{"payload":{"contentfulRawJsonResponse":{"sys":{"type":"Array"},"total":1,"skip":0,"limit":100,"items":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"72TVif5JTz9uc1p16SDMqV","type":"Entry","createdAt":"2024-05-09T19:56:50.889Z","updatedAt":"2024-06-07T12:20:51.100Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Features · Security · Code","path":"/features/security/code-scanning","template":{"sys":{"type":"Link","linkType":"Entry","id":"2BjKVMj5lr7H6sJxw4F81a"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"5SPKnRnhsGGZrm819FR6LQ"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"6qT6jsw6YjvZ65zBUclEek"}}}}],"includes":{"Entry":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"01FcX42OF3JR0ezNKLuf7j","type":"Entry","createdAt":"2024-05-09T17:57:59.512Z","updatedAt":"2024-06-07T16:03:23.792Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Security","href":"https://github.com/features/security","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1LgMqyXk9puhX9DtV5rp0m","type":"Entry","createdAt":"2024-05-09T19:56:51.072Z","updatedAt":"2024-05-09T19:56:51.072Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Contact sales","href":"https://github.com/enterprise/contact?ref_cta=Contact+Sales&ref_loc=hero&ref_page=%2Ffeatures%2Fsecurity%2Fcode&scid=&utm_campaign=adv-security&utm_content=Security&utm_medium=site&utm_source=github","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1glUwZTr5qeisAOz0LdUBT","type":"Entry","createdAt":"2024-05-09T19:56:52.120Z","updatedAt":"2024-05-09T19:56:52.120Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"Avoid AppSec pitfalls","href":"https://resources.github.com/whitepapers/Three-AppSec-pitfalls-security/","heading":"Avoid AppSec pitfalls","description":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Explore common application security pitfalls and how to avoid them.","marks":[],"data":{}}]},{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"\n","marks":[],"data":{}}]}]},"iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"22tW3cQ6tRVMFqe6Jal31B","type":"Entry","createdAt":"2024-06-03T12:59:40.892Z","updatedAt":"2024-06-03T12:59:40.892Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Enabling code scanning for a repository ","href":"https://docs.github.com/code-security/secure-coding/setting-up-code-scanning-for-a-repository","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2BjKVMj5lr7H6sJxw4F81a","type":"Entry","createdAt":"2024-05-09T19:56:50.983Z","updatedAt":"2024-06-03T13:01:27.478Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateF2"}},"locale":"en-US"},"fields":{"title":"/features/security/code","subnav":{"sys":{"type":"Link","linkType":"Entry","id":"FCeyrNDZxYdhVivWnJbxQ"}},"hero":{"sys":{"type":"Link","linkType":"Entry","id":"5Sb7rFEhbODnDhLvCR6kTx"}},"rivers":[{"sys":{"type":"Link","linkType":"Entry","id":"4ph0bQji5wPKrjzrm00UUS"}},{"sys":{"type":"Link","linkType":"Entry","id":"7rLvhNk4byCBwwNUUuI2BE"}},{"sys":{"type":"Link","linkType":"Entry","id":"4DW7xyyEnQuwWDTapjJ9so"}}],"ctaBanner":{"sys":{"type":"Link","linkType":"Entry","id":"4TFqj9rDD0odeWNVIY9ieV"}},"cardsHeading":"Best practices for more secure software","cards":[{"sys":{"type":"Link","linkType":"Entry","id":"5lbMZ2QnjuW2DbE519L1zO"}},{"sys":{"type":"Link","linkType":"Entry","id":"54siQdb06tJo3rAWP5zTu9"}},{"sys":{"type":"Link","linkType":"Entry","id":"1glUwZTr5qeisAOz0LdUBT"}}]}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2PJjJkRXtrIPSC7yiT01TL","type":"Entry","createdAt":"2024-05-09T17:57:59.618Z","updatedAt":"2024-06-07T19:44:35.711Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Supply chain","href":"https://github.com/features/security/software-supply-chain","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4DW7xyyEnQuwWDTapjJ9so","type":"Entry","createdAt":"2024-05-09T19:56:51.867Z","updatedAt":"2024-06-03T16:54:25.630Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/features/security/code River - Discover and manage hard-coded secrets","align":"start","imageTextRatio":"50:50","heading":"Discover and manage hard-coded secrets","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Secret scanning watches your repositories for known secret formats and notifies you as soon as secrets are found.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"OD3cqYtzGSM8fcqQr03dG"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"40U76mda0MDLFJPg7TAmEo"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4JooclxCqdAFRWOmkfC8Lx","type":"Entry","createdAt":"2024-05-09T17:57:59.718Z","updatedAt":"2024-06-07T12:22:09.244Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Code scanning","href":"https://github.com/features/security/code-scanning","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4TFqj9rDD0odeWNVIY9ieV","type":"Entry","createdAt":"2024-05-09T19:56:51.978Z","updatedAt":"2024-06-03T12:52:01.435Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCtaBanner"}},"locale":"en-US"},"fields":{"title":"/features/security/code CTA Banner","align":"center","heading":"Secure software from the start","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Whether you’re contributing to an open source project or choosing new tools for your team, your security needs are covered.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"hasBackground":true,"hasShadow":false,"hasBorder":true,"callToActionPrimary":{"sys":{"type":"Link","linkType":"Entry","id":"5rhl5DGPWcXZX4V0IyKGkx"}},"callToActionSecondary":{"sys":{"type":"Link","linkType":"Entry","id":"6MPPlfhiu2QPcCkSOiWrhh"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4ph0bQji5wPKrjzrm00UUS","type":"Entry","createdAt":"2024-05-09T19:56:51.610Z","updatedAt":"2024-06-03T13:31:22.705Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/features/security/code River - A security review with every git push","align":"start","imageTextRatio":"50:50","heading":"A security review with every git push","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Code scanning scans your code for security issues as you write it, and integrates the results natively into the developer workflow. Schedule security analysis to run on every push and every pull request on a schedule or ad-hoc.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"22tW3cQ6tRVMFqe6Jal31B"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"etaIdJuxLwUYm2DkTmN1e"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4viLstjFdmXKXLb89lgEXS","type":"Entry","createdAt":"2024-05-09T19:56:51.594Z","updatedAt":"2024-05-09T19:56:51.594Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Read more about CodeQL on Security Lab","href":"https://docs.google.com/document/d/1pL7-Vnfkii946K-1lGLWx-ch6csoufoKmhzXyTXP_Ns/edit#","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"54siQdb06tJo3rAWP5zTu9","type":"Entry","createdAt":"2024-05-09T19:56:52.102Z","updatedAt":"2024-05-09T19:56:52.102Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"The government agency's guide to DevSecOps","href":"https://resources.github.com/whitepapers/DevSecOps-government-agency-guide/","heading":"The government agency's guide to DevSecOps","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn how to write more secure code from the start with DevSecOps.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5SPKnRnhsGGZrm819FR6LQ","type":"Entry","createdAt":"2024-05-09T19:56:52.168Z","updatedAt":"2024-06-07T12:20:58.153Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/features/security/code Settings","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5Sb7rFEhbODnDhLvCR6kTx","type":"Entry","createdAt":"2024-05-09T19:56:51.027Z","updatedAt":"2024-06-03T12:52:01.404Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/features/security/code Hero","align":"start","label":"GitHub Security","heading":"Find and fix security issues as you code","imagePosition":"Block","description":"Write more secure code from the start with security analysis built into your development workflow. GitHub Advanced Security helps you find and address security issues in your code earlier, improving the security of your projects.","callToActionPrimary":{"sys":{"type":"Link","linkType":"Entry","id":"1LgMqyXk9puhX9DtV5rp0m"}},"callToActionSecondary":{"sys":{"type":"Link","linkType":"Entry","id":"6MPPlfhiu2QPcCkSOiWrhh"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5lbMZ2QnjuW2DbE519L1zO","type":"Entry","createdAt":"2024-05-09T19:56:52.080Z","updatedAt":"2024-05-09T19:56:52.080Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"Developer-first application security","href":"https://resources.github.com/security/supply-chain/shipping-fast-secure-supply-chain/","heading":"Developer-first application security","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Take an in-depth look at the current state of application security.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5rhl5DGPWcXZX4V0IyKGkx","type":"Entry","createdAt":"2024-05-10T14:42:15.644Z","updatedAt":"2024-05-10T14:42:15.644Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Contact sales","href":"https://github.com/enterprise/contact?ref_cta=Contact+Sales&ref_loc=footer&ref_page=%2Ffeatures%2Fsecurity%2Fcode&scid=&utm_campaign=adv-security&utm_content=Security&utm_medium=site&utm_source=github","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6MPPlfhiu2QPcCkSOiWrhh","type":"Entry","createdAt":"2024-05-17T15:31:08.915Z","updatedAt":"2024-05-17T15:31:08.915Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Request a demo","href":"https://resources.github.com/demo/advanced-security/","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6qT6jsw6YjvZ65zBUclEek","type":"Entry","createdAt":"2024-06-03T12:52:01.471Z","updatedAt":"2024-06-03T12:52:01.471Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/features/security/code","description":"Find and fix security issues as you code","socialMediaImage":{"sys":{"type":"Link","linkType":"Asset","id":"q90NP1sT6DXbzhH57QkuA"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7rLvhNk4byCBwwNUUuI2BE","type":"Entry","createdAt":"2024-05-09T19:56:51.577Z","updatedAt":"2024-06-03T16:36:56.099Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/features/security/code River - Find critical vulnerabilities and eradicate them, forever ","align":"end","imageTextRatio":"50:50","heading":"Find critical vulnerabilities and eradicate them, forever ","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"CodeQL is a revolutionary semantic code engine that queries your code as data. Find security issues deep in your code. CodeQL’s powerful analysis can trace data flows through your application to identify vulnerabilities like SQL injection and remote code execution. ","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"\n","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"4viLstjFdmXKXLb89lgEXS"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"3ykGk2cL1Lc2JzsRPnXwlg"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"FCeyrNDZxYdhVivWnJbxQ","type":"Entry","createdAt":"2024-05-09T17:57:59.287Z","updatedAt":"2024-06-07T16:03:52.426Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentSubnav"}},"locale":"en-US"},"fields":{"title":"/features/security","heading":{"sys":{"type":"Link","linkType":"Entry","id":"01FcX42OF3JR0ezNKLuf7j"}},"links":[{"sys":{"type":"Link","linkType":"Entry","id":"4JooclxCqdAFRWOmkfC8Lx"}},{"sys":{"type":"Link","linkType":"Entry","id":"2PJjJkRXtrIPSC7yiT01TL"}}]}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"OD3cqYtzGSM8fcqQr03dG","type":"Entry","createdAt":"2024-05-09T19:56:51.884Z","updatedAt":"2024-06-03T13:01:20.335Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Configuring secret scanning for your repositories","href":"https://docs.github.com/github/administering-a-repository/configuring-secret-scanning-for-your-repositories","openInNewTab":false}}],"Asset":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3ykGk2cL1Lc2JzsRPnXwlg","type":"Asset","createdAt":"2024-06-03T16:36:54.041Z","updatedAt":"2024-06-07T14:21:43.957Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"locale":"en-US"},"fields":{"title":"Code injection test","description":"Test highlighting code and displaying the heading \"Code injection\" and description \"Interpreting unsanitized user input as code allows a malicious user arbitrary code execution.\"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/3ykGk2cL1Lc2JzsRPnXwlg/b633afc9c4005373265a0248b200301c/code-injection-test.webp","details":{"size":107824,"image":{"width":1200,"height":956}},"fileName":"code-injection-test.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"40U76mda0MDLFJPg7TAmEo","type":"Asset","createdAt":"2024-06-03T16:54:21.058Z","updatedAt":"2024-06-07T14:23:09.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":7,"locale":"en-US"},"fields":{"title":"secret-sanning-report","description":"Popup displaying heading \"GitHub secret scanning report\" indicating that secrets were found in the repository and a blue button with text \"Review secrets\"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/40U76mda0MDLFJPg7TAmEo/aa30ef8628c9885fa885596b6a564a8e/secret-sanning-report.webp","details":{"size":82590,"image":{"width":1200,"height":866}},"fileName":"secret-sanning-report.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"etaIdJuxLwUYm2DkTmN1e","type":"Asset","createdAt":"2024-06-03T13:31:20.068Z","updatedAt":"2024-06-07T14:18:43.779Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":6,"locale":"en-US"},"fields":{"title":"Build pass","description":"Build with 3 steps showing green circles with checkmarks","file":{"url":"//images.ctfassets.net/8aevphvgewt8/etaIdJuxLwUYm2DkTmN1e/c910ba0f9a93bf0d216be1b6658f8ee8/build-passing.webp","details":{"size":123736,"image":{"width":1200,"height":636}},"fileName":"build-passing.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"q90NP1sT6DXbzhH57QkuA","type":"Asset","createdAt":"2024-06-03T12:52:01.233Z","updatedAt":"2024-06-03T12:52:01.233Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Code scanning SEO image","description":"Find and fix security issues as you code","file":{"url":"//images.ctfassets.net/8aevphvgewt8/q90NP1sT6DXbzhH57QkuA/0704175ba1d62c74652438106160cf8f/security-code-24d349b4f42f.jpg","details":{"size":48861,"image":{"width":1200,"height":630}},"fileName":"security-code-24d349b4f42f.jpg","contentType":"image/jpeg"}}}]}},"userLoggedIn":false},"title":"Features · Security · Code"}