{"id":31,"date":"2026-01-16T14:59:18","date_gmt":"2026-01-16T13:59:18","guid":{"rendered":"https:\/\/secure-pipelines.com\/secure-pipelines\/"},"modified":"2026-03-25T09:03:36","modified_gmt":"2026-03-25T08:03:36","slug":"secure-pipelines","status":"publish","type":"page","link":"https:\/\/secure-pipelines.com\/fr\/","title":{"rendered":"Secure Pipelines"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Ing\u00e9nierie de la s\u00e9curit\u00e9 pour les pipelines CI\/CD et les cha\u00eenes d&rsquo;approvisionnement logicielles<\/h2>\n<p>Secure Pipelines est un hub de connaissances techniques d\u00e9di\u00e9 \u00e0 la s\u00e9curisation des pipelines CI\/CD, GitOps et de livraison logicielle. Ing\u00e9nierie de s\u00e9curit\u00e9 pratique, impl\u00e9mentations concr\u00e8tes et labs pratiques \u2014 du code \u00e0 la production.<\/p>\n<p>Con\u00e7u par des praticiens, pour des praticiens.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Commencez ici<\/h2>\n<p>Nouveau en s\u00e9curit\u00e9 CI\/CD ? Commencez par ces guides complets :<\/p>\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/complete-guide-ci-cd-pipeline-security\/\">Le guide complet de la s\u00e9curit\u00e9 des pipelines CI\/CD<\/a><\/strong> \u2014 Tout ce que vous devez savoir sur la s\u00e9curisation des pipelines, des fronti\u00e8res de confiance aux contr\u00f4les de d\u00e9ploiement.<\/li>\n<li><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/software-supply-chain\/software-supply-chain-security-comprehensive-guide\/\">S\u00e9curit\u00e9 de la cha\u00eene d&rsquo;approvisionnement logicielle : guide complet<\/a><\/strong> \u2014 D\u00e9pendances, int\u00e9grit\u00e9 des builds, signature des artefacts, provenance et SBOMs.<\/li>\n<li><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-threats-attacks-what-attackers-target-how-to-defend\/\">Menaces et attaques CI\/CD : ce que ciblent les attaquants<\/a><\/strong> \u2014 Techniques d&rsquo;attaque r\u00e9elles et comment s&rsquo;en d\u00e9fendre.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Guides par plateforme<\/h2>\n<table>\n<thead>\n<tr>\n<th>Plateforme<\/th>\n<th>Guide de r\u00e9f\u00e9rence<\/th>\n<th>Cheat Sheet<\/th>\n<th>Lab pratique<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>GitHub Actions<\/strong><\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/github-actions-security-definitive-guide\/\">Guide de s\u00e9curit\u00e9<\/a><\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/github-actions-security-cheat-sheet\/\">Cheat Sheet<\/a><\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-hardening-github-actions-workflows-permissions-pinning-secrets\/\">Lab de durcissement<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>GitLab CI<\/strong><\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/gitlab-ci-cd-security-definitive-guide\/\">Guide de s\u00e9curit\u00e9<\/a><\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/gitlab-ci-security-cheat-sheet\/\">Cheat Sheet<\/a><\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-securing-gitlab-ci-pipelines-protected-variables-runners-environments\/\">Lab de s\u00e9curisation<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Tekton<\/strong><\/td>\n<td colspan=\"2\">\u2014<\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-secure-build-pipeline-tekton-tekton-chains\/\">Lab Tekton Chains<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Guides \u00e0 la une<\/h2>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/signing-verifying-container-images-sigstore-cosign\/\">Signature et v\u00e9rification des images de conteneurs avec Sigstore et Cosign<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/secrets-management-ci-cd-pipelines-patterns-vault-2\/\">Gestion des secrets dans les pipelines CI\/CD : bonnes pratiques, anti-patterns et int\u00e9gration Vault<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/artifact-provenance-attestations-slsa-in-toto-2\/\">Provenance des artefacts et attestations : de SLSA \u00e0 in-toto<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/short-lived-credentials-workload-identity-federation-ci-cd\/\">Credentials \u00e9ph\u00e9m\u00e8res et Workload Identity Federation<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/policy-as-code-ci-cd-opa-rego-security-gates-2\/\">Policy as Code pour CI\/CD : appliquer des portes de s\u00e9curit\u00e9 avec OPA et Rego<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/dependency-confusion-artifact-poisoning-attacks-defenses\/\">Dependency Confusion et empoisonnement d&rsquo;artefacts : techniques d&rsquo;attaque et d\u00e9fenses<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/defensive-patterns-mitigations-ci-cd-pipeline-attacks\/\">Patterns d\u00e9fensifs et mesures d&rsquo;att\u00e9nuation pour les attaques de pipelines CI\/CD<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-execution-models-trust-assumptions-security-guide-2\/\">Mod\u00e8les d&rsquo;ex\u00e9cution CI\/CD et hypoth\u00e8ses de confiance<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/separation-of-duties-least-privilege-ci-cd-pipelines\/\">S\u00e9paration des responsabilit\u00e9s et moindre privil\u00e8ge dans les pipelines CI\/CD<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/build-integrity-reproducible-builds-ci-cd\/\">Int\u00e9grit\u00e9 des builds et builds reproductibles<\/a><\/li>\n<\/ul>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/guides\/\">\u2192 Parcourir tous les guides<\/a><\/strong><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Labs pratiques<\/h2>\n<p>Exercices pas \u00e0 pas avec de vraies configurations CI\/CD, des exemples YAML et des sc\u00e9narios d&rsquo;\u00e9chec.<\/p>\n<h3 class=\"wp-block-heading\">Attaque et d\u00e9fense<\/h3>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-exploiting-defending-poisoned-pipeline-execution-ppe\/\">Poisoned Pipeline Execution (PPE) \u2014 Exploiter et d\u00e9fendre<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-simulating-dependency-confusion-attack-sandbox\/\">Simulation d&rsquo;attaque Dependency Confusion<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-detecting-malicious-github-actions-static-analysis\/\">D\u00e9tection de GitHub Actions malveillantes<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-artifact-tampering-detection-swapping-container-images-registry-2\/\">Falsification et d\u00e9tection d&rsquo;artefacts<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-detecting-preventing-secret-leaks-ci-cd-pipelines\/\">D\u00e9tection et pr\u00e9vention des fuites de secrets<\/a><\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Cha\u00eene d&rsquo;approvisionnement et signature<\/h3>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-signing-verifying-container-images-cosign-github-actions\/\">Signature d&rsquo;images de conteneurs avec Cosign dans GitHub Actions<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-generating-verifying-slsa-provenance-container-images\/\">G\u00e9n\u00e9ration et v\u00e9rification de la provenance SLSA<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-sbom-pipeline-generate-attest-verify-syft-cosign\/\">Pipeline SBOM avec Syft et Cosign<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-reproducible-container-builds-pinning-verifying-diffing\/\">Builds de conteneurs reproductibles<\/a><\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Durcissement des plateformes<\/h3>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-hardening-github-actions-workflows-permissions-pinning-secrets\/\">Durcissement des workflows GitHub Actions<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-securing-gitlab-ci-pipelines-protected-variables-runners-environments\/\">S\u00e9curisation des pipelines GitLab CI<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-configuring-oidc-workload-identity-github-actions-aws\/\">OIDC Workload Identity pour GitHub Actions avec AWS<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-ephemeral-self-hosted-runners-actions-runner-controller\/\">Runners \u00e9ph\u00e9m\u00e8res avec Actions Runner Controller<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-enforcing-kubernetes-policies-opa-conftest-ci-cd-2\/\">Politiques Kubernetes avec OPA Conftest<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/lab-secure-build-pipeline-tekton-tekton-chains\/\">Pipeline de build s\u00e9curis\u00e9 avec Tekton Chains<\/a><\/li>\n<\/ul>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/labs\/\">\u2192 Parcourir les 15 labs<\/a><\/strong><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Comparatifs d&rsquo;outils<\/h2>\n<p>Vous cherchez les bons outils ? Ces comparatifs d\u00e9taill\u00e9s vous aident \u00e0 choisir.<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-security-scanners-compared-trivy-grype-snyk-checkov\/\">Scanners de s\u00e9curit\u00e9 : Trivy vs Grype vs Snyk vs Checkov<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/container-image-signing-tools-compared-cosign-notation-gpg\/\">Outils de signature : Cosign vs Notation vs GPG<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/sbom-tools-compared-syft-trivy-cyclonedx-cli\/\">Outils SBOM : Syft vs Trivy vs CycloneDX CLI<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-policy-engines-compared-opa-kyverno-sentinel-cedar\/\">Moteurs de politiques : OPA vs Kyverno vs Sentinel vs Cedar<\/a><\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">R\u00e9f\u00e9rences rapides<\/h2>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/owasp-top-10-ci-cd-risks-explained-real-world-examples\/\">OWASP Top 10 des risques CI\/CD \u2014 Expliqu\u00e9s avec des exemples concrets<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/slsa-levels-explained-practical-compliance-checklist\/\">Niveaux SLSA \u2014 Checklist de conformit\u00e9 pratique<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/github-actions-security-cheat-sheet\/\">GitHub Actions Security Cheat Sheet<\/a><\/li>\n<li><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/gitlab-ci-security-cheat-sheet\/\">GitLab CI Security Cheat Sheet<\/a><\/li>\n<\/ul>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/resources\/\">\u2192 Parcourir toutes les ressources et outils<\/a><\/strong><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">Explorer par th\u00e8me<\/h2>\n<table>\n<thead>\n<tr>\n<th>Th\u00e8me<\/th>\n<th>Ce qu&rsquo;il couvre<\/th>\n<th>Commencez ici<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/category\/ci-cd-security\/\">S\u00e9curit\u00e9 CI\/CD<\/a><\/strong><\/td>\n<td>Fronti\u00e8res de confiance, permissions, secrets, contr\u00f4les de d\u00e9ploiement<\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/complete-guide-ci-cd-pipeline-security\/\">Guide complet<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/category\/software-supply-chain\/\">Cha\u00eene d&rsquo;approvisionnement<\/a><\/strong><\/td>\n<td>D\u00e9pendances, builds, signature, provenance, SBOMs<\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/software-supply-chain\/software-supply-chain-security-comprehensive-guide\/\">Guide complet<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/category\/github-actions\/\">GitHub Actions<\/a><\/strong><\/td>\n<td>Workflows, permissions, runners, OIDC, actions tierces<\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/github-actions-security-definitive-guide\/\">Guide de r\u00e9f\u00e9rence<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/category\/gitlab-ci\/\">GitLab CI<\/a><\/strong><\/td>\n<td>Variables, runners, environnements, tokens, d\u00e9ploiements<\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/gitlab-ci-cd-security-definitive-guide\/\">Guide de r\u00e9f\u00e9rence<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/category\/threats-attacks\/\">Menaces et attaques<\/a><\/strong><\/td>\n<td>PPE, dependency confusion, vol de credentials, falsification d&rsquo;artefacts<\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/ci-cd-security\/ci-cd-threats-attacks-what-attackers-target-how-to-defend\/\">Guide des menaces<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/category\/pipeline-hardening\/\">Durcissement des pipelines<\/a><\/strong><\/td>\n<td>Isolation des runners, restrictions r\u00e9seau, moindre privil\u00e8ge<\/td>\n<td><a href=\"https:\/\/secure-pipelines.com\/fr\/pipeline-hardening\/pipeline-hardening-secure-ci-cd-build-deployment-environments\/\">Guide de durcissement<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/topics\/\">\u2192 Parcourir tous les th\u00e8mes<\/a><\/strong><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">\u00c0 qui s&rsquo;adresse ce site<\/h2>\n<p>Secure Pipelines est con\u00e7u pour les \u00e9quipes d&rsquo;ing\u00e9nierie exploitant des pipelines en production :<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Ing\u00e9nieurs DevOps<\/strong> \u2014 durcir les pipelines que vous construisez et maintenez<\/li>\n<li><strong>Ing\u00e9nieurs plateforme<\/strong> \u2014 concevoir une infrastructure CI\/CD s\u00e9curis\u00e9e \u00e0 grande \u00e9chelle<\/li>\n<li><strong>Ing\u00e9nieurs s\u00e9curit\u00e9<\/strong> \u2014 \u00e9valuer et am\u00e9liorer la posture de s\u00e9curit\u00e9 des pipelines<\/li>\n<li><strong>Praticiens DevSecOps<\/strong> \u2014 int\u00e9grer la s\u00e9curit\u00e9 dans les workflows de livraison<\/li>\n<li><strong>Architectes techniques<\/strong> \u2014 concevoir des mod\u00e8les de confiance et des architectures de contr\u00f4le<\/li>\n<\/ul>\n<p>Pas de battage commercial. Pas de checklists superficielles. Juste de la s\u00e9curit\u00e9 pratique, orient\u00e9e ing\u00e9nierie.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<h2 class=\"wp-block-heading\">L&rsquo;\u00e9cosyst\u00e8me<\/h2>\n<p>Secure Pipelines fait partie d&rsquo;un \u00e9cosyst\u00e8me \u00e0 deux sites :<\/p>\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/secure-pipelines.com\/fr\/\">Secure Pipelines<\/a><\/strong> \u2014 Impl\u00e9mentation technique : comment construire, durcir et d\u00e9fendre les pipelines CI\/CD.<\/li>\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\" target=\"_blank\" rel=\"noopener\">Regulated DevSecOps<\/a><\/strong> \u2014 Gouvernance et conformit\u00e9 : comment gouverner, auditer et certifier ces contr\u00f4les (ISO 27001, NIS2, SOC 2).<\/li>\n<\/ul>\n<p>Ensemble, ils fournissent les perspectives d&rsquo;ing\u00e9nierie et de gouvernance n\u00e9cessaires pour s\u00e9curiser la livraison logicielle moderne.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>La s\u00e9curit\u00e9 CI\/CD doit \u00eatre con\u00e7ue d\u00e8s le d\u00e9part, pas ajout\u00e9e apr\u00e8s coup.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Ing\u00e9nierie de la s\u00e9curit\u00e9 pour les pipelines CI\/CD et les cha\u00eenes d&rsquo;approvisionnement logicielles Secure Pipelines est un hub de connaissances techniques d\u00e9di\u00e9 \u00e0 la s\u00e9curisation des pipelines CI\/CD, GitOps et de livraison logicielle. Ing\u00e9nierie de s\u00e9curit\u00e9 pratique, impl\u00e9mentations concr\u00e8tes et labs pratiques \u2014 du code \u00e0 la production. Con\u00e7u par des praticiens, pour des praticiens. &#8230; <a title=\"Secure Pipelines\" class=\"read-more\" href=\"https:\/\/secure-pipelines.com\/fr\/\" aria-label=\"En savoir plus sur Secure Pipelines\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-31","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/pages\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":1,"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/pages\/31\/revisions"}],"predecessor-version":[{"id":744,"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/pages\/31\/revisions\/744"}],"wp:attachment":[{"href":"https:\/\/secure-pipelines.com\/fr\/wp-json\/wp\/v2\/media?parent=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}