{"id":253505,"date":"2025-06-23T11:34:16","date_gmt":"2025-06-23T09:34:16","guid":{"rendered":"https:\/\/4itsolutions.com\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/"},"modified":"2025-06-23T11:34:16","modified_gmt":"2025-06-23T09:34:16","slug":"from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us","status":"publish","type":"post","link":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/","title":{"rendered":"From security by design to AI agent safety: what EchoLeak teaches us"},"content":{"rendered":"<p>Security should not be an add-on, but a foundational pillar for every service, software, or infrastructure. From network segmentation to access control, backups, and the use of intelligent firewalls\u2014everything revolves around one key idea: prevention, not just reaction. <\/p>\n<p>And yet, just as we thought we had finally reached a mature approach to security, a new player entered the scene. Not a hacker. Not malware. But <strong>artificial intelligence.<\/strong>   <\/p>\n<h3><strong>When a single email\u2014with no click required\u2014is enough<\/strong><\/h3>\n<p>A few days ago, a critical vulnerability (CVE-2025-32711), dubbed <em>EchoLeak<\/em>, was discovered within Microsoft 365 Copilot. The mechanism is unsettling in its simplicity: an attacker sends a normal email to a user. The user doesn\u2019t have to open it, click anything, or respond. Copilot reads it automatically, processes the content, and&#8230; could potentially reply to the attacker with confidential company information.   <\/p>\n<p>This happens because Copilot, to provide a comprehensive experience, is connected to emails, files, chats, and documents. And like any attentive assistant, it tries to be helpful\u2014even when it shouldn\u2019t.  <\/p>\n<p>We are facing what experts call a <strong>zero-click attack,<\/strong> but with a twist: the weak point is no longer just the user, but also the <strong>AI agent<\/strong>. It\u2019s not a coding error, but an \u201cinduced behavior.\u201d A kind of social engineering, but targeting a machine.  <\/p>\n<h3><strong>The paradigm shift<\/strong><\/h3>\n<p>This incident is just the tip of the iceberg. AI agents are becoming increasingly autonomous\u2014not only able to read and process, but also to act, suggest, and decide. And as their responsibilities grow, so do the risks.  <\/p>\n<p>The paradigm shifts: <strong>security must no longer only protect data, but also how that data is processed and returned. <\/strong>It\u2019s no longer enough to ask \u201cwho has access to what?\u201d but also \u201chow might AI combine this information?\u201d and \u201ccould it be tricked into doing so?\u201d <\/p>\n<p>Today\u2019s real threat is no longer just a virus hidden in a zip file, but also an instruction disguised as an innocuous message.<\/p>\n<h3><strong>How to protect your company?<\/strong><\/h3>\n<p>Facing this new reality requires new tools and approaches. Some concrete examples include: <\/p>\n<ul>\n<li>Limit AI access to only the data that is truly necessary<\/li>\n<li>Use protection mechanisms such as DLP and sensitive classifications on content processed by AI as well<\/li>\n<li>Monitor the output of virtual assistants with the same level of scrutiny applied to system logs.<\/li>\n<li>Implement behavioral guardrails\u2014clear limits on what the AI can and cannot do.<\/li>\n<\/ul>\n<p>And above all: <strong>don\u2019t rely blindly on AI just because it\u2019s convenient.<\/strong> Like any powerful tool, it must be used with intelligence, expertise, and\u2014now more than ever\u2014with caution. <\/p>\n<p>The EchoLeak case leaves us with a clear message: <strong>security cannot stand still while AI moves forward.<\/strong> We need to envision cybersecurity not just as a safety belt, but as a design conscience. And if today we are entrusting more and more decision-making processes to intelligent assistants, we must ask ourselves a fundamental question: <strong>who protects the assistant?<\/strong>  <\/p>\n<p>Want to learn how to protect your company? <strong>Talk to our cybersecurity experts<\/strong>\u2014we\u2019ll help you build a tailored strategy that evolves alongside technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the IT world, security by design has been a topic of discussion for years\u2014a principle as simple as it is powerful.<\/p>\n","protected":false},"author":15,"featured_media":253440,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[37],"tags":[],"class_list":["post-253505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From security by design to AI agent safety: what EchoLeak teaches us - 4IT Solutions<\/title>\n<meta name=\"description\" content=\"Discover how the EchoLeak vulnerability exposed security risks in artificial intelligence and learn how to protect your company from emerging threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From security by design to AI agent safety: what EchoLeak teaches us - 4IT Solutions\" \/>\n<meta property=\"og:description\" content=\"Discover how the EchoLeak vulnerability exposed security risks in artificial intelligence and learn how to protect your company from emerging threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/\" \/>\n<meta property=\"og:site_name\" content=\"4IT Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/4itsolutions10\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-23T09:34:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/06\/Immagine-copertina-BLOG-website-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex Semenzato\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Semenzato\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/\"},\"author\":{\"name\":\"Alex Semenzato\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/23941a50b563eec2ee83b88c1f3ae4f7\"},\"headline\":\"From security by design to AI agent safety: what EchoLeak teaches us\",\"datePublished\":\"2025-06-23T09:34:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/\"},\"wordCount\":531,\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Immagine-copertina-BLOG-website-2.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/\",\"name\":\"From security by design to AI agent safety: what EchoLeak teaches us - 4IT Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Immagine-copertina-BLOG-website-2.jpg\",\"datePublished\":\"2025-06-23T09:34:16+00:00\",\"description\":\"Discover how the EchoLeak vulnerability exposed security risks in artificial intelligence and learn how to protect your company from emerging threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/#primaryimage\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Immagine-copertina-BLOG-website-2.jpg\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Immagine-copertina-BLOG-website-2.jpg\",\"width\":1920,\"height\":1281},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/category\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"From security by design to AI agent safety: what EchoLeak teaches us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"name\":\"4IT Solutions\",\"description\":\"Soluzioni informatiche per la tua azienda\",\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/4itsolutions.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\",\"name\":\"4IT Solutions\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"4IT Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/4itsolutions10\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/4it-solutions\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/23941a50b563eec2ee83b88c1f3ae4f7\",\"name\":\"Alex Semenzato\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png\",\"caption\":\"Alex Semenzato\"},\"description\":\"Security Architect\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/author\\\/alex_semenzato\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From security by design to AI agent safety: what EchoLeak teaches us - 4IT Solutions","description":"Discover how the EchoLeak vulnerability exposed security risks in artificial intelligence and learn how to protect your company from emerging threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/","og_locale":"en_US","og_type":"article","og_title":"From security by design to AI agent safety: what EchoLeak teaches us - 4IT Solutions","og_description":"Discover how the EchoLeak vulnerability exposed security risks in artificial intelligence and learn how to protect your company from emerging threats.","og_url":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/","og_site_name":"4IT Solutions","article_publisher":"https:\/\/www.facebook.com\/4itsolutions10","article_published_time":"2025-06-23T09:34:16+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/06\/Immagine-copertina-BLOG-website-2.jpg","type":"image\/jpeg"}],"author":"Alex Semenzato","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex Semenzato","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/#article","isPartOf":{"@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/"},"author":{"name":"Alex Semenzato","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/23941a50b563eec2ee83b88c1f3ae4f7"},"headline":"From security by design to AI agent safety: what EchoLeak teaches us","datePublished":"2025-06-23T09:34:16+00:00","mainEntityOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/"},"wordCount":531,"publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/06\/Immagine-copertina-BLOG-website-2.jpg","articleSection":["IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/","url":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/","name":"From security by design to AI agent safety: what EchoLeak teaches us - 4IT Solutions","isPartOf":{"@id":"https:\/\/4itsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/#primaryimage"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/06\/Immagine-copertina-BLOG-website-2.jpg","datePublished":"2025-06-23T09:34:16+00:00","description":"Discover how the EchoLeak vulnerability exposed security risks in artificial intelligence and learn how to protect your company from emerging threats.","breadcrumb":{"@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/#primaryimage","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/06\/Immagine-copertina-BLOG-website-2.jpg","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/06\/Immagine-copertina-BLOG-website-2.jpg","width":1920,"height":1281},{"@type":"BreadcrumbList","@id":"https:\/\/4itsolutions.com\/en\/from-security-by-design-to-ai-agent-safety-what-echoleak-teaches-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/4itsolutions.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/4itsolutions.com\/en\/category\/blog-en\/"},{"@type":"ListItem","position":3,"name":"From security by design to AI agent safety: what EchoLeak teaches us"}]},{"@type":"WebSite","@id":"https:\/\/4itsolutions.com\/#website","url":"https:\/\/4itsolutions.com\/","name":"4IT Solutions","description":"Soluzioni informatiche per la tua azienda","publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4itsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/4itsolutions.com\/#organization","name":"4IT Solutions","url":"https:\/\/4itsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","width":512,"height":512,"caption":"4IT Solutions"},"image":{"@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/4itsolutions10","https:\/\/www.linkedin.com\/company\/4it-solutions\/"]},{"@type":"Person","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/23941a50b563eec2ee83b88c1f3ae4f7","name":"Alex Semenzato","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png","caption":"Alex Semenzato"},"description":"Security Architect","url":"https:\/\/4itsolutions.com\/en\/author\/alex_semenzato\/"}]}},"_links":{"self":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/253505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/comments?post=253505"}],"version-history":[{"count":0,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/253505\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media\/253440"}],"wp:attachment":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media?parent=253505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/categories?post=253505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/tags?post=253505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}