{"id":435,"date":"2026-04-02T13:29:47","date_gmt":"2026-04-02T13:29:47","guid":{"rendered":"https:\/\/cybercolombia.co\/index.php\/2026\/04\/02\/the-state-of-trusted-open-source-report-cyberdefensa-mx\/"},"modified":"2026-04-02T13:29:47","modified_gmt":"2026-04-02T13:29:47","slug":"the-state-of-trusted-open-source-report-cyberdefensa-mx","status":"publish","type":"post","link":"https:\/\/cybercolombia.co\/index.php\/2026\/04\/02\/the-state-of-trusted-open-source-report-cyberdefensa-mx\/","title":{"rendered":"The State of Trusted Open Source Report \u2013 CYBERDEFENSA.MX"},"content":{"rendered":"<div id=\"articlebody\">\n<p>In <a href=\"https:\/\/www.chainguard.dev\/unchained\/the-state-of-trusted-open-source-december-2025\">December\u00a02025<\/a>, we shared the first-ever <em>The State of Trusted Open\u00a0Source<\/em> report, featuring insights from our product data and customer base on open source consumption across our catalog of container image projects, versions, images, language libraries, and builds. These\u00a0insights shed light on what teams pull, deploy, and maintain day to day, alongside the vulnerabilities and remediation realities these projects\u00a0face.<\/p>\n<p>Fast forward a few months, and software development is accelerating at a pace that most didn\u2019t see coming. AI\u00a0is increasingly embedded across the development lifecycle, from code generation to infrastructure automation, as models become more advanced and better at meeting the demands of modern work. This\u00a0shift is expanding what teams can build and how quickly they can\u00a0ship.<\/p>\n<p>It is also reshaping the security landscape.<\/p>\n<p>Before diving into the numbers, it\u2019s important to explain how we perform this analysis. We\u00a0examined over 2,200 unique container image projects, 33,931 total vulnerability instances, and 377 unique CVEs from December 1, 2026, through February 28, 2026. When\u00a0we use terms like \u201ctop 20 projects\u201d and \u201clong tail projects\u201d (as defined by images outside of the top 20), we\u2019re referring to real usage patterns observed across our customer portfolio and in production\u00a0pulls.<\/p>\n<p>In this report, we noticed a few new themes that point to this shift. These\u00a0themes built on the trends from our last report, ultimately showcasing the impact of increased AI-driven development both in the types of container images being used and in the number of CVEs being discovered and remediated:<\/p>\n<ul>\n<li><strong>Python and PostgreSQL growth reflects AI-driven development: <\/strong>Python remains the most popular image (72.1% of all customers use it), and PostgreSQL saw a 73% increase in usage quarter-over-quarter, underscoring the growing adoption of a modern AI stack across various use cases.<\/li>\n<li><strong>The modern platform stack is becoming increasingly standardized:<\/strong> Across Chainguard customers, language ecosystem images account for more than half of the top 25 images used in production.<\/li>\n<li><strong>Chainguard Base is becoming a foundation for developer tooling: <\/strong>The <a href=\"https:\/\/images.chainguard.dev\/directory\/image\/chainguard-base\/versions\">chainguard-base<\/a> image, a minimal distroless base image without any toolchain or apps, was the 5th most-used Chainguard image, as customers use it as a sort of \u201cutility belt\u201d for their specific use cases (over 75% of Chainguard customers customize at least one image).<\/li>\n<li><strong>AI is accelerating software development and vulnerability discovery: <\/strong>We applied over 300% more fixes in Chainguard Containers and saw a 145% increase in vulnerabilities from last quarter, signaling the use of AI to push more code and discover more CVEs.<\/li>\n<li><strong>The long tail continues to define real-world risk:<\/strong> 96% of the vulnerabilities found and remediated in Chainguard Containers occurred outside of the top 20 most popular projects\u2014this is consistent with the findings from December.<\/li>\n<li><strong>Compliance continues to drive adoption of trusted open source: <\/strong>We saw the same themes from December present here, underscored by a FIPS-compliant variant of a Chainguard container image entering the top 10 images by customer count for the first time.<\/li>\n<\/ul>\n<h2><strong>Usage: What teams actually run in production<\/strong><\/h2>\n<p>We identified multiple themes centered on the prevalence of AI in code generation across regions and industries. This\u00a0prevalence leads to greater adoption of the Python language ecosystem and adjacent technologies on the usage\u00a0side.<\/p>\n<h3><strong>Most popular images: Python and PostgreSQL growth reflect AI-driven development<\/strong><\/h3>\n<h4><strong>PostgreSQL usage grew 73% quarter-over-quarter<\/strong><\/h4>\n<p>The images that saw the strongest growth this quarter closely align with the technologies driving AI\u00a0adoption.<\/p>\n<p>Python remains the most widely deployed image across Chainguard customers. When\u00a0combining FIPS\u00a0(<a href=\"https:\/\/edu.chainguard.dev\/chainguard\/fips\/understanding-fips\/\">Federal Information Processing\u00a0Standards<\/a>) and non-FIPS\u00a0variants, <strong>72.1% of Chainguard customers are using a Python\u00a0image<\/strong>. This\u00a0reflects Python\u2019s role as the default language for machine learning, data pipelines, and automation. What\u00a0was once concentrated in experimentation environments is now moving into production systems across industries.<\/p>\n<p>Node continues to anchor application infrastructure, with 60.7% of Chainguard customers utilizing it in their environments. Together, Python and Node define the dominant runtime layer for modern applications.<\/p>\n<p>The most notable change this quarter is in databases. <strong>PostgreSQL usage grew by 73% quarter over\u00a0quarter<\/strong>, the largest increase among widely deployed\u00a0images.<\/p>\n<p>This growth aligns with broader trends in AI workloads. PostgreSQL is increasingly used as a foundation for vector search and retrieval-augmented generation, supported by extensions that enable embedding storage and similarity queries. As\u00a0AI moves into production, databases are evolving alongside application\u00a0runtimes.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhQWHxcADfyKi2OPBU33MK0457o25ZDZSQcXMvZMo2I3lW061xKuUCSnm9flWkxIC8x3JIAG8YBEbCWgHBycZXKdyMFPgAyygbakMmIyWyjsSS_aIuOUiKXZilhFVg76YR8lU0BsABITkYua7G6wau2I4Vt-qgpYZU6BojKqUTsZo4XfuVejsg7tc7UV0M\/s1700-e365\/1.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhQWHxcADfyKi2OPBU33MK0457o25ZDZSQcXMvZMo2I3lW061xKuUCSnm9flWkxIC8x3JIAG8YBEbCWgHBycZXKdyMFPgAyygbakMmIyWyjsSS_aIuOUiKXZilhFVg76YR8lU0BsABITkYua7G6wau2I4Vt-qgpYZU6BojKqUTsZo4XfuVejsg7tc7UV0M\/s1700-e365\/1.png\" alt=\"\" border=\"0\" data-original-height=\"900\" data-original-width=\"1600\"\/><\/a><\/div>\n<h3><strong>The modern platform stack\u00a0is converging<\/strong><\/h3>\n<h4><strong>Over 50% of the most popular images are\u00a0language ecosystems<\/strong><\/h4>\n<p>This quarter, the data showed that production environments are converging around a consistent set of foundational components.<\/p>\n<p><strong>Language ecosystems account for more than half of the top 25 images used across\u00a0customers<\/strong>. Python\u00a0(72.1% of all customers), Node (60.7%), Java (44.4%), Go (42.8%), and .NET\u00a0(27%) continue to define the runtime layer, with growth across each ecosystem.<\/p>\n<p>Outside of runtimes, teams are standardizing on a familiar set of cloud-native components. Traffic management tools such as nginx and service mesh components remain widely deployed. Monitoring systems built around Prometheus continue to expand. Deployment workflows are increasingly anchored in GitOps tools such as ArgoCD and\u00a0kubectl.<\/p>\n<p>The result is a layered architecture that is broadly consistent across organizations. A\u00a0small number of runtimes, a shared set of operational components, and a large and highly variable long tail of supporting dependencies.<\/p>\n<p>Standardization is happening at the platform level, even as application-specific variation continues to\u00a0grow.<\/p>\n<h3><strong>Chainguard Base is becoming a foundation for developer\u00a0tooling<\/strong><\/h3>\n<h4><strong>Chainguard-base was the 5th most-deployed image by\u00a0customer count<\/strong><\/h4>\n<p><a href=\"https:\/\/images.chainguard.dev\/directory\/image\/chainguard-base\/versions\">Chainguard\u00a0Base<\/a> is a minimal distroless base image without any toolchain or applications. It\u00a0is designed to provide a secure foundation that teams can extend with only the components they\u00a0need.<\/p>\n<p>This quarter, it was\u00a0the <strong>5th-most-deployed image by customer\u00a0count<\/strong>, used by 36.3% of customers across FIPS and non-FIPS\u00a0variants.<\/p>\n<p>Its role becomes clearer when looking at customization patterns. Across\u00a0all customized repositories, 95% include added packages,\u00a0and <strong>more than three-quarters of customers customize at least one\u00a0image<\/strong>.<\/p>\n<p>When organizations customize Chainguard Containers, the most frequently added packages are developer and operational utilities such as curl, bash, jq, git, and cloud tooling. These\u00a0are not full application stacks. They\u00a0are the tools needed to build, debug, and operate\u00a0software.<\/p>\n<p>This demonstrates a consistent pattern: teams use Chainguard Base as a secure starting point, then layer in the exact tooling required for their workflows. It\u00a0is serving as a flexible foundation for CI\/CD pipelines, debugging environments, and internal platform\u00a0tooling.<\/p>\n<p>As platform engineering practices mature, the need for secure, customizable base environments is becoming more pronounced. Chainguard Base is emerging as a core building block in that\u00a0model.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMHMAshu3hyphenhyphen2GP05eol4TuDt4yAoS5tMXCugbPhCcaOKM9ef5SU_qpL3pH031MRBcNEKMO5-uHUvOHyTM4ZbMNVF0iFkOwFXFoYoiWTV4AovTh8dRseBtaaGGg4V46g7dYjNO2_a3quAypSIWEl_g6tIHlVT0FbPNBdB1wcwQemW8bwjl9QWU-uYVj9Kc\/s1700-e365\/2.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMHMAshu3hyphenhyphen2GP05eol4TuDt4yAoS5tMXCugbPhCcaOKM9ef5SU_qpL3pH031MRBcNEKMO5-uHUvOHyTM4ZbMNVF0iFkOwFXFoYoiWTV4AovTh8dRseBtaaGGg4V46g7dYjNO2_a3quAypSIWEl_g6tIHlVT0FbPNBdB1wcwQemW8bwjl9QWU-uYVj9Kc\/s1700-e365\/2.png\" alt=\"\" border=\"0\" data-original-height=\"900\" data-original-width=\"1600\"\/><\/a><\/div>\n<h2><strong>CVEs: AI is accelerating software development and vulnerability\u00a0discovery<\/strong><\/h2>\n<h3><strong>Over 300% more fix instances this\u00a0quarter<\/strong><\/h3>\n<p>Just as we observed on the usage side with the increase in Python and PostgreSQL container images, AI is also changing the speed at which vulnerabilities\u00a0surface.<\/p>\n<p>In the previous report, we tracked 154 unique CVEs and 10,100 fix instances across Chainguard Containers. This\u00a0quarter, that number rose to 377 unique CVEs and 33,931 fix instances\u00a0(<strong>a 145% increase in unique vulnerabilities and over 300% more fixes applied compared to last\u00a0quarter<\/strong>).<\/p>\n<p>This increase reflects two parallel forces: 1) development is becoming faster and more distributed, which increases the number of dependencies entering production environments; and 2) vulnerability discovery is accelerating as researchers and attackers use automation and AI-assisted techniques to analyze code at\u00a0scale.<\/p>\n<p>The result is a tighter feedback loop between development and security. More\u00a0code is being written, more dependencies are being introduced, and more vulnerabilities are being identified across the ecosystem.<\/p>\n<p>What stands out is not only the increase in volume, but the Chainguard Factory\u2019s ability to respond to\u00a0it. <strong>Median remediation time held essentially flat at 2.0\u00a0days compared to 1.96\u00a0days last quarter, despite the much higher\u00a0volume<\/strong>. High-severity vulnerabilities continued to be resolved quickly, with 97.9% fixed within one\u00a0week.<\/p>\n<p>The pace of discovery is increasing. The\u00a0expectation for response is keeping\u00a0up.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMXMDBp_3TVQjQnYcQGaXgiQzxWom6ozLsnTjKvRVyoMSQFh-V05hlOdxoVtMDcezvDFU5-wARcxAc75iJ1qyU-h6abfU2nRlju1Gp_OuuqGk0QMSObU-y0nSkkwXmeE4c_AfEMXmTeHdRuahdYW8AW7q9b6XQVR9kCq0AZVPOO3CvGHuS_niqwqo8l3Y\/s1700-e365\/3.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMXMDBp_3TVQjQnYcQGaXgiQzxWom6ozLsnTjKvRVyoMSQFh-V05hlOdxoVtMDcezvDFU5-wARcxAc75iJ1qyU-h6abfU2nRlju1Gp_OuuqGk0QMSObU-y0nSkkwXmeE4c_AfEMXmTeHdRuahdYW8AW7q9b6XQVR9kCq0AZVPOO3CvGHuS_niqwqo8l3Y\/s1700-e365\/3.png\" alt=\"\" border=\"0\" data-original-height=\"900\" data-original-width=\"1600\"\/><\/a><\/div>\n<h2><strong>The long tail continues to define real-world risk<\/strong><\/h2>\n<h3><strong>96% of CVEs occur outside the most popular\u00a0images<\/strong><\/h3>\n<p>While core infrastructure is becoming more standardized, most of the software supply chain lives outside the most visible components. Let\u00a0us explain: the median customer sources about 74% of their images from the long tail of the catalog (images outside the top 20 in popularity). This\u00a0reflects the reality that production environments extend far beyond a small set of widely used\u00a0images.<\/p>\n<p>Security risk follows the same\u00a0pattern.<\/p>\n<p>This\u00a0quarter, <strong>96.2% of CVE instances occurred outside the top 20 most widely used\u00a0images<\/strong>. This\u00a0is consistent with the previous report, which found that nearly all vulnerabilities were concentrated in long-tail\u00a0projects.<\/p>\n<p>The implication is straightforward: the images that teams interact with most frequently represent only a small portion of their actual exposure. The\u00a0majority of vulnerabilities exist in dependencies that are less visible, less frequently updated, and often not directly owned by application\u00a0teams.<\/p>\n<p>Even across severity levels, the distribution holds. Critical, High, Medium, and Low vulnerabilities all follow the same pattern, with the overwhelming majority (96.18% on average) occurring outside the top 20 images. Attackers know what is popular, so they tend to look for vulnerable areas that are outside most users\u2019 top-of-mind.<\/p>\n<p>As development accelerates and dependency graphs expand, managing the long tail becomes the central challenge of software supply chain\u00a0security.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJkh79Fu0ijue9HuKoezObP6t6cW628lJrUOnDiIZGbpGdU79lZ79rL6Yb7ngPM8xIZDMD5rrgiKq_uO5XQe0zwu0PlMg6yxwgdxWATcwpLbP6EEY8pv3X5fcVkdwBuWmsFZD1WLc5IeHwPaPOvpD1v8UbdVzNuayLCWhBLiAzFmPSINSREKckWeTk0-s\/s1700-e365\/4.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJkh79Fu0ijue9HuKoezObP6t6cW628lJrUOnDiIZGbpGdU79lZ79rL6Yb7ngPM8xIZDMD5rrgiKq_uO5XQe0zwu0PlMg6yxwgdxWATcwpLbP6EEY8pv3X5fcVkdwBuWmsFZD1WLc5IeHwPaPOvpD1v8UbdVzNuayLCWhBLiAzFmPSINSREKckWeTk0-s\/s1700-e365\/4.png\" alt=\"\" border=\"0\" data-original-height=\"900\" data-original-width=\"1600\"\/><\/a><\/div>\n<h2><strong>Compliance is reshaping\u00a0adoption patterns<\/strong><\/h2>\n<p>Regulatory requirements are increasingly influencing how organizations build and deploy\u00a0software.<\/p>\n<p>This quarter marks the first time a FIPS-compliant Chainguard image\u00a0(<a href=\"https:\/\/images.chainguard.dev\/directory\/image\/python-fips\/versions\">python-fips<\/a>) has reached the top 10 by customer count, even when FIPS and non-FIPS variants are combined into a single metric. This\u00a0milestone reflects a broader shift toward compliance-driven\u00a0adoption.<\/p>\n<p>FIPS adoption is increasing across multiple runtimes. Python\u00a0FIPS, Node FIPS, and nginx FIPS images all saw growth in customer counts over the\u00a0quarter.<\/p>\n<p>Overall, <strong>42% of customers now run at least one FIPS image in production<\/strong>.<\/p>\n<p>This reflects the growing influence of frameworks such as FedRAMP, PCI DSS, SOC 2, and the EU Cyber Resilience Act. Compliance is no longer limited to a subset of industries. It\u00a0is becoming a baseline requirement for software that operates in regulated environments.<\/p>\n<p>As a result, secure and compliant images are moving from optional to\u00a0expected.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhvoqF-BtgaPzW6Qm_wnpX_pQTeB9OB0sc4y4ivLHSNtKBeT6aLO4mti20Cztl0yIz_ieE5i4eXEG44LXjWpCrMs48alw2fkDROLUASpDNOvVrnmlUiutXF1MPyCyn9r3w4zcMJw4e2Ue13HKWKwlmeNW7Kq0N9czKBykqebieinjrbPfxV5S_dk2nqu-g\/s1700-e365\/5.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhvoqF-BtgaPzW6Qm_wnpX_pQTeB9OB0sc4y4ivLHSNtKBeT6aLO4mti20Cztl0yIz_ieE5i4eXEG44LXjWpCrMs48alw2fkDROLUASpDNOvVrnmlUiutXF1MPyCyn9r3w4zcMJw4e2Ue13HKWKwlmeNW7Kq0N9czKBykqebieinjrbPfxV5S_dk2nqu-g\/s1700-e365\/5.png\" alt=\"\" border=\"0\" data-original-height=\"900\" data-original-width=\"1600\"\/><\/a><\/div>\n<h2><strong>A secure foundation for the AI\u00a0era<\/strong><\/h2>\n<p>The data from this quarter points to a clear trend. Software ecosystems are expanding. The\u00a0number of unique images in use grew by 18%, reflecting broader adoption and more diverse workloads. At\u00a0the same time, vulnerability discovery increased significantly, with\u00a0a <strong>145% rise in unique\u00a0CVEs<\/strong> and a 3x increase in\u00a0fixes.<\/p>\n<p>Despite that growth, Chainguard\u2019s remediation performance remained stable. Median\u00a0fix times held steady, and high-severity vulnerabilities continued to be resolved quickly. This\u00a0combination matters. It\u00a0shows that it is possible to scale both coverage and responsiveness simultaneously.<\/p>\n<p>As AI continues to accelerate development, the volume of code and dependencies will grow. The\u00a0challenge for security teams is not simply to keep up with that growth, but to manage it in a way that maintains consistency and trust. The\u00a0organizations that succeed will be those that treat security as part of the development system itself, rather than as a layer applied afterward.<\/p>\n<p>At Chainguard, we recognize the challenges that security and engineering teams face as AI technology becomes increasingly ubiquitous. We\u00a0recently announced products such\u00a0as <a href=\"https:\/\/www.chainguard.dev\/unchained\/introducing-chainguard-agent-skills\">Chainguard Agent\u00a0Skills<\/a>\u00a0and <a href=\"https:\/\/www.chainguard.dev\/unchained\/introducing-chainguard-actions\">Chainguard\u00a0Actions<\/a> to address this problem directly. As\u00a0development speeds up, organizations must address hidden attack vectors throughout the software development lifecycle. The\u00a0trusted open source we offer creates a secure-by-default foundation you can build\u00a0on.<\/p>\n<p><em>Ready to learn more about how Chainguard can protect your open source artifacts? <a href=\"https:\/\/www.chainguard.dev\/contact\">Get in\u00a0touch<\/a> with our team\u00a0today.<\/em><\/p>\n<div class=\"cf note-b\">Found this article interesting? <span class=\"\">This article is a contributed piece from one of our valued partners.<\/span> Follow us on <a href=\"https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ\" rel=\"noopener\" target=\"_blank\">Google News<\/a>, <a href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener\" target=\"_blank\">Twitter<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener\" target=\"_blank\">LinkedIn<\/a> to read more exclusive content we post.<\/div>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In December\u00a02025, we shared the first-ever The State of Trusted Open\u00a0Source report, featuring insights from our product data and customer base on open source consumption across our catalog of container image projects, versions, images, language libraries, and builds. These\u00a0insights shed light on what teams pull, deploy, and maintain day to day, alongside the vulnerabilities and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":436,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25,5],"tags":[24,1499,1501,1500,1497,1498],"class_list":["post-435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias","category-trending","tag-cyberdefensa-mx","tag-open","tag-report","tag-source","tag-state","tag-trusted"],"_links":{"self":[{"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/posts\/435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/comments?post=435"}],"version-history":[{"count":0,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/posts\/435\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/media\/436"}],"wp:attachment":[{"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/media?parent=435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/categories?post=435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercolombia.co\/index.php\/wp-json\/wp\/v2\/tags?post=435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}