{"id":46264,"date":"2026-02-12T21:57:46","date_gmt":"2026-02-13T02:57:46","guid":{"rendered":"https:\/\/netfoundry.io\/?p=46264"},"modified":"2026-02-12T22:20:09","modified_gmt":"2026-02-13T03:20:09","slug":"why-openclaw-didnt-bite-netfoundry-customers","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/","title":{"rendered":"Why OpenClaw Didn\u2019t Bite NetFoundry Customers"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-the-power-of-dark-services-with-openziti\">The Power of Dark Services with OpenZiti<\/h2>\n\n\n\n<p>The recent OpenClaw vulnerabilities sent ripples through the cybersecurity community. <a href=\"https:\/\/securityscorecard.com\/blog\/beyond-the-hype-moltbots-real-risk-is-exposed-infrastructure-not-ai-superintelligence\/\">Research from the SecurityScorecard STRIKE Threat Intelligence Team<\/a> revealed that over 20,000 control panels were exposed to the public internet. These panels represent a massive attack surface for credential stuffing, exploit kits, and remote code execution.<\/p>\n\n\n\n<p>However, this headline was a non-event for NetFoundry customers who yawned while the rest of the world scrambled to apply patches. It was also a breeze for OpenZiti user\u2019s \u2013 NetFoundry\u2019s open source software<\/p>\n\n\n\n<p>How can NetFoundry customers and OpenZiti users be insulated from any OpenClaw CVE \u2013 as well as from CVEs from other AI agents?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-no-listening-ports-no-exposure\">1. No Listening Ports, No Exposure<\/h3>\n\n\n\n<p id=\"h-no-listening-ports-no-exposureexploiting-the-openclaw-vulnerability-starts-with-discovery-same-as-many-cyber-attacks-attackers-used-scanning-tools-like-shodan-and-censys-to-find-ip-addresses-with-open-ports-typically-80-443-or-8080-associated-with-known-control-panel-software-unfortunately-for-the-attackers-netfoundry-customers-do-not-have-any-exposed-ports-in-the-netfoundry-model-a-machine-vm-or-container-running-openclaw-opens-an-outbound-only-connection-to-a-private-dedicated-overlay-that-overlay-is-self-hosted-or-hosted-by-netfoundry-either-way-there-are-no-open-inbound-ports-for-attackers-to-scan-or-for-attackers-to-use-to-enter-to-exploit-a-vulnerability\">Exploiting the &#8220;OpenClaw&#8221; vulnerability starts with discovery \u2013 same as many cyber-attacks. Attackers used scanning tools like Shodan and Censys to find IP addresses with open ports (typically 80, 443, or 8080) associated with known control panel software. <strong>Unfortunately for the attackers, NetFoundry customers do not have any exposed ports.<\/strong><\/p>\n\n\n\n<p id=\"h-no-listening-ports-no-exposureexploiting-the-openclaw-vulnerability-starts-with-discovery-same-as-many-cyber-attacks-attackers-used-scanning-tools-like-shodan-and-censys-to-find-ip-addresses-with-open-ports-typically-80-443-or-8080-associated-with-known-control-panel-software-unfortunately-for-the-attackers-netfoundry-customers-do-not-have-any-exposed-ports-in-the-netfoundry-model-a-machine-vm-or-container-running-openclaw-opens-an-outbound-only-connection-to-a-private-dedicated-overlay-that-overlay-is-self-hosted-or-hosted-by-netfoundry-either-way-there-are-no-open-inbound-ports-for-attackers-to-scan-or-for-attackers-to-use-to-enter-to-exploit-a-vulnerability\">In the NetFoundry model, a machine, VM or container running OpenClaw opens an outbound-only connection to a private, dedicated overlay. That overlay is self-hosted or hosted by NetFoundry. Either way, there are no open inbound ports for attackers to scan or for attackers to use to enter to exploit a vulnerability<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-identity-first-networking\">2. <strong>Identity-First\u2122<\/strong> Networking<\/h3>\n\n\n\n<p>The exposed panels in the OpenClaw report relied on the traditional &#8220;first connect the user, then try to authenticate and authorize the user&#8221; model. That model means that <strong>anyone<\/strong> with the URL could reach the OpenClaw login page and exploit any vulnerabilities.<\/p>\n\n\n\n<p>NetFoundry flips this model to &#8220;identify, authenticate, authorize\u2026<strong>then connect IF<\/strong> you are authorized.&#8221; That model means nobody with the URL, other than identified, authenticated, authorized users, can reach OpenClaw.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-public-pipes-private-overlays\">3. Public Pipes, Private Overlays<\/h3>\n\n\n\n<p>Many of the panels flagged in the OpenClaw report were exposed because they were hosted on public clouds or home networks where &#8220;private&#8221; networking is complex or expensive to implement.<\/p>\n\n\n\n<p>NetFoundry creates an instant, dedicated, <strong>virtual overlay network<\/strong> that sits on top of the public internet. It treats the internet as &#8220;dumb pipes.&#8221; By encrypting traffic from end-to-end and managing routing within the overlay, NetFoundry allows administrators to put their OpenClaw control panels on the &#8220;private&#8221; overlay. This means the panels are reachable by authorized administrators anywhere in the world, but unreachable from the Internet<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-mitigation-of-zero-day-vulnerabilities\">4. Mitigation of Zero-Day Vulnerabilities<\/h3>\n\n\n\n<p>Even if an OpenClaw control panel has a critical, unpatched vulnerability (a &#8220;Zero-Day&#8221;), an attacker cannot exploit it. The vulnerability should be patched but the <strong>OpenClaw user is not racing against the entire Internet to patch it.<\/strong><\/p>\n\n\n\n<p>NetFoundry\u2019s default, identity-based microsegmentation ensures that even if an attacker manages to compromise one part of a network, they cannot &#8220;lateral move&#8221; to find these control panels unless they have been explicitly granted permission to that specific service.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-summary-closing-the-door\">Summary: Closing the Door<\/h3>\n\n\n\n<p>OpenZiti doesn&#8217;t just lock the door; it removes the door from the public street entirely. OpenClaw is a reminder that software will always have vulnerabilities. By embracing NetFoundry\u2019s zero-trust, open-source based (OpenZiti) model, organizations can ensure that their most sensitive management interfaces remain invisible, unreachable, and secure\u2014no matter what the next vulnerability might be.<\/p>\n\n\n\n<p>Increasingly, AI means we don\u2019t control the software. This makes it critical that we control the network. That\u2019s very difficult with networks which are default open and use the connect before authenticate model. NetFoundry\u2019s default-closed, Identity-First<strong>\u2122<\/strong> model flips the field \u2013 security becomes simpler than insecure because it is built-in instead of bolted-on. We get structural security and speed \u2013 and are not racing the Internet to patch issues like this OpenClaw vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Power of Dark Services with OpenZiti The recent OpenClaw vulnerabilities sent ripples through the cybersecurity community. Research from the SecurityScorecard STRIKE Threat Intelligence Team revealed that over 20,000 control panels were exposed to the public internet. These panels represent a massive attack surface for credential stuffing, exploit kits, and remote code execution. However, this [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":46273,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[470,859],"tags":[],"class_list":["post-46264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-secure-by-design"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why OpenClaw Didn\u2019t Bite NetFoundry Customers - NetFoundry<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why OpenClaw Didn\u2019t Bite NetFoundry Customers\" \/>\n<meta property=\"og:description\" content=\"The Power of Dark Services with OpenZiti The recent OpenClaw vulnerabilities sent ripples through the cybersecurity community. Research from the SecurityScorecard STRIKE Threat Intelligence Team revealed that over 20,000 control panels were exposed to the public internet. These panels represent a massive attack surface for credential stuffing, exploit kits, and remote code execution. However, this [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-13T02:57:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-13T03:20:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/02\/no-listening-ports-no-exposure-gemini.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1232\" \/>\n\t<meta property=\"og:image:height\" content=\"864\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Galeal Zino\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Galeal Zino\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/\"},\"author\":{\"name\":\"Galeal Zino\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/9ee9170b002cf7e6719fe0744c4d0ee7\"},\"headline\":\"Why OpenClaw Didn\u2019t Bite NetFoundry Customers\",\"datePublished\":\"2026-02-13T02:57:46+00:00\",\"dateModified\":\"2026-02-13T03:20:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/\"},\"wordCount\":606,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/no-listening-ports-no-exposure-gemini.png\",\"articleSection\":[\"AI\",\"Secure By Design\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/\",\"name\":\"Why OpenClaw Didn\u2019t Bite NetFoundry Customers - NetFoundry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/no-listening-ports-no-exposure-gemini.png\",\"datePublished\":\"2026-02-13T02:57:46+00:00\",\"dateModified\":\"2026-02-13T03:20:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/no-listening-ports-no-exposure-gemini.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/no-listening-ports-no-exposure-gemini.png\",\"width\":1232,\"height\":864,\"caption\":\"No listening ports, no exposure.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/why-openclaw-didnt-bite-netfoundry-customers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why OpenClaw Didn\u2019t Bite NetFoundry Customers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/9ee9170b002cf7e6719fe0744c4d0ee7\",\"name\":\"Galeal Zino\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7852251a8b43691b108b9da97328a5050c75ef7aee65d4bbfcafbf0f7b90bb27?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7852251a8b43691b108b9da97328a5050c75ef7aee65d4bbfcafbf0f7b90bb27?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7852251a8b43691b108b9da97328a5050c75ef7aee65d4bbfcafbf0f7b90bb27?s=96&d=mm&r=g\",\"caption\":\"Galeal Zino\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/galeal-zino\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why OpenClaw Didn\u2019t Bite NetFoundry Customers - NetFoundry","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/","og_locale":"en_US","og_type":"article","og_title":"Why OpenClaw Didn\u2019t Bite NetFoundry Customers","og_description":"The Power of Dark Services with OpenZiti The recent OpenClaw vulnerabilities sent ripples through the cybersecurity community. Research from the SecurityScorecard STRIKE Threat Intelligence Team revealed that over 20,000 control panels were exposed to the public internet. These panels represent a massive attack surface for credential stuffing, exploit kits, and remote code execution. However, this [&hellip;]","og_url":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2026-02-13T02:57:46+00:00","article_modified_time":"2026-02-13T03:20:09+00:00","og_image":[{"width":1232,"height":864,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/02\/no-listening-ports-no-exposure-gemini.png","type":"image\/png"}],"author":"Galeal Zino","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Galeal Zino","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/"},"author":{"name":"Galeal Zino","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/9ee9170b002cf7e6719fe0744c4d0ee7"},"headline":"Why OpenClaw Didn\u2019t Bite NetFoundry Customers","datePublished":"2026-02-13T02:57:46+00:00","dateModified":"2026-02-13T03:20:09+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/"},"wordCount":606,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/02\/no-listening-ports-no-exposure-gemini.png","articleSection":["AI","Secure By Design"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/","url":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/","name":"Why OpenClaw Didn\u2019t Bite NetFoundry Customers - NetFoundry","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/02\/no-listening-ports-no-exposure-gemini.png","datePublished":"2026-02-13T02:57:46+00:00","dateModified":"2026-02-13T03:20:09+00:00","breadcrumb":{"@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/02\/no-listening-ports-no-exposure-gemini.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2026\/02\/no-listening-ports-no-exposure-gemini.png","width":1232,"height":864,"caption":"No listening ports, no exposure."},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/ai\/why-openclaw-didnt-bite-netfoundry-customers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Why OpenClaw Didn\u2019t Bite NetFoundry Customers"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/9ee9170b002cf7e6719fe0744c4d0ee7","name":"Galeal Zino","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7852251a8b43691b108b9da97328a5050c75ef7aee65d4bbfcafbf0f7b90bb27?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7852251a8b43691b108b9da97328a5050c75ef7aee65d4bbfcafbf0f7b90bb27?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7852251a8b43691b108b9da97328a5050c75ef7aee65d4bbfcafbf0f7b90bb27?s=96&d=mm&r=g","caption":"Galeal Zino"},"url":"https:\/\/netfoundry.io\/author\/galeal-zino\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/46264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=46264"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/46264\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/46273"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=46264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=46264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=46264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}