<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Nextlink &#x535A;&#x5F18;&#x96F2;&#x7AEF;&#x79D1;&#x6280;</provider_name><provider_url>https://www.nextlink.cloud/en/</provider_url><title>Snyk- Open Source Code Security Management</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="P6s3UtG1W9"&gt;&lt;a href="https://www.nextlink.cloud/en/digital-integrated-solution/snyk/"&gt;Snyk- Open Source Code Security Management&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.nextlink.cloud/en/digital-integrated-solution/snyk/embed/#?secret=P6s3UtG1W9" width="600" height="338" title="&#x201C;Snyk- Open Source Code Security Management&#x201D; &#x2014; Nextlink &#x535A;&#x5F18;&#x96F2;&#x7AEF;&#x79D1;&#x6280;" data-secret="P6s3UtG1W9" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>A data security solution tailor-made for developers, allowing for search and automated repair of code, open source code, containers, and vulnerabilities in infrastructure or code to comprehensively scan for risks and vulnerabilities in source code.</description><thumbnail_url>https://s3.ap-northeast-1.amazonaws.com/website-image.bucket/live/wp-content/uploads/2022/10/img_banner-default.jpg</thumbnail_url><thumbnail_width>1920</thumbnail_width><thumbnail_height>865</thumbnail_height></oembed>
