PoC-in-GitHub/2025/CVE-2025-3248.json
2025-12-11 21:46:11 +09:00

729 lines
No EOL
26 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 963904467,
"name": "CVE-2025-3248",
"full_name": "xuemian168\/CVE-2025-3248",
"owner": {
"login": "xuemian168",
"id": 38741078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38741078?v=4",
"html_url": "https:\/\/github.com\/xuemian168",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xuemian168\/CVE-2025-3248",
"description": "A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025-3248 漏洞的工具。",
"fork": false,
"created_at": "2025-04-10T11:45:57Z",
"updated_at": "2025-06-25T11:04:06Z",
"pushed_at": "2025-04-10T12:32:30Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ai",
"langflow"
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 963981735,
"name": "CVE-2025-3248-POC",
"full_name": "PuddinCat\/CVE-2025-3248-POC",
"owner": {
"login": "PuddinCat",
"id": 131779933,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131779933?v=4",
"html_url": "https:\/\/github.com\/PuddinCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PuddinCat\/CVE-2025-3248-POC",
"description": "POC of CVE-2025-3248, RCE of LangFlow",
"fork": false,
"created_at": "2025-04-10T14:04:29Z",
"updated_at": "2025-04-10T19:31:11Z",
"pushed_at": "2025-04-10T16:39:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248",
"exp",
"langflow",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 967470704,
"name": "CVE-2025-3248",
"full_name": "verylazytech\/CVE-2025-3248",
"owner": {
"login": "verylazytech",
"id": 172168670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
"html_url": "https:\/\/github.com\/verylazytech",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/verylazytech\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-04-16T14:00:02Z",
"updated_at": "2025-08-14T05:03:42Z",
"pushed_at": "2025-04-16T16:48:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248",
"langflow",
"rce"
],
"visibility": "public",
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 978265945,
"name": "CVE-2025-3248",
"full_name": "Praison001\/CVE-2025-3248",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2025-3248",
"description": "Scanner and exploit for CVE-2025-3248",
"fork": false,
"created_at": "2025-05-05T18:10:44Z",
"updated_at": "2025-12-01T05:34:04Z",
"pushed_at": "2025-05-05T18:20:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 982933237,
"name": "CVE-2025-3248",
"full_name": "vigilante-1337\/CVE-2025-3248",
"owner": {
"login": "vigilante-1337",
"id": 208334620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/208334620?v=4",
"html_url": "https:\/\/github.com\/vigilante-1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vigilante-1337\/CVE-2025-3248",
"description": "CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution without authentication, potentially giving attackers control over the server.",
"fork": false,
"created_at": "2025-05-13T16:08:37Z",
"updated_at": "2025-05-16T09:16:58Z",
"pushed_at": "2025-05-13T16:12:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 991032075,
"name": "CVE-2025-3248",
"full_name": "Vip3rLi0n\/CVE-2025-3248",
"owner": {
"login": "Vip3rLi0n",
"id": 21289340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21289340?v=4",
"html_url": "https:\/\/github.com\/Vip3rLi0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Vip3rLi0n\/CVE-2025-3248",
"description": "Perform Remote Code Execution using vulnerable API endpoint.",
"fork": false,
"created_at": "2025-05-27T03:01:16Z",
"updated_at": "2025-05-27T15:35:27Z",
"pushed_at": "2025-05-27T03:03:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-3248"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 993961114,
"name": "RCE-CVE-2025-3248",
"full_name": "tiemio\/RCE-CVE-2025-3248",
"owner": {
"login": "tiemio",
"id": 196255514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/196255514?v=4",
"html_url": "https:\/\/github.com\/tiemio",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tiemio\/RCE-CVE-2025-3248",
"description": "This Python script exploits CVE-2025-3248 to execute arbitrary commands or spawn a reverse shell on a vulnerable system. Authentication is required to use this exploit.",
"fork": false,
"created_at": "2025-05-31T22:25:35Z",
"updated_at": "2025-10-31T07:13:48Z",
"pushed_at": "2025-05-31T22:29:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1003514619,
"name": "CVE-2025-3248-Langflow-RCE",
"full_name": "ynsmroztas\/CVE-2025-3248-Langflow-RCE",
"owner": {
"login": "ynsmroztas",
"id": 58443521,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58443521?v=4",
"html_url": "https:\/\/github.com\/ynsmroztas",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ynsmroztas\/CVE-2025-3248-Langflow-RCE",
"description": "CVE-2025-3248 Langflow RCE Exploit",
"fork": false,
"created_at": "2025-06-17T09:06:20Z",
"updated_at": "2025-12-05T10:47:33Z",
"pushed_at": "2025-06-17T09:07:43Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"score": 0,
"subscribers_count": 0
},
{
"id": 1004051602,
"name": "CVE-2025-3248",
"full_name": "imbas007\/CVE-2025-3248",
"owner": {
"login": "imbas007",
"id": 100182585,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100182585?v=4",
"html_url": "https:\/\/github.com\/imbas007",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/imbas007\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-06-18T03:42:57Z",
"updated_at": "2025-07-18T01:09:53Z",
"pushed_at": "2025-06-18T04:35:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1004536002,
"name": "CVE-2025-3248",
"full_name": "0xgh057r3c0n\/CVE-2025-3248",
"owner": {
"login": "0xgh057r3c0n",
"id": 144083709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144083709?v=4",
"html_url": "https:\/\/github.com\/0xgh057r3c0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xgh057r3c0n\/CVE-2025-3248",
"description": "Exploit for Langflow AI Remote Code Execution (Unauthenticated)",
"fork": false,
"created_at": "2025-06-18T19:27:52Z",
"updated_at": "2025-06-18T19:59:16Z",
"pushed_at": "2025-06-18T19:59:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1004764154,
"name": "CVE-2025-3248",
"full_name": "zapstiko\/CVE-2025-3248",
"owner": {
"login": "zapstiko",
"id": 44252004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44252004?v=4",
"html_url": "https:\/\/github.com\/zapstiko",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zapstiko\/CVE-2025-3248",
"description": "CVE-2025-3248 — Langflow RCE Exploit",
"fork": false,
"created_at": "2025-06-19T06:30:29Z",
"updated_at": "2025-07-16T04:58:33Z",
"pushed_at": "2025-06-19T06:47:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006591365,
"name": "Blackash-CVE-2025-3248",
"full_name": "Ashwesker\/Blackash-CVE-2025-3248",
"owner": {
"login": "Ashwesker",
"id": 215029052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
"html_url": "https:\/\/github.com\/Ashwesker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ashwesker\/Blackash-CVE-2025-3248",
"description": "CVE-2025-3248 Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage",
"fork": false,
"created_at": "2025-06-22T15:49:32Z",
"updated_at": "2025-06-22T21:20:28Z",
"pushed_at": "2025-06-22T21:20:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006778763,
"name": "langflow-rce-exploit",
"full_name": "0-d3y\/langflow-rce-exploit",
"owner": {
"login": "0-d3y",
"id": 103077384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103077384?v=4",
"html_url": "https:\/\/github.com\/0-d3y",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0-d3y\/langflow-rce-exploit",
"description": "Remote Code Execution Exploit for Langflow (CVE-2025-3248) - [ By S4Tech ]",
"fork": false,
"created_at": "2025-06-23T01:23:09Z",
"updated_at": "2025-12-10T21:36:25Z",
"pushed_at": "2025-06-23T02:47:40Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006980686,
"name": "CVE-2025-3248",
"full_name": "dennisec\/CVE-2025-3248",
"owner": {
"login": "dennisec",
"id": 87594979,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87594979?v=4",
"html_url": "https:\/\/github.com\/dennisec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dennisec\/CVE-2025-3248",
"description": "CVE-2025-3248",
"fork": false,
"created_at": "2025-06-23T09:30:48Z",
"updated_at": "2025-06-23T09:30:48Z",
"pushed_at": "2025-06-23T09:30:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1006983984,
"name": "Mass-CVE-2025-3248",
"full_name": "dennisec\/Mass-CVE-2025-3248",
"owner": {
"login": "dennisec",
"id": 87594979,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87594979?v=4",
"html_url": "https:\/\/github.com\/dennisec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dennisec\/Mass-CVE-2025-3248",
"description": "Mass-CVE-2025-3248",
"fork": false,
"created_at": "2025-06-23T09:36:39Z",
"updated_at": "2025-08-04T21:56:15Z",
"pushed_at": "2025-06-23T09:43:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1008110127,
"name": "Langflow-CVE-2025-3248-Multi-target",
"full_name": "ill-deed\/Langflow-CVE-2025-3248-Multi-target",
"owner": {
"login": "ill-deed",
"id": 210107232,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210107232?v=4",
"html_url": "https:\/\/github.com\/ill-deed",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ill-deed\/Langflow-CVE-2025-3248-Multi-target",
"description": "Langflow versions prior to 1.3.0 are susceptible to code injection in the \/api\/v1\/validate\/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.",
"fork": false,
"created_at": "2025-06-25T03:40:58Z",
"updated_at": "2025-07-27T23:44:43Z",
"pushed_at": "2025-07-27T23:44:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1014573339,
"name": "CVE-2025-3248",
"full_name": "r0otk3r\/CVE-2025-3248",
"owner": {
"login": "r0otk3r",
"id": 211012408,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/211012408?v=4",
"html_url": "https:\/\/github.com\/r0otk3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r0otk3r\/CVE-2025-3248",
"description": null,
"fork": false,
"created_at": "2025-07-06T01:49:50Z",
"updated_at": "2025-07-13T17:17:03Z",
"pushed_at": "2025-07-12T10:56:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1049411921,
"name": "CVE-2025-3248",
"full_name": "min8282\/CVE-2025-3248",
"owner": {
"login": "min8282",
"id": 137873062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137873062?v=4",
"html_url": "https:\/\/github.com\/min8282",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/min8282\/CVE-2025-3248",
"description": "CVE-2025-3248",
"fork": false,
"created_at": "2025-09-03T00:13:48Z",
"updated_at": "2025-09-17T08:57:34Z",
"pushed_at": "2025-09-17T08:57:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1056869023,
"name": "CVE-2025-3248",
"full_name": "EQSTLab\/CVE-2025-3248",
"owner": {
"login": "EQSTLab",
"id": 148991397,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148991397?v=4",
"html_url": "https:\/\/github.com\/EQSTLab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/EQSTLab\/CVE-2025-3248",
"description": "Langflow Remote Code Execution",
"fork": false,
"created_at": "2025-09-15T00:38:05Z",
"updated_at": "2025-09-17T08:56:19Z",
"pushed_at": "2025-09-17T08:56:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1058622204,
"name": "CVE-2025-3248",
"full_name": "wand3rlust\/CVE-2025-3248",
"owner": {
"login": "wand3rlust",
"id": 83376115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83376115?v=4",
"html_url": "https:\/\/github.com\/wand3rlust",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wand3rlust\/CVE-2025-3248",
"description": "PoC for achieving RCE in Langflow versions <1.3.0",
"fork": false,
"created_at": "2025-09-17T10:30:09Z",
"updated_at": "2025-10-02T10:48:06Z",
"pushed_at": "2025-12-06T05:07:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1082583408,
"name": "cve-2025-3248",
"full_name": "bambooqj\/cve-2025-3248",
"owner": {
"login": "bambooqj",
"id": 20792621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20792621?v=4",
"html_url": "https:\/\/github.com\/bambooqj",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bambooqj\/cve-2025-3248",
"description": "Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()\/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等",
"fork": false,
"created_at": "2025-10-24T13:08:17Z",
"updated_at": "2025-10-24T13:09:57Z",
"pushed_at": "2025-10-24T13:09:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1100213523,
"name": "cve-2025-3248-exploit",
"full_name": "drackyjr\/cve-2025-3248-exploit",
"owner": {
"login": "drackyjr",
"id": 146464209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146464209?v=4",
"html_url": "https:\/\/github.com\/drackyjr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/drackyjr\/cve-2025-3248-exploit",
"description": "A comprehensive Python exploitation framework for testing and demonstrating CVE-2025-3248, a critical unauthenticated remote code execution vulnerability in Langflow versions ≤ 1.3.0.",
"fork": false,
"created_at": "2025-11-20T01:45:13Z",
"updated_at": "2025-11-21T06:43:03Z",
"pushed_at": "2025-11-21T06:43:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1113515155,
"name": "CVE-2025-3248-POC",
"full_name": "b0ySie7e\/CVE-2025-3248-POC",
"owner": {
"login": "b0ySie7e",
"id": 78715318,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78715318?v=4",
"html_url": "https:\/\/github.com\/b0ySie7e",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/b0ySie7e\/CVE-2025-3248-POC",
"description": null,
"fork": false,
"created_at": "2025-12-10T04:49:53Z",
"updated_at": "2025-12-10T21:17:50Z",
"pushed_at": "2025-12-10T21:22:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]