{"id":8,"count":4,"description":"","link":"https:\/\/ahui.blog\/index.php\/category\/vulnerability_mining\/","name":"\u6f0f\u6d1e\u6316\u6398","slug":"vulnerability_mining","taxonomy":"category","parent":0,"meta":[],"_links":{"self":[{"href":"https:\/\/ahui.blog\/index.php\/wp-json\/wp\/v2\/categories\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ahui.blog\/index.php\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/ahui.blog\/index.php\/wp-json\/wp\/v2\/taxonomies\/category"}],"wp:post_type":[{"href":"https:\/\/ahui.blog\/index.php\/wp-json\/wp\/v2\/posts?categories=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}