<svg width="110" height="18" fill="none" xmlns="http://www.w3.org/2000/svg"><g clip-path="url(#a)" fill="#000"><path d="M79.42 9.335c0-.484.523-.672 1.085-.672.908 0 1.769.282 1.769.282V7.628c-.59-.174-1.193-.241-1.89-.241-1.528 0-2.6.725-2.6 1.908 0 2.299 3.162 1.708 3.162 2.823 0 .551-.495.7-1.218.7-.51 0-1.327-.2-1.916-.406v1.304c.49.195 1.18.378 1.862.378 1.487 0 2.907-.444 2.907-2.043 0-2.218-3.162-1.64-3.162-2.715l.001-.001Zm8.337 1.345c0-1.491.817-2.003 1.783-2.003.643 0 1.32.19 1.774.364V7.696c-.536-.174-1.01-.31-1.802-.31-2.104 0-3.404 1.291-3.404 3.375 0 1.975.938 3.333 3.31 3.333.75 0 1.333-.148 1.976-.364v-1.317c-.723.282-1.279.39-1.775.39-1.044 0-1.862-.484-1.862-2.124v.001ZM42.273 8.596h-.054V7.548h-1.474v6.384h1.581v-3.804c.496-.94 1.099-1.25 2.105-1.25h.16V7.494s-.227-.027-.428-.027c-.858 0-1.448.336-1.89 1.13Zm19.837 0h-.053V7.548h-1.474v6.384h1.58v-3.804c.497-.94 1.1-1.25 2.105-1.25h.16V7.494s-.227-.027-.428-.027c-.857 0-1.447.336-1.889 1.13Zm45.76-1.21c-.682 0-1.46.377-2.171.848l-.187.12c-.335-.712-1.005-.967-1.742-.967-.683 0-1.461.35-2.171.82v-.66h-1.501v6.385h1.594V9.35c.59-.39 1.219-.632 1.676-.632.523 0 .844.282.844 1.183v4.032h1.581v-4.57c.59-.39 1.219-.645 1.676-.645.523 0 .845.282.845 1.183v4.032h1.581V9.524c0-1.237-.738-2.137-2.024-2.137h-.001Zm-12.262 5.431c-1.032 0-1.58-.671-1.58-2.07 0-1.398.548-2.07 1.58-2.07s1.568.673 1.568 2.07c0 1.398-.536 2.07-1.568 2.07Zm0-5.43c-2.184 0-3.216 1.411-3.216 3.36 0 1.95 1.032 3.347 3.216 3.347s3.216-1.399 3.216-3.347-1.045-3.36-3.216-3.36ZM73.664 9.336c0-.484.523-.672 1.086-.672.907 0 1.768.282 1.768.282V7.63c-.59-.174-1.193-.241-1.889-.241-1.527 0-2.6.725-2.6 1.908 0 2.299 3.163 1.708 3.163 2.823 0 .551-.496.7-1.22.7-.508 0-1.325-.2-1.915-.406v1.304c.491.195 1.178.378 1.862.378 1.487 0 2.908-.444 2.908-2.043 0-2.218-3.163-1.64-3.163-2.715v-.001Zm-6.86.7c.094-.887.576-1.452 1.366-1.452.845 0 1.099.673 1.099 1.452h-2.466Zm1.38-2.648c-2.037 0-3.096 1.586-3.096 3.32 0 2.38 1.245 3.387 3.267 3.387.817 0 1.523-.109 2.347-.363v-1.32c-.664.244-1.263.391-1.905.391-1.178 0-1.967-.323-2.008-1.72h4.074c.027-.256.054-.497.054-.94 0-1.345-.71-2.756-2.734-2.756ZM56.3 9.483h-1.254V6.257H56.3c1.019 0 1.527.564 1.527 1.573s-.469 1.653-1.527 1.653Zm-.013-4.556h-2.928v9.004h1.688V10.8h1.24c1.916 0 3.31-1.035 3.31-2.97 0-1.935-1.394-2.903-3.31-2.903ZM49.82 12.09c-.51.47-.992.725-1.5.725-.871 0-1.435-.578-1.435-1.935 0-1.465.697-2.231 1.903-2.231.375 0 .764.094 1.032.202v3.239Zm0-4.557c-.47-.094-.805-.149-1.193-.149-2.184 0-3.377 1.466-3.377 3.603 0 2.137 1.193 3.105 2.6 3.105.697 0 1.54-.323 2.05-.753v.591h1.5V4.926h-1.58v2.608Zm-13.565 5.282c-1.031 0-1.58-.671-1.58-2.07 0-1.398.549-2.07 1.58-2.07 1.032 0 1.569.673 1.569 2.07 0 1.397-.537 2.07-1.569 2.07Zm0-5.43c-2.184 0-3.216 1.41-3.216 3.36s1.032 3.347 3.216 3.347c2.185 0 3.216-1.399 3.216-3.347s-1.044-3.36-3.215-3.36Zm47.372 6.545h1.587v-1.64h-1.587v1.64ZM31.608 4.926 29.82 11.82 28.03 4.926h-1.805l.42 1.477-1.575 5.65-1.712-7.128H21.62l2.441 9.005h1.892l1.462-4.815 1.37 4.815h1.892l2.563-9.005h-1.634.001ZM8.973 0C4.025 0 0 4.037 0 9s4.025 9 8.973 9 8.973-4.038 8.973-9-4.026-9-8.973-9ZM.906 9c0-1.173.25-2.287.698-3.293l3.849 10.575A8.095 8.095 0 0 1 .906 9Zm8.067 8.092a8.052 8.052 0 0 1-2.28-.329l2.42-7.055 2.48 6.814c.017.04.037.076.059.112a8.02 8.02 0 0 1-2.68.458Zm1.111-11.885a16 16 0 0 0 .924-.077c.435-.052.383-.693-.051-.667 0 0-1.307.103-2.15.103-.793 0-2.126-.103-2.126-.103-.435-.026-.485.64-.051.667 0 0 .411.052.846.077L8.733 8.66l-1.766 5.311L4.03 5.206c.486-.026.924-.077.924-.077.434-.052.383-.693-.052-.667 0 0-1.306.103-2.15.103-.151 0-.33-.004-.519-.01A8.049 8.049 0 0 1 14.42 3.033c-.035-.003-.069-.007-.105-.007-.792 0-1.355.693-1.355 1.436 0 .667.384 1.231.792 1.897.307.54.666 1.232.666 2.232 0 .692-.266 1.496-.614 2.615l-.806 2.697-2.915-8.698.002.002Zm5.967-.088a8.077 8.077 0 0 1 .989 3.882 8.09 8.09 0 0 1-4.012 6.994l2.464-7.146c.461-1.155.614-2.078.614-2.9 0-.297-.02-.573-.055-.831v.001Z"/></g><defs><clipPath id="a"><path fill="#fff" d="M0 0h109.895v18H0z"/></clipPath></defs></svg>{"id":20203,"date":"2022-06-01T08:39:58","date_gmt":"2022-06-01T12:39:58","guid":{"rendered":"https:\/\/pley2win.com\/metaverse\/how-hackers-can-steal-your-seed-phrase\/"},"modified":"2022-06-01T08:39:58","modified_gmt":"2022-06-01T12:39:58","slug":"how-hackers-can-steal-your-seed-phrase","status":"publish","type":"post","link":"https:\/\/pley2win.com\/?p=20203","title":{"rendered":"How Hackers Can Steal Your Seed Phrase"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Thinking of saving the keys or seed phrase to your wallet on a Microsoft Word document? Think again. Crypto researchers have exposed a severe 0-day vulnerability called #Follina. This allows crypto hackers to take full control of your computer without opening any files. Here\u2019s how.<\/p>\n<figure id=\"attachment_64585\" aria-describedby=\"caption-attachment-64585\" style=\"width: 788px\" class=\"wp-caption aligncenter\"><picture class=\"wp-image-64585 size-large\"><source type=\"image\/webp\" srcset=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-1024x768.jpg.webp 1024w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-300x225.jpg.webp 300w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-768x576.jpg.webp 768w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-1536x1152.jpg.webp 1536w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-2048x1536.jpg.webp 2048w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-150x112.jpg.webp 150w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-450x337.jpg.webp 450w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-1200x900.jpg.webp 1200w\" sizes=\"(max-width: 788px) 100vw, 788px\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-1024x768.jpg\" alt=\"seed phrase crypto hackers microsoft word\" width=\"788\" height=\"591\" srcset=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-1024x768.jpg 1024w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-300x225.jpg 300w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-768x576.jpg 768w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-1536x1152.jpg 1536w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-2048x1536.jpg 2048w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-150x112.jpg 150w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-450x337.jpg 450w, https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-1200x900.jpg 1200w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\"\/>\n<\/picture><figcaption id=\"caption-attachment-64585\" class=\"wp-caption-text\">Crypto hackers are finding new ways to steal seed phrases.<\/figcaption><\/figure>\n<h2>How crypto hackers are stealing seed phrases via Microsoft Word<\/h2>\n<p>According to <a href=\"https:\/\/twitter.com\/wallet_guard\/status\/1531848479911432192?s=20&amp;t=ezPEcs3V038NgvHZKYga3w\">web3 security advocate @wallet_guard:<\/a> \u201cThe 0-day starts with a feature in MS Word called Templates. This feature allows Word to load and execute HTML and JS from external sources. Using the Template\u2019s HTML and Javascript the payload then runs the following Powershell command to run a service called Microsoft Support Diagnostic Tool, or MSDT.\u201d<\/p>\n<p>While MSDT is usually used as a diagnostic tool to debug problems in your operating system, it also allows IT experts and Microsoft personnel to remotely control your computer. Although it normally requires a user to enter a password, it also has a buffer that overcomes the password requirement. Therefore, crypto hackers can easily use this buffer to gain access to your documents.<\/p>\n<p>The whole affair is a 0-click exploit, because.rtf file previews execute the malicious code simply by downloading the file and viewing it in file explorer. Therefore, any word document can be malicious without knowing.<\/p>\n<h2>Why is this crucial for web3 enthusiasts?<\/h2>\n<p>Since some web3 and crypto enthusiasts store their keys and seed phrases on a Word Doc, knowing about this exploit is crucial. Therefore, all files must be considered vulnerable, and everyone must take additional precautions to protect their information.<\/p>\n<p>According to @wallet_guard, web3 and crypto enthusiasts should not use Microsoft Word at this point in time, but instead, use Google Docs. In addition, they must disable MSDT and use.pdf instead of other file extensions.<\/p>\n<p>This Microsoft Word loophole is another nail in the coffin for the crypto community; especially as it has been battling Discord hackers for the last few months.<\/p>\n<div class=\"bottom-text__wrapper post-content\">\n<hr\/>\n<p>Are you tired of <strong>missing important NFT drops<\/strong>?<\/p>\n<p>Just check out our NFT Calendar!<\/p>\n<p><b>Receive the biggest NFT news of the day &amp; recommendations in our <\/b><strong>Daily newsletter.\u00a0<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr\/>\n<p><em>All investment\/financial opinions expressed by NFTevening.com are not recommendations.<\/em><\/p>\n<p><em>This article is educational material.<\/em><\/p>\n<p><em>As always, make your own research prior to making any kind of investment.<\/em><\/p>\n<\/div>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/nftevening.com\/not-even-word-docs-are-safe-how-hackers-can-steal-your-seed-phrase\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thinking of saving the keys or seed phrase to your wallet on a Microsoft Word document? Think again. Crypto researchers have exposed a severe 0-day vulnerability called #Follina. This allows crypto hackers to take full control of your computer without opening any files. Here\u2019s how. Crypto hackers are finding new ways to steal seed phrases. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":20204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg","fifu_image_alt":"","footnotes":""},"categories":[681],"tags":[],"class_list":["post-20203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-metaverse"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Hackers Can Steal Your Seed Phrase - Gaming News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pley2win.com\/?p=20203\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Can Steal Your Seed Phrase - Gaming News\" \/>\n<meta property=\"og:description\" content=\"Thinking of saving the keys or seed phrase to your wallet on a Microsoft Word document? Think again. Crypto researchers have exposed a severe 0-day vulnerability called #Follina. This allows crypto hackers to take full control of your computer without opening any files. Here\u2019s how. Crypto hackers are finding new ways to steal seed phrases. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pley2win.com\/?p=20203\" \/>\n<meta property=\"og:site_name\" content=\"Gaming News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-01T12:39:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg\" \/>\n<meta name=\"author\" content=\"pley2win\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pley2win\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Hackers Can Steal Your Seed Phrase - Gaming News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pley2win.com\/?p=20203","og_locale":"en_US","og_type":"article","og_title":"How Hackers Can Steal Your Seed Phrase - Gaming News","og_description":"Thinking of saving the keys or seed phrase to your wallet on a Microsoft Word document? Think again. Crypto researchers have exposed a severe 0-day vulnerability called #Follina. This allows crypto hackers to take full control of your computer without opening any files. Here\u2019s how. Crypto hackers are finding new ways to steal seed phrases. [&hellip;]","og_url":"https:\/\/pley2win.com\/?p=20203","og_site_name":"Gaming News","article_published_time":"2022-06-01T12:39:58+00:00","og_image":[{"url":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg","type":"","width":"","height":""}],"author":"pley2win","twitter_card":"summary_large_image","twitter_image":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg","twitter_misc":{"Written by":"pley2win","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pley2win.com\/?p=20203#article","isPartOf":{"@id":"https:\/\/pley2win.com\/?p=20203"},"author":{"name":"pley2win","@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"headline":"How Hackers Can Steal Your Seed Phrase","datePublished":"2022-06-01T12:39:58+00:00","mainEntityOfPage":{"@id":"https:\/\/pley2win.com\/?p=20203"},"wordCount":400,"commentCount":0,"publisher":{"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"image":{"@id":"https:\/\/pley2win.com\/?p=20203#primaryimage"},"thumbnailUrl":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg","articleSection":["Metaverse"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pley2win.com\/?p=20203#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pley2win.com\/?p=20203","url":"https:\/\/pley2win.com\/?p=20203","name":"How Hackers Can Steal Your Seed Phrase - Gaming News","isPartOf":{"@id":"https:\/\/pley2win.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pley2win.com\/?p=20203#primaryimage"},"image":{"@id":"https:\/\/pley2win.com\/?p=20203#primaryimage"},"thumbnailUrl":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg","datePublished":"2022-06-01T12:39:58+00:00","breadcrumb":{"@id":"https:\/\/pley2win.com\/?p=20203#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pley2win.com\/?p=20203"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pley2win.com\/?p=20203#primaryimage","url":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg","contentUrl":"https:\/\/nftevening.com\/wp-content\/uploads\/2022\/06\/kevin-ku-w7ZyuGYNpRQ-unsplash-scaled.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/pley2win.com\/?p=20203#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pley2win.com\/"},{"@type":"ListItem","position":2,"name":"How Hackers Can Steal Your Seed Phrase"}]},{"@type":"WebSite","@id":"https:\/\/pley2win.com\/#website","url":"https:\/\/pley2win.com\/","name":"Gaming News","description":"Video Gaming News","publisher":{"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pley2win.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d","name":"pley2win","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","url":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","contentUrl":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","width":700,"height":250,"caption":"pley2win"},"logo":{"@id":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png"},"sameAs":["http:\/\/www.pley2win.com"],"url":"https:\/\/pley2win.com\/?author=3"}]}},"_links":{"self":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/20203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20203"}],"version-history":[{"count":0,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/20203\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/media\/20204"}],"wp:attachment":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=20203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=20203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}