ATProto Browser

ATProto Browser

Experimental browser for the Atmosphere

Record data

{
  "uri": "at://did:plc:o4s55v3tsfph6whswxccpsia/app.bsky.feed.generator/aaahm7wqbfj3q",
  "cid": "bafyreichlntmdepischcjrmyk7ma2eab7dyionroy6mr4pscc6d5wpr5ca",
  "value": {
    "did": "did:web:skyfeed.me",
    "$type": "app.bsky.feed.generator",
    "avatar": {
      "$type": "blob",
      "ref": {
        "$link": "bafkreia6hldn3v3b3fbzlc55dl56pxts4gzgxz6vpjocqtgbnunzmcw4l4"
      },
      "mimeType": "image/png",
      "size": 269662
    },
    "createdAt": "2024-12-29T16:11:52.074Z",
    "description": "Posts mentioning Palo Alto or including a link to a local news outlet\n\nExcludes terms related to Palo Alto Networks",
    "displayName": "Palo Alto",
    "skyfeedBuilder": {
      "blocks": [
        {
          "id": "aaahm7wqbg3iq",
          "type": "input",
          "inputType": "firehose",
          "firehoseSeconds": 604800
        },
        {
          "id": "aaahm7wqbfwiy",
          "type": "regex",
          "value": "Palo.Alto|PaloAlto|padailypost|Palo.Altan|\\#PaloAlto",
          "target": "text|alt_text|link",
          "caseSensitive": false
        },
        {
          "id": "aaaikmd7dgzgq",
          "type": "regex",
          "value": "(firewall|network|ipsec|WatchTowr|privsec|paloaltontwks|IPINFO|VPN|Threat.Actor|CISO|vulnerability|vulnerabilities|CIDR|exploit|patching|Zero.Day|0.day|Palo.Alto.RCE|CVE\\-|AttackSurface|attack.surface|malware|Palo.Alto.Networks|Battlefield|infosec|PAN-OS|0day|iowa|Kim(-|\\b| )Reynolds|kcrg\\.com)",
          "invert": true,
          "target": "text|alt_text|link",
          "caseSensitive": false
        },
        {
          "id": "aaahm7wqbeps4",
          "type": "sort",
          "gravity": "2.2",
          "sortType": "hn"
        },
        {
          "id": "aaaeljr5wxoqo",
          "type": "limit",
          "count": 2
        },
        {
          "id": "aaaeljjzzsl7m",
          "key": "gkx7hoa",
          "type": "stash",
          "action": "stash"
        },
        {
          "id": "aaaeljlwu2jla",
          "type": "input",
          "inputType": "firehose",
          "firehoseSeconds": 604800
        },
        {
          "id": "aaaeljmr4v5xq",
          "type": "regex",
          "value": "Palo.Alto|PaloAlto|padailypost|Palo.Altan|\\#PaloAlto",
          "target": "text|alt_text|link",
          "caseSensitive": false
        },
        {
          "id": "aaaeljpzdghzq",
          "type": "regex",
          "value": "firewall|network|ipsec|WatchTowr|privsec|paloaltontwks|IPINFO|VPN|Threat.Actor|CISO|vulnerability|vulnerabilities|CIDR|exploit|patching|Zero.Day|0.day|Palo.Alto.RCE|AttackSurface|CVE\\-|Attack.surface|malware|bird|birds|Palo.Alto.Networks|Battlefield|infosec|PAN-OS|0day|iowa|Kim(-|\\b| )Reynolds|kcrg\\.com",
          "invert": true,
          "target": "text|alt_text|link",
          "caseSensitive": false
        },
        {
          "id": "aaaeljjzzsbnw",
          "key": "gkx7hoa",
          "type": "stash",
          "action": "pop"
        },
        {
          "id": "aaaeljtqyfeya",
          "type": "remove",
          "subject": "duplicates"
        },
        {
          "id": "aaalhaspy36ly",
          "type": "remove",
          "listUri": "at://did:plc:o4s55v3tsfph6whswxccpsia/app.bsky.graph.list/3lcyot63cd42s",
          "subject": "list"
        },
        {
          "id": "aaai7qqzkjtu6",
          "did": "https://bsky.app/profile/paloaltoonline.com",
          "type": "input",
          "listUri": "at://did:plc:o4s55v3tsfph6whswxccpsia/app.bsky.graph.list/3lchacohj3h23",
          "inputType": "list",
          "collection": "post|reply"
        },
        {
          "id": "aaaelj52okadq",
          "type": "sort",
          "gravity": "2.2",
          "sortType": "hn"
        }
      ],
      "license": "EUPL-1.2",
      "displayName": "Palo Alto"
    }
  }
}