{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:BDZHSYIJH2EZI5FPSHPZM4CAPD","short_pith_number":"pith:BDZHSYIJ","canonical_record":{"source":{"id":"2605.12563","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-12T03:57:35Z","cross_cats_sorted":["cs.PL"],"title_canon_sha256":"58611490f6525e788491ce2f11a07d948e2bd9e823bfe2f3b5f948429fd394ac","abstract_canon_sha256":"a6719b9eaac0d3b7554575ba7c2cd8f5b849cee375f3f73b69807f1708fccb68"},"schema_version":"1.0"},"canonical_sha256":"08f27961093e899474af91df96704078ccc5a8a3cc96dbeebddc45613500827a","source":{"kind":"arxiv","id":"2605.12563","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.12563","created_at":"2026-05-18T03:10:01Z"},{"alias_kind":"arxiv_version","alias_value":"2605.12563v1","created_at":"2026-05-18T03:10:01Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.12563","created_at":"2026-05-18T03:10:01Z"},{"alias_kind":"pith_short_12","alias_value":"BDZHSYIJH2EZ","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"BDZHSYIJH2EZI5FP","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"BDZHSYIJ","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:BDZHSYIJH2EZI5FPSHPZM4CAPD","target":"record","payload":{"canonical_record":{"source":{"id":"2605.12563","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-12T03:57:35Z","cross_cats_sorted":["cs.PL"],"title_canon_sha256":"58611490f6525e788491ce2f11a07d948e2bd9e823bfe2f3b5f948429fd394ac","abstract_canon_sha256":"a6719b9eaac0d3b7554575ba7c2cd8f5b849cee375f3f73b69807f1708fccb68"},"schema_version":"1.0"},"canonical_sha256":"08f27961093e899474af91df96704078ccc5a8a3cc96dbeebddc45613500827a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:10:01.928820Z","signature_b64":"jlrKaFZtDx21mIfbMbstQ6Y2FVy+5vaX56x054+1Hw+5ScAR4p+d/PruJ53DygxnhYRpXgUIlvufv9HoHyVDBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"08f27961093e899474af91df96704078ccc5a8a3cc96dbeebddc45613500827a","last_reissued_at":"2026-05-18T03:10:01.928033Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:10:01.928033Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.12563","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:10:01Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"g/oQ/guPmI0gOAY5PhqwMJ35vK/k5hw0DTf18y5chqxSB0PfoXTel7FXtRDkLhN3bYw7uuZnFe5dpGcUkmnYDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T23:32:24.928767Z"},"content_sha256":"972b00f08b820b905d865a69f480f40545e4d2de32d055ea4fee1f5938ddc74e","schema_version":"1.0","event_id":"sha256:972b00f08b820b905d865a69f480f40545e4d2de32d055ea4fee1f5938ddc74e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:BDZHSYIJH2EZI5FPSHPZM4CAPD","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"OverrideFuzz: Semantic-Aware Grammar Fuzzing for Script-Runtime Vulnerabilities","license":"http://creativecommons.org/licenses/by-sa/4.0/","headline":"OverrideFuzz uses two-phase semantic-aware grammar fuzzing to reach script runtime boundary behaviors that trigger known vulnerability patterns.","cross_cats":["cs.PL"],"primary_cat":"cs.CR","authors_text":"Yiran Qiu","submitted_at":"2026-05-12T03:57:35Z","abstract_excerpt":"Script-language runtimes such as Python, Lua, and JavaScript are widely deployed in security sensitive contexts, yet they remain difficult to test because valid inputs must satisfy syntax, dynamic type constraints, and object-level semantics. Existing grammar and reflection-based fuzzers improve syntactic validity and interface reachability, but they rarely model override hooks, dynamic rebinding, and attribute-resolution behavior that can redirect built-in operations across the script-native boundary and trigger use-after-free or type-confusion bugs. We present OverrideFuzz, a two-phase, sema"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"corpus analysis shows that it reconstructs inputs matching known vulnerability patterns, which suggests that semantic-aware generation reaches the intended script-native boundary behaviors.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"The assumption that passive reflection from error messages removes only invalid shapes while preserving all operation shapes capable of triggering boundary bugs, and that the bounded evaluation window is long enough to demonstrate vulnerability-finding power.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"OverrideFuzz uses semantic-aware grammar fuzzing with reflection to model override hooks and dynamic rebinding, producing coverage growth and inputs that match known vulnerability patterns on CPython, Lua, and QuickJS without discovering new bugs in the evaluation window.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"OverrideFuzz uses two-phase semantic-aware grammar fuzzing to reach script runtime boundary behaviors that trigger known vulnerability patterns.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"f605e7e9347a8acd8b786b1fb886acc39756c1fd4480a3f629f27a9a051368e8"},"source":{"id":"2605.12563","kind":"arxiv","version":1},"verdict":{"id":"1ef00d67-3eba-4019-b8e0-4fffcd55e2bd","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-14T20:56:07.303541Z","strongest_claim":"corpus analysis shows that it reconstructs inputs matching known vulnerability patterns, which suggests that semantic-aware generation reaches the intended script-native boundary behaviors.","one_line_summary":"OverrideFuzz uses semantic-aware grammar fuzzing with reflection to model override hooks and dynamic rebinding, producing coverage growth and inputs that match known vulnerability patterns on CPython, Lua, and QuickJS without discovering new bugs in the evaluation window.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"The assumption that passive reflection from error messages removes only invalid shapes while preserving all operation shapes capable of triggering boundary bugs, and that the bounded evaluation window is long enough to demonstrate vulnerability-finding power.","pith_extraction_headline":"OverrideFuzz uses two-phase semantic-aware grammar fuzzing to reach script runtime boundary behaviors that trigger known vulnerability patterns."},"references":{"count":23,"sample":[{"doi":"10.1016/j.infsof.2026.108068","year":2026,"title":"Integrating formal methods and automated tools for DO-178C compliance in UA V software,","work_id":"bbe10e26-3444-4618-bded-9b107a07cd22","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2026,"title":"Clang Static Analyzer","work_id":"9571b736-f4dd-4d43-8b03-a4941ae649f4","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1109/sp.2016.17","year":2016,"title":"SOK: (state of) the art of war: Offensive techniques in binary analysis","work_id":"c02926b9-f1c5-4a83-902a-d7a3b3883112","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.14722/ndss.2023.24290","year":2023,"title":"FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities,","work_id":"2e12b38d-0221-4cbb-b199-0fd379836948","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.14722/ndss.2019.23412","year":2019,"title":"NAUTILUS: Fishing for Deep Bugs with Grammars,","work_id":"26eb8bdf-e1cf-4e56-9611-02396a17acd0","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":23,"snapshot_sha256":"54880c1e9d80c0c7d1f8eccfb73fe52aef0f7b6ba07072a9ba7f720c7f05ebf6","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"1ef00d67-3eba-4019-b8e0-4fffcd55e2bd"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:10:01Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KC+zKF7U4c+kLzJ1HN9sbZC0yC0JERYBAxzHaeS4p4Di44WDxzYucnBGf4PhVQgoOh4D+pNniMfZugwDbZt/Ag==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T23:32:24.929773Z"},"content_sha256":"25145a6920a8638a6e0d175c7ba2f294a27190b713d82190e99e3dcd12aa7801","schema_version":"1.0","event_id":"sha256:25145a6920a8638a6e0d175c7ba2f294a27190b713d82190e99e3dcd12aa7801"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/BDZHSYIJH2EZI5FPSHPZM4CAPD/bundle.json","state_url":"https://pith.science/pith/BDZHSYIJH2EZI5FPSHPZM4CAPD/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/BDZHSYIJH2EZI5FPSHPZM4CAPD/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T23:32:24Z","links":{"resolver":"https://pith.science/pith/BDZHSYIJH2EZI5FPSHPZM4CAPD","bundle":"https://pith.science/pith/BDZHSYIJH2EZI5FPSHPZM4CAPD/bundle.json","state":"https://pith.science/pith/BDZHSYIJH2EZI5FPSHPZM4CAPD/state.json","well_known_bundle":"https://pith.science/.well-known/pith/BDZHSYIJH2EZI5FPSHPZM4CAPD/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:BDZHSYIJH2EZI5FPSHPZM4CAPD","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"a6719b9eaac0d3b7554575ba7c2cd8f5b849cee375f3f73b69807f1708fccb68","cross_cats_sorted":["cs.PL"],"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-12T03:57:35Z","title_canon_sha256":"58611490f6525e788491ce2f11a07d948e2bd9e823bfe2f3b5f948429fd394ac"},"schema_version":"1.0","source":{"id":"2605.12563","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.12563","created_at":"2026-05-18T03:10:01Z"},{"alias_kind":"arxiv_version","alias_value":"2605.12563v1","created_at":"2026-05-18T03:10:01Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.12563","created_at":"2026-05-18T03:10:01Z"},{"alias_kind":"pith_short_12","alias_value":"BDZHSYIJH2EZ","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"BDZHSYIJH2EZI5FP","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"BDZHSYIJ","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:25145a6920a8638a6e0d175c7ba2f294a27190b713d82190e99e3dcd12aa7801","target":"graph","created_at":"2026-05-18T03:10:01Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"corpus analysis shows that it reconstructs inputs matching known vulnerability patterns, which suggests that semantic-aware generation reaches the intended script-native boundary behaviors."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"The assumption that passive reflection from error messages removes only invalid shapes while preserving all operation shapes capable of triggering boundary bugs, and that the bounded evaluation window is long enough to demonstrate vulnerability-finding power."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"OverrideFuzz uses semantic-aware grammar fuzzing with reflection to model override hooks and dynamic rebinding, producing coverage growth and inputs that match known vulnerability patterns on CPython, Lua, and QuickJS without discovering new bugs in the evaluation window."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"OverrideFuzz uses two-phase semantic-aware grammar fuzzing to reach script runtime boundary behaviors that trigger known vulnerability patterns."}],"snapshot_sha256":"f605e7e9347a8acd8b786b1fb886acc39756c1fd4480a3f629f27a9a051368e8"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Script-language runtimes such as Python, Lua, and JavaScript are widely deployed in security sensitive contexts, yet they remain difficult to test because valid inputs must satisfy syntax, dynamic type constraints, and object-level semantics. Existing grammar and reflection-based fuzzers improve syntactic validity and interface reachability, but they rarely model override hooks, dynamic rebinding, and attribute-resolution behavior that can redirect built-in operations across the script-native boundary and trigger use-after-free or type-confusion bugs. We present OverrideFuzz, a two-phase, sema","authors_text":"Yiran Qiu","cross_cats":["cs.PL"],"headline":"OverrideFuzz uses two-phase semantic-aware grammar fuzzing to reach script runtime boundary behaviors that trigger known vulnerability patterns.","license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-12T03:57:35Z","title":"OverrideFuzz: Semantic-Aware Grammar Fuzzing for Script-Runtime Vulnerabilities"},"references":{"count":23,"internal_anchors":0,"resolved_work":23,"sample":[{"cited_arxiv_id":"","doi":"10.1016/j.infsof.2026.108068","is_internal_anchor":false,"ref_index":1,"title":"Integrating formal methods and automated tools for DO-178C compliance in UA V software,","work_id":"bbe10e26-3444-4618-bded-9b107a07cd22","year":2026},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":2,"title":"Clang Static Analyzer","work_id":"9571b736-f4dd-4d43-8b03-a4941ae649f4","year":2026},{"cited_arxiv_id":"","doi":"10.1109/sp.2016.17","is_internal_anchor":false,"ref_index":3,"title":"SOK: (state of) the art of war: Offensive techniques in binary analysis","work_id":"c02926b9-f1c5-4a83-902a-d7a3b3883112","year":2016},{"cited_arxiv_id":"","doi":"10.14722/ndss.2023.24290","is_internal_anchor":false,"ref_index":4,"title":"FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities,","work_id":"2e12b38d-0221-4cbb-b199-0fd379836948","year":2023},{"cited_arxiv_id":"","doi":"10.14722/ndss.2019.23412","is_internal_anchor":false,"ref_index":5,"title":"NAUTILUS: Fishing for Deep Bugs with Grammars,","work_id":"26eb8bdf-e1cf-4e56-9611-02396a17acd0","year":2019}],"snapshot_sha256":"54880c1e9d80c0c7d1f8eccfb73fe52aef0f7b6ba07072a9ba7f720c7f05ebf6"},"source":{"id":"2605.12563","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-14T20:56:07.303541Z","id":"1ef00d67-3eba-4019-b8e0-4fffcd55e2bd","model_set":{"reader":"grok-4.3"},"one_line_summary":"OverrideFuzz uses semantic-aware grammar fuzzing with reflection to model override hooks and dynamic rebinding, producing coverage growth and inputs that match known vulnerability patterns on CPython, Lua, and QuickJS without discovering new bugs in the evaluation window.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"OverrideFuzz uses two-phase semantic-aware grammar fuzzing to reach script runtime boundary behaviors that trigger known vulnerability patterns.","strongest_claim":"corpus analysis shows that it reconstructs inputs matching known vulnerability patterns, which suggests that semantic-aware generation reaches the intended script-native boundary behaviors.","weakest_assumption":"The assumption that passive reflection from error messages removes only invalid shapes while preserving all operation shapes capable of triggering boundary bugs, and that the bounded evaluation window is long enough to demonstrate vulnerability-finding power."}},"verdict_id":"1ef00d67-3eba-4019-b8e0-4fffcd55e2bd"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:972b00f08b820b905d865a69f480f40545e4d2de32d055ea4fee1f5938ddc74e","target":"record","created_at":"2026-05-18T03:10:01Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"a6719b9eaac0d3b7554575ba7c2cd8f5b849cee375f3f73b69807f1708fccb68","cross_cats_sorted":["cs.PL"],"license":"http://creativecommons.org/licenses/by-sa/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-12T03:57:35Z","title_canon_sha256":"58611490f6525e788491ce2f11a07d948e2bd9e823bfe2f3b5f948429fd394ac"},"schema_version":"1.0","source":{"id":"2605.12563","kind":"arxiv","version":1}},"canonical_sha256":"08f27961093e899474af91df96704078ccc5a8a3cc96dbeebddc45613500827a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"08f27961093e899474af91df96704078ccc5a8a3cc96dbeebddc45613500827a","first_computed_at":"2026-05-18T03:10:01.928033Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:10:01.928033Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"jlrKaFZtDx21mIfbMbstQ6Y2FVy+5vaX56x054+1Hw+5ScAR4p+d/PruJ53DygxnhYRpXgUIlvufv9HoHyVDBw==","signature_status":"signed_v1","signed_at":"2026-05-18T03:10:01.928820Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.12563","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:972b00f08b820b905d865a69f480f40545e4d2de32d055ea4fee1f5938ddc74e","sha256:25145a6920a8638a6e0d175c7ba2f294a27190b713d82190e99e3dcd12aa7801"],"state_sha256":"500600dbd6b8569b25ed617691209f975aac55e328ae8c1e1494657fa6b08b4b"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"OoshRuIRdJNeZX2cejYy/UGATkzZEq4gMDVTQBt/y8NvdR5Q953dDqLwft9pzkgY1x0gOhsiqPk56SD9YzI1Cg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T23:32:24.934788Z","bundle_sha256":"c05381d0208ce4496b8becaf2354acd3c80805c87a43b267a100faf046cfbf79"}}