{"id":482,"date":"2021-12-20T15:30:03","date_gmt":"2021-12-20T15:30:03","guid":{"rendered":"https:\/\/terrabioappdev.wpenginepowered.com\/terras-security-response-to-the-log4j-vulnerability\/"},"modified":"2023-12-27T04:55:11","modified_gmt":"2023-12-27T04:55:11","slug":"terras-security-response-to-the-log4j-vulnerability","status":"publish","type":"post","link":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/","title":{"rendered":"Terra&#8217;s security response to the Log4j vulnerability \u2014 and what you can do to stay safe"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As you may have heard, <\/span><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\"><span style=\"font-weight: 400;\">a critical vulnerability<\/span><\/a><span style=\"font-weight: 400;\"> (<\/span><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\"><span style=\"font-weight: 400;\">CVE-2021-44228<\/span><\/a><span style=\"font-weight: 400;\">) was recently discovered in the Apache Log4j software library, which is widely used for logging program output in open source projects around the world. Under certain circumstances, this vulnerability can allow an attacker to run arbitrary code on computers that have been compromised. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our information security team was made aware of this vulnerability shortly after its discovery and immediately moved to assess and remediate any effect this might have on Terra&#8217;s security. The good news is that they found no evidence of any successful attacks in the Terra logs, and our engineering teams were able to quickly patch all Terra services that could be affected by the Log4j vulnerability according to the <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\">latest guidance from Apache<\/a>.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This leaves two points on which <\/span><b>you may need to take action<\/b><span style=\"font-weight: 400;\"> to further secure your work in Terra.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First, if you have an existing dataproc cluster that <\/span><span style=\"font-weight: 400;\">was created prior to <\/span><b>12:26pm ET<\/b><span style=\"font-weight: 400;\"> on <\/span><b>December 15<\/b><span style=\"font-weight: 400;\">, 2021, you will need to delete and recreate the cluster in order to benefit from the security updates that were made by our team.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Second, you may need to update any Java-based analysis software packages you use in your work. This may not be trivial, because <\/span><span style=\"font-weight: 400;\">Log4j is used in a lot of java-based projects, and it&#8217;s up to their developers to provide updated versions. For example, the Genome Analysis Toolkit (GATK) was updated this week to use the latest version of Log4j, and the development team is <\/span><a href=\"https:\/\/gatk.broadinstitute.org\/hc\/en-us\/articles\/4412955012379\"><span style=\"font-weight: 400;\">recommending<\/span><\/a><span style=\"font-weight: 400;\"> that everyone using GATK should upgrade to the <\/span><a href=\"https:\/\/github.com\/broadinstitute\/gatk\/releases\/tag\/4.2.4.0\"><span style=\"font-weight: 400;\">new version<\/span><\/a><span style=\"font-weight: 400;\"> to be safe. Accordingly, we have already updated the GATK docker image in all environments and workflows available in Terra that our team controls. If you have been using one of our preconfigured cloud environments or workflows that includes GATK, please upgrade to the newest version. We also recommend that you check any other Java tools you use that may be affected by this vulnerability, and switch to updated versions if available.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3>What if you can&#8217;t update a third-party tool to a safe version?<\/h3>\n<p><span style=\"font-weight: 400;\">We understand that some tools you use may not get updated by their developers right away, or you may not be able to update mid-project, so here is a summary of what you need to know to understand and mitigate the risk of using tools that carry the Log4j vulnerability.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a nutshell, this vulnerability consists of a software flaw that allows an attacker to force the Log4j logging component bundled in a Java tool to download and run malicious code. First, the attacker crafts a string of text that will tell Log4j to retrieve code from an external server using a function called a &#8220;JNDI lookup&#8221;, and to run that code on the compromised computer. The attack is triggered when the attack string goes through the logging system of a tool that has the vulnerability. This can happen for example if the attack string was embedded in a data input file in a way that causes the analysis tool to emit an error message that includes the attack string itself. Given the right set of circumstances, this can allow the attacker to take control of the machine and run arbitrary code on it. (For more technical details, see the official <\/span><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\"><span style=\"font-weight: 400;\">vulnerability report<\/span><\/a><span style=\"font-weight: 400;\">; you may also appreciate the <\/span><a href=\"https:\/\/www.govcert.ch\/blog\/zero-day-exploit-targeting-popular-java-library-log4j\/\"><span style=\"font-weight: 400;\">helpful diagram<\/span><\/a><span style=\"font-weight: 400;\"> on the Swiss Government Computer Emergency Response Team&#8217;s blog). This kind of remote code execution attack, or &#8220;exploit&#8221;, is often used to deploy mass-malware for launching DDoS attacks and mining cryptocurrencies, and can also be used for espionage.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In any computing context, the best way to protect yourself against this vulnerability is to update any Java-based analysis tools you use to a safe version; but if that&#8217;s not possible, another option is to disable the JNDI lookup function of each tool by deleting the relevant code from the tool&#8217;s JAR file, as noted in the <\/span><a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\"><span style=\"font-weight: 400;\">Apache Log4j mitigation documentation<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">(&#8230;)<\/span><span style=\"font-weight: 400;\"> in any release other than 2.16.0, you may remove the JndiLookup class from the classpath:\u00a0\u00a0<\/span><\/p>\n<pre><span style=\"font-weight: 400;\">zip -q -d log4j-core-*.jar org\/apache\/logging\/log4j\/core\/lookup\/JndiLookup.class<\/span><\/pre>\n<\/blockquote>\n<p><span style=\"font-weight: 400;\"><br \/>\nIn Terra, the virtual machines provided for running analyses in cloud environments and via workflows are specifically configured to be isolated from the rest of the system, so it is difficult for an attacker to &#8220;move sideways&#8221; and affect anything else outside of that one machine. Nevertheless, you should adopt safe practices to keep your work \u2014and any data you have access to\u2014 as secure as possible. If you cannot apply the mitigation steps outlined above, another way you can protect yourself is by verifying the integrity of your data inputs, which is something we recommend doing in general anyway. For example, you should always check whether the data input files you&#8217;re using come from a trusted source (be especially careful with files provided by pseudonymous users on discussion forums), and in many cases you can verify the integrity of data files using tools such as md5sum checkers, or format validation tools. (Make sure the validation tool you use is not itself vulnerable to this exploit!)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can find more details about Terra&#8217;s security posture <\/span><a href=\"https:\/\/terra.bio\/security\/\"><span style=\"font-weight: 400;\">on the Security page of the Terra website<\/span><\/a><span style=\"font-weight: 400;\">, and\u00a0we will continue to document recommendations for this specific issue in the corresponding <a href=\"https:\/\/support.terra.bio\/hc\/en-us\/community\/posts\/4413156809883\">&#8220;Known Issues&#8221; article<\/a> as the situation evolves. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have any concerns or questions about any of this, please reach out to <\/span><a href=\"https:\/\/terra.bio\/resources\/help\/\"><span style=\"font-weight: 400;\">the Terra support team<\/span><\/a><span style=\"font-weight: 400;\"> for help.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have updated Terra services to address the Apache Log4j vulnerability; learn what you can do on your end to further secure your work.<\/p>\n","protected":false},"author":4,"featured_media":483,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[119,118],"tags":[],"class_list":["post-482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-most-recent","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Terra&#039;s security response to the Log4j vulnerability \u2014 and what you can do to stay safe - Terra<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Terra&#039;s security response to the Log4j vulnerability \u2014 and what you can do to stay safe - Terra\" \/>\n<meta property=\"og:description\" content=\"We have updated Terra services to address the Apache Log4j vulnerability; learn what you can do on your end to further secure your work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Terra\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-20T15:30:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-27T04:55:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Geraldine Van der Auwera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Geraldine Van der Auwera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/\"},\"author\":{\"name\":\"Geraldine Van der Auwera\",\"@id\":\"https:\/\/terra.bio\/#\/schema\/person\/ad0522d0b331a5e08fa1733f65086ee2\"},\"headline\":\"Terra&#8217;s security response to the Log4j vulnerability \u2014 and what you can do to stay safe\",\"datePublished\":\"2021-12-20T15:30:03+00:00\",\"dateModified\":\"2023-12-27T04:55:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/\"},\"wordCount\":927,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/terra.bio\/#organization\"},\"image\":{\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png\",\"articleSection\":[\"Most Recent\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/\",\"url\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/\",\"name\":\"Terra's security response to the Log4j vulnerability \u2014 and what you can do to stay safe - Terra\",\"isPartOf\":{\"@id\":\"https:\/\/terra.bio\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png\",\"datePublished\":\"2021-12-20T15:30:03+00:00\",\"dateModified\":\"2023-12-27T04:55:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#primaryimage\",\"url\":\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png\",\"contentUrl\":\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png\",\"width\":1200,\"height\":627,\"caption\":\"log4j_OG 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/terra.bio\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Terra&#8217;s security response to the Log4j vulnerability \u2014 and what you can do to stay safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/terra.bio\/#website\",\"url\":\"https:\/\/terra.bio\/\",\"name\":\"Terra\",\"description\":\"Science at Scale\",\"publisher\":{\"@id\":\"https:\/\/terra.bio\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/terra.bio\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/terra.bio\/#organization\",\"name\":\"Terra\",\"url\":\"https:\/\/terra.bio\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/terra.bio\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/Terra-Bio-App@2x.webp\",\"contentUrl\":\"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/Terra-Bio-App@2x.webp\",\"width\":287,\"height\":318,\"caption\":\"Terra\"},\"image\":{\"@id\":\"https:\/\/terra.bio\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/terra.bio\/#\/schema\/person\/ad0522d0b331a5e08fa1733f65086ee2\",\"name\":\"Geraldine Van der Auwera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/terra.bio\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d73bdaf6740465b385e0e3b290786d8cb9d9d548eadec23364254ba06c85204b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d73bdaf6740465b385e0e3b290786d8cb9d9d548eadec23364254ba06c85204b?s=96&d=mm&r=g\",\"caption\":\"Geraldine Van der Auwera\"},\"sameAs\":[\"https:\/\/app.terra.bio\/\"],\"url\":\"https:\/\/terra.bio\/author\/geraldinevanterra\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Terra's security response to the Log4j vulnerability \u2014 and what you can do to stay safe - Terra","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Terra's security response to the Log4j vulnerability \u2014 and what you can do to stay safe - Terra","og_description":"We have updated Terra services to address the Apache Log4j vulnerability; learn what you can do on your end to further secure your work.","og_url":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/","og_site_name":"Terra","article_published_time":"2021-12-20T15:30:03+00:00","article_modified_time":"2023-12-27T04:55:11+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png","type":"image\/png"}],"author":"Geraldine Van der Auwera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Geraldine Van der Auwera","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#article","isPartOf":{"@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/"},"author":{"name":"Geraldine Van der Auwera","@id":"https:\/\/terra.bio\/#\/schema\/person\/ad0522d0b331a5e08fa1733f65086ee2"},"headline":"Terra&#8217;s security response to the Log4j vulnerability \u2014 and what you can do to stay safe","datePublished":"2021-12-20T15:30:03+00:00","dateModified":"2023-12-27T04:55:11+00:00","mainEntityOfPage":{"@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/"},"wordCount":927,"commentCount":0,"publisher":{"@id":"https:\/\/terra.bio\/#organization"},"image":{"@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png","articleSection":["Most Recent","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/","url":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/","name":"Terra's security response to the Log4j vulnerability \u2014 and what you can do to stay safe - Terra","isPartOf":{"@id":"https:\/\/terra.bio\/#website"},"primaryImageOfPage":{"@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png","datePublished":"2021-12-20T15:30:03+00:00","dateModified":"2023-12-27T04:55:11+00:00","breadcrumb":{"@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#primaryimage","url":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png","contentUrl":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/log4j_OG-1.png","width":1200,"height":627,"caption":"log4j_OG 1"},{"@type":"BreadcrumbList","@id":"https:\/\/terra.bio\/terras-security-response-to-the-log4j-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/terra.bio\/"},{"@type":"ListItem","position":2,"name":"Terra&#8217;s security response to the Log4j vulnerability \u2014 and what you can do to stay safe"}]},{"@type":"WebSite","@id":"https:\/\/terra.bio\/#website","url":"https:\/\/terra.bio\/","name":"Terra","description":"Science at Scale","publisher":{"@id":"https:\/\/terra.bio\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/terra.bio\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/terra.bio\/#organization","name":"Terra","url":"https:\/\/terra.bio\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/terra.bio\/#\/schema\/logo\/image\/","url":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/Terra-Bio-App@2x.webp","contentUrl":"https:\/\/terra.bio\/wp-content\/uploads\/2023\/12\/Terra-Bio-App@2x.webp","width":287,"height":318,"caption":"Terra"},"image":{"@id":"https:\/\/terra.bio\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/terra.bio\/#\/schema\/person\/ad0522d0b331a5e08fa1733f65086ee2","name":"Geraldine Van der Auwera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/terra.bio\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d73bdaf6740465b385e0e3b290786d8cb9d9d548eadec23364254ba06c85204b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d73bdaf6740465b385e0e3b290786d8cb9d9d548eadec23364254ba06c85204b?s=96&d=mm&r=g","caption":"Geraldine Van der Auwera"},"sameAs":["https:\/\/app.terra.bio\/"],"url":"https:\/\/terra.bio\/author\/geraldinevanterra\/"}]}},"_links":{"self":[{"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/posts\/482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/comments?post=482"}],"version-history":[{"count":0,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/posts\/482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/media\/483"}],"wp:attachment":[{"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/media?parent=482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/categories?post=482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/terra.bio\/wp-json\/wp\/v2\/tags?post=482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}