{"version":"1.0","provider_name":"Ver mi IP","provider_url":"https:\/\/vermiip.es\/blog","title":"GitHub y la seguridad del c\u00f3digo open source - Ver mi IP","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"arJAronRUD\"><a href=\"https:\/\/vermiip.es\/blog\/github-y-la-seguridad-del-codigo-open-source\/\">GitHub y la seguridad del c\u00f3digo open source<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/vermiip.es\/blog\/github-y-la-seguridad-del-codigo-open-source\/embed\/#?secret=arJAronRUD\" width=\"600\" height=\"338\" title=\"\u00abGitHub y la seguridad del c\u00f3digo open source\u00bb \u2014 Ver mi IP\" data-secret=\"arJAronRUD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/vermiip.es\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/vermiip.es\/blog\/wp-content\/uploads\/2026\/02\/output1-12.png","thumbnail_width":1792,"thumbnail_height":1024,"description":"Con la creciente popularidad del desarrollo open source, la seguridad del c\u00f3digo se ha convertido en un tema crucial. GitHub, como la plataforma principal para el alojamiento de proyectos open source, juega un papel vital al ofrecer herramientas y pr\u00e1cticas para garantizar la integridad y seguridad de los proyectos colaborativos. Este art\u00edculo examina c\u00f3mo GitHub aborda la seguridad del c\u00f3digo open source y ofrece mejores pr\u00e1cticas para mantener un entorno seguro."}