{"id":1558,"date":"2021-03-02T13:39:12","date_gmt":"2021-03-02T18:39:12","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1558"},"modified":"2021-03-02T13:39:14","modified_gmt":"2021-03-02T18:39:14","slug":"vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/","title":{"rendered":"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-problems-continue-to-persist-a-node-js-library-was-found-to-have-a-major-vulnerability-that-allows-any-hacker-to-run-commands-on-your-servers\">Cybersecurity problems continue to persist. A Node.js library was found to have a major vulnerability that allows any hacker to run commands on your servers.<\/h2>\n\n\n\n<p>Every day we learn that there are more and more reasons that cybersecurity matters. Credential stealing. Phishing. Malware. Configuration problems. Passwords stored in plain text. Vulnerabilities in VPNs. Apps with known problems and no fix in place. There\u2019s more, but we would be here all day if we tried to list out all of the security problems experienced by businesses, especially over the last year. It\u2019s not getting better either, as we learned last week about a Node.js library with a high severity command injection vulnerability.<\/p>\n\n\n\n<p>This particular vulnerability is tracked as CVS-2021-21315, and impacts the \u201csysteminformation: npm&#8221; component. The component is downloaded around 800,000 per week and has nearly 34 million downloads since its arrival. The \u201csysteminformation\u201d component is a Node.js library that can be included in projects to retrieve information related to the CPU, hardware, battery, network, services and system processes. It is supposed to be used on the backend, according to the developer.<\/p>\n\n\n\n<p>&#8220;This library is still work in progress. It is supposed to be used as a backend\/server-side library (will definitely not work within a browser),&#8221; <a href=\"https:\/\/www.npmjs.com\/package\/systeminformation\" target=\"_blank\" rel=\"noreferrer noopener\">states the developer behind the component<\/a>. <\/p>\n\n\n\n<p>The problem is, the code injection flaw would have allowed an attacker to execute system commands. If they could carefully inject a payload within the unsanitized parameters the component uses, they could easily cause a lot of damage. The fix, as well as workaround options for those who can\u2019t update, are listed on <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/heavily-used-nodejs-package-has-a-code-injection-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>.<\/p>\n\n\n\n<p>We have often talked about how there are layers in development. There\u2019s infrastructure, functionality, design and security to consider. Business leaders around the world have been known to push through the development process, asking devs to skimp on security or rush through configuration. The rush to put out a new product somehow supersedes the need for it to be stable and secure. The intent to come back \u201clater\u201d and fix it never moves beyond intention, so customers are often left with unstable, insecure products that they don\u2019t even know could be a problem.&nbsp;<\/p>\n\n\n\n<p>This is also another prime example of why <a href=\"https:\/\/www.pwvconsultants.com\/blog\/all-open-sourced-code-should-be-reviewed\/\" target=\"_blank\" rel=\"noreferrer noopener\">all open-source code should be reviewed<\/a>. Anytime the open web has access to the same code that you are trying to use, you must review it. This is just one of many vulnerabilities discovered in open-source code, and we have seen instances of malware hiding in open-source packages as well as open-source dependencies of libraries. You have to check the whole dependency chain.<\/p>\n\n\n\n<p>What we are seeing today is what happens when \u201clater\u201d never comes. There are a multitude of known vulnerabilities which are the most common vectors used to hack. Which is why businesses that have not conducted a security review in the last 6 months, absolutely need to do so. There have been a slew of known vulnerabilities hitting the web, nearly all of which have a fix created. If you find these problems in your business, the fix created must be implemented as soon as possible. The longer you delay on patching systems, the greater your risk of suffering a breach.<\/p>\n\n\n\n<p>Users of open-source repositories should visit their respective website\u2019s advisory page to stay up to date on the newest fixes. Again, those fixes must be implemented as soon as possible. If you don\u2019t have the staff, personnel, training, know-how or have any reservations about security reviews or patching, please consult an expert. If not done properly, the problem won\u2019t be resolved. Make sure it\u2019s done right the first time!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An npm package with 34 million downloads has a high severity vulnerability. The vulnerability allows remote command injection on servers.<\/p>\n","protected":false},"author":1,"featured_media":1569,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,2073],"tags":[36,31,2133,2000,2163,1903,1938,2132,1901,1568,1997],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers - PWV Consultants<\/title>\n<meta name=\"description\" content=\"An npm package with 34 million downloads has a high severity vulnerability. The vulnerability allows remote command injection on servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers\" \/>\n<meta property=\"og:description\" content=\"An npm package with 34 million downloads has a high severity vulnerability. The vulnerability allows remote command injection on servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T18:39:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-02T18:39:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers\",\"datePublished\":\"2021-03-02T18:39:12+00:00\",\"dateModified\":\"2021-03-02T18:39:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/\"},\"wordCount\":624,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg\",\"keywords\":[\"Business\",\"Cybersecurity\",\"dependencies\",\"development\",\"Node.js\",\"npm\",\"Open Source Code\",\"Repositories\",\"servers\",\"systems\",\"vulnerability\"],\"articleSection\":[\"Cyber Security\",\"Vulnerability\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/\",\"name\":\"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg\",\"datePublished\":\"2021-03-02T18:39:12+00:00\",\"dateModified\":\"2021-03-02T18:39:14+00:00\",\"description\":\"An npm package with 34 million downloads has a high severity vulnerability. The vulnerability allows remote command injection on servers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg\",\"width\":2560,\"height\":1440,\"caption\":\"Open-source, cross-platform runtime environment. Node.js me, if you can. Word Node.js of the yellow square pixels on a black matrix background. 3D illustration picture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers - PWV Consultants","description":"An npm package with 34 million downloads has a high severity vulnerability. The vulnerability allows remote command injection on servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers","og_description":"An npm package with 34 million downloads has a high severity vulnerability. The vulnerability allows remote command injection on servers.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-03-02T18:39:12+00:00","article_modified_time":"2021-03-02T18:39:14+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers","datePublished":"2021-03-02T18:39:12+00:00","dateModified":"2021-03-02T18:39:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/"},"wordCount":624,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg","keywords":["Business","Cybersecurity","dependencies","development","Node.js","npm","Open Source Code","Repositories","servers","systems","vulnerability"],"articleSection":["Cyber Security","Vulnerability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/","url":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/","name":"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg","datePublished":"2021-03-02T18:39:12+00:00","dateModified":"2021-03-02T18:39:14+00:00","description":"An npm package with 34 million downloads has a high severity vulnerability. The vulnerability allows remote command injection on servers.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Node-js-npm-vulnerability-scaled.jpeg","width":2560,"height":1440,"caption":"Open-source, cross-platform runtime environment. Node.js me, if you can. Word Node.js of the yellow square pixels on a black matrix background. 3D illustration picture"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/vulnerable-npm-package-with-34mm-downloads-gives-hackers-full-control-of-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Vulnerable NPM Package With 34MM Downloads Gives Hackers Full Control of Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1558"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1558"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1558\/revisions"}],"predecessor-version":[{"id":1570,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1558\/revisions\/1570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1569"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}