondmachines1/statuses/114579450795268423/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/beyondmachines1/statuses/114579450795268423/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/beyondmachines1/statuses/114579450795268423/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/beyondmachines1/statuses/114579450795268423/likes", "type": "Collection", "totalItems": 5 }, "shares": { "id": "https://infosec.exchange/users/beyondmachines1/statuses/114579450795268423/shares", "type": "Collection", "totalItems": 3 } }