A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"blurhash": "toot:blurhash",
"focalPoint": {
"@container": "@list",
"@id": "toot:focalPoint"
},
"Hashtag": "as:Hashtag"
}
],
"id": "https://mastodon.acm.org/users/AUSEJournal/statuses/112007896568520950/activity",
"type": "Create",
"actor": "https://mastodon.acm.org/users/AUSEJournal",
"published": "2024-02-28T07:21:07Z",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.acm.org/users/AUSEJournal/followers"
],
"object": {
"id": "https://mastodon.acm.org/users/AUSEJournal/statuses/112007896568520950",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2024-02-28T07:21:07Z",
"url": "https://mastodon.acm.org/@AUSEJournal/112007896568520950",
"attributedTo": "https://mastodon.acm.org/users/AUSEJournal",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://mastodon.acm.org/users/AUSEJournal/followers"
],
"sensitive": false,
"atomUri": "https://mastodon.acm.org/users/AUSEJournal/statuses/112007896568520950",
"inReplyToAtomUri": null,
"conversation": "tag:mastodon.acm.org,2024-02-28:objectId=11363395:objectType=Conversation",
"content": "<p>Looking for something to read? We suggest "An extensive study of the effects of different deep learning models on code vulnerability detection in Python code" by Rongcun Wang, Senlei Xu, Xingyu Ji, Yuan Tian, Lina Gon, and Ke Wang. </p><p>Read the <a href=\"https://mastodon.acm.org/tags/AutomatedSoftwareEngineering\" class=\"mention hashtag\" rel=\"tag\">#<span>AutomatedSoftwareEngineering</span></a> article at <a href=\"https://link.springer.com/article/10.1007/s10515-024-00413-4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">link.springer.com/article/10.1</span><span class=\"invisible\">007/s10515-024-00413-4</span></a> <a href=\"https://mastodon.acm.org/tags/DeepLearning\" class=\"mention hashtag\" rel=\"tag\">#<span>DeepLearning</span></a> <a href=\"https://mastodon.acm.org/tags/SoftwareVulnerability\" class=\"mention hashtag\" rel=\"tag\">#<span>SoftwareVulnerability</span></a> <a href=\"https://mastodon.acm.org/tags/Python\" class=\"mention hashtag\" rel=\"tag\">#<span>Python</span></a></p>",
"contentMap": {
"en": "<p>Looking for something to read? We suggest "An extensive study of the effects of different deep learning models on code vulnerability detection in Python code" by Rongcun Wang, Senlei Xu, Xingyu Ji, Yuan Tian, Lina Gon, and Ke Wang. </p><p>Read the <a href=\"https://mastodon.acm.org/tags/AutomatedSoftwareEngineering\" class=\"mention hashtag\" rel=\"tag\">#<span>AutomatedSoftwareEngineering</span></a> article at <a href=\"https://link.springer.com/article/10.1007/s10515-024-00413-4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">link.springer.com/article/10.1</span><span class=\"invisible\">007/s10515-024-00413-4</span></a> <a href=\"https://mastodon.acm.org/tags/DeepLearning\" class=\"mention hashtag\" rel=\"tag\">#<span>DeepLearning</span></a> <a href=\"https://mastodon.acm.org/tags/SoftwareVulnerability\" class=\"mention hashtag\" rel=\"tag\">#<span>SoftwareVulnerability</span></a> <a href=\"https://mastodon.acm.org/tags/Python\" class=\"mention hashtag\" rel=\"tag\">#<span>Python</span></a></p>"
},
"attachment": [
{
"type": "Document",
"mediaType": "image/webp",
"url": "https://mastodon.acm.org/system/media_attachments/files/112/007/895/795/522/301/original/b69d730e510b2eb2.webp",
"name": null,
"blurhash": "UCRpE~XQ9Y0drw-pV[$+-q?HxujFTENZNFOS",
"width": 1382,
"height": 487
}
],
"tag": [
{
"type": "Hashtag",
"href": "https://mastodon.acm.org/tags/automatedsoftwareengineering",
"name": "#automatedsoftwareengineering"
},
{
"type": "Hashtag",
"href": "https://mastodon.acm.org/tags/deeplearning",
"name": "#deeplearning"
},
{
"type": "Hashtag",
"href": "https://mastodon.acm.org/tags/softwarevulnerability",
"name": "#softwarevulnerability"
},
{
"type": "Hashtag",
"href": "https://mastodon.acm.org/tags/python",
"name": "#python"
}
],
"replies": {
"id": "https://mastodon.acm.org/users/AUSEJournal/statuses/112007896568520950/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://mastodon.acm.org/users/AUSEJournal/statuses/112007896568520950/replies?only_other_accounts=true&page=true",
"partOf": "https://mastodon.acm.org/users/AUSEJournal/statuses/112007896568520950/replies",
"items": []
}
},
"likes": {
"id": "https://mastodon.acm.org/users/AUSEJournal/statuses/112007896568520950/likes",
"type": "Collection",
"totalItems": 1
},
"shares": {
"id": "https://mastodon.acm.org/users/AUSEJournal/statuses/112007896568520950/shares",
"type": "Collection",
"totalItems": 0
}
}
}