mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 22:25:31 +01:00
574 lines
No EOL
20 KiB
JSON
574 lines
No EOL
20 KiB
JSON
[
|
||
{
|
||
"id": 963904467,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "xuemian168\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "xuemian168",
|
||
"id": 38741078,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38741078?v=4",
|
||
"html_url": "https:\/\/github.com\/xuemian168",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xuemian168\/CVE-2025-3248",
|
||
"description": "A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025-3248 漏洞的工具。",
|
||
"fork": false,
|
||
"created_at": "2025-04-10T11:45:57Z",
|
||
"updated_at": "2025-06-25T11:04:06Z",
|
||
"pushed_at": "2025-04-10T12:32:30Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"ai",
|
||
"langflow"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 7,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 963981735,
|
||
"name": "CVE-2025-3248-POC",
|
||
"full_name": "PuddinCat\/CVE-2025-3248-POC",
|
||
"owner": {
|
||
"login": "PuddinCat",
|
||
"id": 131779933,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131779933?v=4",
|
||
"html_url": "https:\/\/github.com\/PuddinCat",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/PuddinCat\/CVE-2025-3248-POC",
|
||
"description": "POC of CVE-2025-3248, RCE of LangFlow",
|
||
"fork": false,
|
||
"created_at": "2025-04-10T14:04:29Z",
|
||
"updated_at": "2025-04-10T19:31:11Z",
|
||
"pushed_at": "2025-04-10T16:39:02Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2025-3248",
|
||
"exp",
|
||
"langflow",
|
||
"poc"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 967470704,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "verylazytech\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "verylazytech",
|
||
"id": 172168670,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
|
||
"html_url": "https:\/\/github.com\/verylazytech",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2025-3248",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2025-04-16T14:00:02Z",
|
||
"updated_at": "2025-08-14T05:03:42Z",
|
||
"pushed_at": "2025-04-16T16:48:38Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2025-3248",
|
||
"langflow",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 11,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 978265945,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "Praison001\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "Praison001",
|
||
"id": 60835238,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
|
||
"html_url": "https:\/\/github.com\/Praison001",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Praison001\/CVE-2025-3248",
|
||
"description": "Scanner and exploit for CVE-2025-3248",
|
||
"fork": false,
|
||
"created_at": "2025-05-05T18:10:44Z",
|
||
"updated_at": "2025-05-07T04:08:50Z",
|
||
"pushed_at": "2025-05-05T18:20:58Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 982933237,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "vigilante-1337\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "vigilante-1337",
|
||
"id": 208334620,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/208334620?v=4",
|
||
"html_url": "https:\/\/github.com\/vigilante-1337",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/vigilante-1337\/CVE-2025-3248",
|
||
"description": "CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution without authentication, potentially giving attackers control over the server.",
|
||
"fork": false,
|
||
"created_at": "2025-05-13T16:08:37Z",
|
||
"updated_at": "2025-05-16T09:16:58Z",
|
||
"pushed_at": "2025-05-13T16:12:16Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 991032075,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "Vip3rLi0n\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "Vip3rLi0n",
|
||
"id": 21289340,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21289340?v=4",
|
||
"html_url": "https:\/\/github.com\/Vip3rLi0n",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Vip3rLi0n\/CVE-2025-3248",
|
||
"description": "Perform Remote Code Execution using vulnerable API endpoint.",
|
||
"fork": false,
|
||
"created_at": "2025-05-27T03:01:16Z",
|
||
"updated_at": "2025-05-27T15:35:27Z",
|
||
"pushed_at": "2025-05-27T03:03:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2025-3248"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 993961114,
|
||
"name": "RCE-CVE-2025-3248",
|
||
"full_name": "tiemio\/RCE-CVE-2025-3248",
|
||
"owner": {
|
||
"login": "tiemio",
|
||
"id": 196255514,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/196255514?v=4",
|
||
"html_url": "https:\/\/github.com\/tiemio",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tiemio\/RCE-CVE-2025-3248",
|
||
"description": "This Python script exploits CVE-2025-3248 to execute arbitrary commands or spawn a reverse shell on a vulnerable system. Authentication is required to use this exploit.",
|
||
"fork": false,
|
||
"created_at": "2025-05-31T22:25:35Z",
|
||
"updated_at": "2025-05-31T22:29:18Z",
|
||
"pushed_at": "2025-05-31T22:29:15Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1003514619,
|
||
"name": "CVE-2025-3248-Langflow-RCE",
|
||
"full_name": "ynsmroztas\/CVE-2025-3248-Langflow-RCE",
|
||
"owner": {
|
||
"login": "ynsmroztas",
|
||
"id": 58443521,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58443521?v=4",
|
||
"html_url": "https:\/\/github.com\/ynsmroztas",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ynsmroztas\/CVE-2025-3248-Langflow-RCE",
|
||
"description": "CVE-2025-3248 Langflow RCE Exploit",
|
||
"fork": false,
|
||
"created_at": "2025-06-17T09:06:20Z",
|
||
"updated_at": "2025-07-29T10:53:50Z",
|
||
"pushed_at": "2025-06-17T09:07:43Z",
|
||
"stargazers_count": 15,
|
||
"watchers_count": 15,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 15,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1004051602,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "imbas007\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "imbas007",
|
||
"id": 100182585,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100182585?v=4",
|
||
"html_url": "https:\/\/github.com\/imbas007",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/imbas007\/CVE-2025-3248",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2025-06-18T03:42:57Z",
|
||
"updated_at": "2025-07-18T01:09:53Z",
|
||
"pushed_at": "2025-06-18T04:35:08Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1004536002,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "0xgh057r3c0n\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "0xgh057r3c0n",
|
||
"id": 144083709,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144083709?v=4",
|
||
"html_url": "https:\/\/github.com\/0xgh057r3c0n",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xgh057r3c0n\/CVE-2025-3248",
|
||
"description": "Exploit for Langflow AI Remote Code Execution (Unauthenticated)",
|
||
"fork": false,
|
||
"created_at": "2025-06-18T19:27:52Z",
|
||
"updated_at": "2025-06-18T19:59:16Z",
|
||
"pushed_at": "2025-06-18T19:59:12Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1004764154,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "zapstiko\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "zapstiko",
|
||
"id": 44252004,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44252004?v=4",
|
||
"html_url": "https:\/\/github.com\/zapstiko",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zapstiko\/CVE-2025-3248",
|
||
"description": "CVE-2025-3248 — Langflow RCE Exploit",
|
||
"fork": false,
|
||
"created_at": "2025-06-19T06:30:29Z",
|
||
"updated_at": "2025-07-16T04:58:33Z",
|
||
"pushed_at": "2025-06-19T06:47:31Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1006591365,
|
||
"name": "Blackash-CVE-2025-3248",
|
||
"full_name": "B1ack4sh\/Blackash-CVE-2025-3248",
|
||
"owner": {
|
||
"login": "B1ack4sh",
|
||
"id": 215029052,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
|
||
"html_url": "https:\/\/github.com\/B1ack4sh",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/B1ack4sh\/Blackash-CVE-2025-3248",
|
||
"description": "CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage",
|
||
"fork": false,
|
||
"created_at": "2025-06-22T15:49:32Z",
|
||
"updated_at": "2025-06-22T21:20:28Z",
|
||
"pushed_at": "2025-06-22T21:20:24Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1006609193,
|
||
"name": "CVE-2025-3248-Scanner",
|
||
"full_name": "issamjr\/CVE-2025-3248-Scanner",
|
||
"owner": {
|
||
"login": "issamjr",
|
||
"id": 101994309,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101994309?v=4",
|
||
"html_url": "https:\/\/github.com\/issamjr",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/issamjr\/CVE-2025-3248-Scanner",
|
||
"description": "Powerful unauthenticated RCE scanner for CVE-2025-3248 affecting Langflow < 1.3.0",
|
||
"fork": false,
|
||
"created_at": "2025-06-22T16:30:27Z",
|
||
"updated_at": "2025-08-14T15:11:20Z",
|
||
"pushed_at": "2025-06-23T23:11:03Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1006778763,
|
||
"name": "langflow-rce-exploit",
|
||
"full_name": "0-d3y\/langflow-rce-exploit",
|
||
"owner": {
|
||
"login": "0-d3y",
|
||
"id": 103077384,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103077384?v=4",
|
||
"html_url": "https:\/\/github.com\/0-d3y",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0-d3y\/langflow-rce-exploit",
|
||
"description": "Remote Code Execution Exploit for Langflow (CVE-2025-3248) - [ By S4Tech ]",
|
||
"fork": false,
|
||
"created_at": "2025-06-23T01:23:09Z",
|
||
"updated_at": "2025-06-29T11:02:55Z",
|
||
"pushed_at": "2025-06-23T02:47:40Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 6,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1006980686,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "dennisec\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "dennisec",
|
||
"id": 87594979,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87594979?v=4",
|
||
"html_url": "https:\/\/github.com\/dennisec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dennisec\/CVE-2025-3248",
|
||
"description": "CVE-2025-3248",
|
||
"fork": false,
|
||
"created_at": "2025-06-23T09:30:48Z",
|
||
"updated_at": "2025-06-23T09:30:48Z",
|
||
"pushed_at": "2025-06-23T09:30:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1006983984,
|
||
"name": "Mass-CVE-2025-3248",
|
||
"full_name": "dennisec\/Mass-CVE-2025-3248",
|
||
"owner": {
|
||
"login": "dennisec",
|
||
"id": 87594979,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87594979?v=4",
|
||
"html_url": "https:\/\/github.com\/dennisec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dennisec\/Mass-CVE-2025-3248",
|
||
"description": "Mass-CVE-2025-3248",
|
||
"fork": false,
|
||
"created_at": "2025-06-23T09:36:39Z",
|
||
"updated_at": "2025-08-04T21:56:15Z",
|
||
"pushed_at": "2025-06-23T09:43:55Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1008110127,
|
||
"name": "Langflow-CVE-2025-3248-Multi-target",
|
||
"full_name": "ill-deed\/Langflow-CVE-2025-3248-Multi-target",
|
||
"owner": {
|
||
"login": "ill-deed",
|
||
"id": 210107232,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210107232?v=4",
|
||
"html_url": "https:\/\/github.com\/ill-deed",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ill-deed\/Langflow-CVE-2025-3248-Multi-target",
|
||
"description": "Langflow versions prior to 1.3.0 are susceptible to code injection in the \/api\/v1\/validate\/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.",
|
||
"fork": false,
|
||
"created_at": "2025-06-25T03:40:58Z",
|
||
"updated_at": "2025-07-27T23:44:43Z",
|
||
"pushed_at": "2025-07-27T23:44:40Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1014573339,
|
||
"name": "CVE-2025-3248",
|
||
"full_name": "r0otk3r\/CVE-2025-3248",
|
||
"owner": {
|
||
"login": "r0otk3r",
|
||
"id": 211012408,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/211012408?v=4",
|
||
"html_url": "https:\/\/github.com\/r0otk3r",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/r0otk3r\/CVE-2025-3248",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2025-07-06T01:49:50Z",
|
||
"updated_at": "2025-07-13T17:17:03Z",
|
||
"pushed_at": "2025-07-12T10:56:35Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
}
|
||
] |