Experimental browser for the Atmosphere
{ "uri": "at://did:plc:o4s55v3tsfph6whswxccpsia/app.bsky.feed.generator/aaahm7wqbfj3q", "cid": "bafyreichlntmdepischcjrmyk7ma2eab7dyionroy6mr4pscc6d5wpr5ca", "value": { "did": "did:web:skyfeed.me", "$type": "app.bsky.feed.generator", "avatar": { "$type": "blob", "ref": { "$link": "bafkreia6hldn3v3b3fbzlc55dl56pxts4gzgxz6vpjocqtgbnunzmcw4l4" }, "mimeType": "image/png", "size": 269662 }, "createdAt": "2024-12-29T16:11:52.074Z", "description": "Posts mentioning Palo Alto or including a link to a local news outlet\n\nExcludes terms related to Palo Alto Networks", "displayName": "Palo Alto", "skyfeedBuilder": { "blocks": [ { "id": "aaahm7wqbg3iq", "type": "input", "inputType": "firehose", "firehoseSeconds": 604800 }, { "id": "aaahm7wqbfwiy", "type": "regex", "value": "Palo.Alto|PaloAlto|padailypost|Palo.Altan|\\#PaloAlto", "target": "text|alt_text|link", "caseSensitive": false }, { "id": "aaaikmd7dgzgq", "type": "regex", "value": "(firewall|network|ipsec|WatchTowr|privsec|paloaltontwks|IPINFO|VPN|Threat.Actor|CISO|vulnerability|vulnerabilities|CIDR|exploit|patching|Zero.Day|0.day|Palo.Alto.RCE|CVE\\-|AttackSurface|attack.surface|malware|Palo.Alto.Networks|Battlefield|infosec|PAN-OS|0day|iowa|Kim(-|\\b| )Reynolds|kcrg\\.com)", "invert": true, "target": "text|alt_text|link", "caseSensitive": false }, { "id": "aaahm7wqbeps4", "type": "sort", "gravity": "2.2", "sortType": "hn" }, { "id": "aaaeljr5wxoqo", "type": "limit", "count": 2 }, { "id": "aaaeljjzzsl7m", "key": "gkx7hoa", "type": "stash", "action": "stash" }, { "id": "aaaeljlwu2jla", "type": "input", "inputType": "firehose", "firehoseSeconds": 604800 }, { "id": "aaaeljmr4v5xq", "type": "regex", "value": "Palo.Alto|PaloAlto|padailypost|Palo.Altan|\\#PaloAlto", "target": "text|alt_text|link", "caseSensitive": false }, { "id": "aaaeljpzdghzq", "type": "regex", "value": "firewall|network|ipsec|WatchTowr|privsec|paloaltontwks|IPINFO|VPN|Threat.Actor|CISO|vulnerability|vulnerabilities|CIDR|exploit|patching|Zero.Day|0.day|Palo.Alto.RCE|AttackSurface|CVE\\-|Attack.surface|malware|bird|birds|Palo.Alto.Networks|Battlefield|infosec|PAN-OS|0day|iowa|Kim(-|\\b| )Reynolds|kcrg\\.com", "invert": true, "target": "text|alt_text|link", "caseSensitive": false }, { "id": "aaaeljjzzsbnw", "key": "gkx7hoa", "type": "stash", "action": "pop" }, { "id": "aaaeljtqyfeya", "type": "remove", "subject": "duplicates" }, { "id": "aaalhaspy36ly", "type": "remove", "listUri": "at://did:plc:o4s55v3tsfph6whswxccpsia/app.bsky.graph.list/3lcyot63cd42s", "subject": "list" }, { "id": "aaai7qqzkjtu6", "did": "https://bsky.app/profile/paloaltoonline.com", "type": "input", "listUri": "at://did:plc:o4s55v3tsfph6whswxccpsia/app.bsky.graph.list/3lchacohj3h23", "inputType": "list", "collection": "post|reply" }, { "id": "aaaelj52okadq", "type": "sort", "gravity": "2.2", "sortType": "hn" } ], "license": "EUPL-1.2", "displayName": "Palo Alto" } } }