{"id":7099,"date":"2023-03-30T08:44:00","date_gmt":"2023-03-30T12:44:00","guid":{"rendered":"https:\/\/nventive.com\/?p=7099"},"modified":"2025-01-25T02:25:35","modified_gmt":"2025-01-25T07:25:35","slug":"une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure","status":"publish","type":"post","link":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/","title":{"rendered":"Une utilisation s\u00e9curitaire de l\u2019open source en d\u00e9veloppement sur mesure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7099\" class=\"elementor elementor-7099\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c5f234 e-flex e-con-boxed e-con e-parent\" data-id=\"1c5f234\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82cfcf7 elementor-widget elementor-widget-text-editor\" data-id=\"82cfcf7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>D\u00e9fini comme \u00e9tant con\u00e7u pour \u00eatre accessible au public, un projet open source peut \u00eatre vu, modifi\u00e9, utilis\u00e9 et distribu\u00e9 \u00e0 la convenance de son groupe de propri\u00e9taires. Dans chaque projet de d\u00e9veloppement \u00e0 travers le monde, c\u2019est un outil pr\u00e9cieux pour la communaut\u00e9 de d\u00e9veloppeur.euse.s. Toutefois, toute utilisation de l\u2019open source se doit d\u2019\u00eatre faite de mani\u00e8re s\u00e9curitaire, en respectant les pratiques en d\u00e9veloppement, s\u00e9curit\u00e9 et exploitation (DevSecOps).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c46f17 e-flex e-con-boxed e-con e-parent\" data-id=\"4c46f17\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8788702 elementor-widget elementor-widget-text-editor\" data-id=\"8788702\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pour mieux comprendre ce qu\u2019est un projet open-source, imaginez une liste de lecture de vos chansons favorites que vous auriez cr\u00e9\u00e9e sur l\u2019une des nombreuses plateformes disponibles. Vous jouez cette liste de lecture en soir\u00e9e\u2026<\/p><ul><li>Tout le monde peut l\u2019\u00e9couter (utiliser);<\/li><li>La liste est accessible et on peut s\u2019y abonner (voir);<\/li><li>Un ami, Jean-Philippe, sugg\u00e8re d\u2019ajouter un des morceaux d\u2019un groupe peu connu dont il est adepte \u00e0 la liste de lecture (modifier);<\/li><li>Une autre amie, Camille, demande \u00e0 l\u2019utiliser lors de sa prochaine soir\u00e9e (distribuer).<\/li><li>D\u00e9velopp\u00e9 de mani\u00e8re collaborative, l\u2019usage de l\u2019open source dans les projets num\u00e9riques t\u00e9moigne d\u2019un fort \u00e9tat d\u2019esprit communautaire. La qualit\u00e9 de l\u2019open source repose sur des principes cl\u00e9s\u202f:<\/li><\/ul><p>D\u00e9velopp\u00e9 de mani\u00e8re collaborative, l\u2019usage de l\u2019open source dans les projets num\u00e9riques t\u00e9moigne d\u2019un fort \u00e9tat d\u2019esprit communautaire. La qualit\u00e9 de l\u2019open source repose sur des principes cl\u00e9s\u202f:<\/p><ul><li><strong>La contribution continue\u202f:<\/strong> les d\u00e9veloppeur.euse.s ne font pas que se servir; chaque jour, ils et elles travaillent sur les projets disponibles, et les rendent accessibles \u00e0 tous \u00e0 leur tour.<\/li><li><strong>La validation et l\u2019examen par les pairs\u202f:<\/strong> les projets open source sont toujours ouverts \u00e0 l\u2019am\u00e9lioration, soutenus par la contribution de chaque d\u00e9veloppeur.euse qui les v\u00e9rifie et les am\u00e9liore.<\/li><li><strong>L\u2019autonomie et la confiance\u202f:<\/strong> les \u00e9l\u00e9ments mis \u00e0 disposition en open source sont fiables et d\u00e9j\u00e0 test\u00e9s au quotidien. Il n\u2019existe aucune d\u00e9pendance vis-\u00e0-vis d\u2019une entreprise qui aurait ses propres int\u00e9r\u00eats; les projets reposent sur des principes de transparence. La communaut\u00e9 se suffit \u00e0 elle-m\u00eame et est capable de faire progresser le d\u00e9veloppement technologique chaque jour.<\/li><\/ul><p>La plus grande communaut\u00e9 open source \u00e9volue notamment sur GitHub, une plateforme reconnue pour la qualit\u00e9 de ses contributeurs et pour son nombre de contributions. De r\u00e9els liens se cr\u00e9ent entre contributeurs au quotidien, \u00e0 travers des discussions virtuelles ou des rencontres lors d\u2019\u00e9v\u00e8nements cl\u00e9s.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1b476a e-flex e-con-boxed e-con e-parent\" data-id=\"c1b476a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54c5fb41 elementor-widget elementor-widget-image\" data-id=\"54c5fb41\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1482\" height=\"834\" src=\"https:\/\/nventive.com\/app\/uploads\/2023\/03\/developpement-securite-exploitation-devsecops.webp\" class=\"attachment-full size-full wp-image-7113\" alt=\"D\u00e9veloppement, s\u00e9curit\u00e9 et exploitation devsecops\" srcset=\"https:\/\/nventive.com\/app\/uploads\/2023\/03\/developpement-securite-exploitation-devsecops.webp 1482w, https:\/\/nventive.com\/app\/uploads\/2023\/03\/developpement-securite-exploitation-devsecops-300x169.webp 300w, https:\/\/nventive.com\/app\/uploads\/2023\/03\/developpement-securite-exploitation-devsecops-1024x576.webp 1024w, https:\/\/nventive.com\/app\/uploads\/2023\/03\/developpement-securite-exploitation-devsecops-768x432.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d99717a e-flex e-con-boxed e-con e-parent\" data-id=\"d99717a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d15a30a elementor-widget elementor-widget-heading\" data-id=\"d15a30a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">L\u2019approche en d\u00e9veloppement, s\u00e9curit\u00e9 et exploitation (DevSecOps) pour une utilisation r\u00e9fl\u00e9chie et s\u00e9curitaire<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-183b462 elementor-widget elementor-widget-text-editor\" data-id=\"183b462\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les logiciels libres sont expos\u00e9s aux m\u00eames risques que les applications d\u00e9velopp\u00e9es par les entreprises, et souvent les solutions d\u2019entreprises utilisent des d\u00e9pendances en code source libre.<\/p><p>C\u2019est l\u2019une des raisons d\u2019\u00eatre de l\u2019approche DevSecOps, qui permet de mitiger ces risques le plus rapidement possible.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-602e6de e-flex e-con-boxed e-con e-parent\" data-id=\"602e6de\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61632d7 elementor-widget elementor-widget-heading\" data-id=\"61632d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">V\u00e9rification des licences de diffusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b8d30 elementor-widget elementor-widget-text-editor\" data-id=\"82b8d30\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Avant toute utilisation de projet en open source, nos expert.e.s analysent sa source, son nombre de contributions et l\u2019activit\u00e9 du groupe de contributeurs \u2013 puisqu\u2019un progiciel est rarement issu d\u2019une personne individuelle.<\/p><p>Lorsqu\u2019un code est mis \u00e0 disposition en open-source, il est crucial qu\u2019une licence de libre diffusion lui soit rattach\u00e9e et que celle-ci stipule son type. Cette licence est accessible dans un fichier plac\u00e9 dans le dossier racine du projet. Elle permet donc d\u2019identifier la source du projet. Mais elle permet aussi d\u2019agir convenablement aux yeux de la loi\u202f: en effet, sans licence, le code sera prot\u00e9g\u00e9 par un droit d\u2019auteur par d\u00e9faut. Tout auteur mal intentionn\u00e9 pourrait donc contester l\u2019usage de son code \u00ab\u202fopen source\u202f\u00bb et aurait l\u00e9galement raison.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bae01db e-flex e-con-boxed e-con e-parent\" data-id=\"bae01db\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef2aaaf elementor-widget elementor-widget-heading\" data-id=\"ef2aaaf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">V\u00e9rification de la mise \u00e0 jour du projet\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5157180 elementor-widget elementor-widget-text-editor\" data-id=\"5157180\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il peut arriver que certains contributeurs abandonnent leurs projets. Un projet qui n\u2019est plus \u00e0 jour pr\u00e9sente de forts risques de contenir des vuln\u00e9rabilit\u00e9s et des biblioth\u00e8ques d\u00e9su\u00e8tes.<\/p><p>L\u2019outil Dependabot de GitHub peut mettre \u00e0 jour certaines composantes du projet si celui-ci est configur\u00e9 sur un d\u00e9p\u00f4t de code. Avant d\u2019utiliser un projet open source, on doit v\u00e9rifier la date de la derni\u00e8re mise \u00e0 jour ou chercher s\u2019il existe des vuln\u00e9rabilit\u00e9s dans ce projet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c7144c5 e-flex e-con-boxed e-con e-parent\" data-id=\"c7144c5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fb98dc elementor-widget elementor-widget-heading\" data-id=\"7fb98dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Se fier au Top 10 OWASP<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cdcf38 elementor-widget elementor-widget-text-editor\" data-id=\"7cdcf38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le\u00a0<a href=\"https:\/\/owasp.org\/Top10\/\">Top 10 OWASP<\/a>\u00a0(Open Web Application Security Project [Projet sur la s\u00e9curit\u00e9 des applications Web libres]) est la r\u00e9f\u00e9rence en mati\u00e8re de cybers\u00e9curit\u00e9. Ce classement compile des donn\u00e9es sur les vuln\u00e9rabilit\u00e9s les plus exploit\u00e9es des syst\u00e8mes\u202f: il est important que chaque d\u00e9veloppeur.euse ait connaissance de ces risques afin de les rep\u00e9rer et de les corriger.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-513232fd e-flex e-con-boxed e-con e-parent\" data-id=\"513232fd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4170e799 elementor-widget elementor-widget-image\" data-id=\"4170e799\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1482\" height=\"834\" src=\"https:\/\/nventive.com\/app\/uploads\/2023\/03\/automatisation-projet-open-source.webp\" class=\"attachment-full size-full wp-image-7115\" alt=\"Automatisation de projet open source\" srcset=\"https:\/\/nventive.com\/app\/uploads\/2023\/03\/automatisation-projet-open-source.webp 1482w, https:\/\/nventive.com\/app\/uploads\/2023\/03\/automatisation-projet-open-source-300x169.webp 300w, https:\/\/nventive.com\/app\/uploads\/2023\/03\/automatisation-projet-open-source-1024x576.webp 1024w, https:\/\/nventive.com\/app\/uploads\/2023\/03\/automatisation-projet-open-source-768x432.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a83ab9 e-flex e-con-boxed e-con e-parent\" data-id=\"7a83ab9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5d028e elementor-widget elementor-widget-heading\" data-id=\"c5d028e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automatiser les projets open source<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2154fb3 elementor-widget elementor-widget-text-editor\" data-id=\"2154fb3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il est recommand\u00e9 d\u2019automatiser votre projet le plus possible\u202f: construction automatique, tests automatis\u00e9s, examens de s\u00e9curit\u00e9, revue des licences, d\u00e9ploiements, v\u00e9rification de code hach\u00e9\u2026 Faites confiance aux automatisations, tout en effectuant des v\u00e9rifications continues. En effet, une mauvaise configuration d\u2019un de ces \u00e9l\u00e9ments pourrait causer une attaque \u00e0 la cha\u00eene d\u2019approvisionnement ou encore une attaque \u00ab\u202f\u00e0 la source d\u2019eau\u202f\u00bb (<em>water hole attack<\/em>).<\/p><p>Dans nos pratiques\u00a0<em>DevSecOps<\/em>\u00a0chez nventive, nous utilisons l\u2019outil Snyk. Celui-ci permet aux d\u00e9veloppeur.euse.s de scanner le code source, les d\u00e9pendances, les conteneurs et l\u2019infrastructure en tant que code (IaC) pour cibler et corriger ces vuln\u00e9rabilit\u00e9s le plus rapidement possible.<\/p><p>Le processus de validation par les pairs pour approuver l\u2019utilisation du code open-source renforce \u00e9galement la s\u00e9curit\u00e9 de l\u2019utilisation du projet open-source.<\/p><p>Bien entendu, l\u2019automatisation n\u2019a de sens que si le d\u00e9ploiement de la correction d\u2019une vuln\u00e9rabilit\u00e9 est ex\u00e9cut\u00e9 rapidement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3752ada e-con-full e-flex e-con e-parent\" data-id=\"3752ada\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30995704 elementor-widget elementor-widget-testimonial\" data-id=\"30995704\" data-element_type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-content\">\u00abL\u2019automatisation du \u2018build\u2019 et des d\u00e9ploiements est cruciale pour la s\u00e9curit\u00e9, et non seulement pour le d\u00e9veloppement de nouvelles fonctionnalit\u00e9s.\u00bb<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Mathieu Fillion<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Gestionnaire de l\u2019\u00e9quipe de d\u00e9veloppement<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-59d69db e-flex e-con-boxed e-con e-parent\" data-id=\"59d69db\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7334a53 elementor-widget elementor-widget-heading\" data-id=\"7334a53\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Les nombreux b\u00e9n\u00e9fices \u00e0 l\u2019open source<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a17f6f1 elementor-widget elementor-widget-text-editor\" data-id=\"a17f6f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Utiliser des projets en open source poss\u00e8de deux principaux avantages\u202f: d\u2019abord, ceci repr\u00e9sente un gain de productivit\u00e9 important pour chaque d\u00e9veloppeur.euse. Ensuite, la qualit\u00e9 ayant d\u00e9j\u00e0 \u00e9t\u00e9 mise \u00e0 l\u2019\u00e9preuve et s\u2019\u00e9tant d\u00e9marqu\u00e9e, c\u2019est une solution viable qui fait \u00e9conomiser du temps et cro\u00eetre la qualit\u00e9 de projet en projet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-944e3ee e-con-full e-flex e-con e-parent\" data-id=\"944e3ee\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8392c5 elementor-widget elementor-widget-template\" data-id=\"b8392c5\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"12184\" class=\"elementor elementor-12184\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40d5957e e-flex e-con-boxed e-con e-parent\" data-id=\"40d5957e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b78efbf e-con-full e-flex e-con e-child\" data-id=\"1b78efbf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e14a4ef elementor-widget elementor-widget-heading\" data-id=\"7e14a4ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Articles en vedette<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2902db16 elementor-widget elementor-widget-nv-button\" data-id=\"2902db16\" data-element_type=\"widget\" data-widget_type=\"nv-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                <a\n            class=\"nv-button  nv-button--style--desktop--outline-icon nv-button--style--laptop--outline-icon nv-button--style--tablet--outline-icon nv-button--style--mobile--outline-icon nv-button--theme--desktop--dark nv-button--theme--laptop--dark nv-button--theme--tablet--dark nv-button--theme--mobile--dark\" href=\"https:\/\/nventive.com\/fr\/blogue\/\" aria-label=\"Voir tous les articles\"        >\n            <span class=\"nv-button__text\">Voir tous les articles<\/span>\n            <span class=\"nv-button__icon\">\n                <i aria-hidden=\"true\" class=\"myemoji-icon my-emoji-iconarrow_right_alt\"><\/i>            <\/span>\n        <\/a>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3d033e elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"2e3d033e\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:5334,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>D\u00e9fini comme \u00e9tant con\u00e7u pour \u00eatre accessible au public, un projet open source peut \u00eatre vu, modifi\u00e9, utilis\u00e9 et distribu\u00e9 \u00e0 la convenance de son groupe de propri\u00e9taires.<\/p>\n","protected":false},"author":3,"featured_media":7100,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26],"tags":[53],"main_article":[],"class_list":["post-7099","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-solutions","tag-cybersecurite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Utilisation s\u00e9curitaire de l\u2019open source d\u00e9veloppement sur mesure | nventive<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment utiliser l\u2019open source de mani\u00e8re s\u00e9curis\u00e9e dans vos projets de d\u00e9veloppement sur mesure pour garantir fiabilit\u00e9 et conformit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Utilisation s\u00e9curitaire de l\u2019open source d\u00e9veloppement sur mesure | nventive\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment utiliser l\u2019open source de mani\u00e8re s\u00e9curis\u00e9e dans vos projets de d\u00e9veloppement sur mesure pour garantir fiabilit\u00e9 et conformit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/\" \/>\n<meta property=\"og:site_name\" content=\"nventive\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-30T12:44:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-25T07:25:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"474\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"nventive\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nventive\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/\"},\"author\":{\"name\":\"nventive\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379\"},\"headline\":\"Une utilisation s\u00e9curitaire de l\u2019open source en d\u00e9veloppement sur mesure\",\"datePublished\":\"2023-03-30T12:44:00+00:00\",\"dateModified\":\"2025-01-25T07:25:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/\"},\"wordCount\":1106,\"publisher\":{\"@id\":\"https:\/\/nventive.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Solutions\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/\",\"url\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/\",\"name\":\"Utilisation s\u00e9curitaire de l\u2019open source d\u00e9veloppement sur mesure | nventive\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp\",\"datePublished\":\"2023-03-30T12:44:00+00:00\",\"dateModified\":\"2025-01-25T07:25:35+00:00\",\"description\":\"D\u00e9couvrez comment utiliser l\u2019open source de mani\u00e8re s\u00e9curis\u00e9e dans vos projets de d\u00e9veloppement sur mesure pour garantir fiabilit\u00e9 et conformit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#primaryimage\",\"url\":\"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp\",\"contentUrl\":\"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp\",\"width\":842,\"height\":474,\"caption\":\"Une utilisation s\u00e9curitaire de l\u2019open source en d\u00e9veloppement sur mesure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/nventive.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Une utilisation s\u00e9curitaire de l\u2019open source en d\u00e9veloppement sur mesure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nventive.com\/fr\/#website\",\"url\":\"https:\/\/nventive.com\/fr\/\",\"name\":\"nventive\",\"description\":\"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al\",\"publisher\":{\"@id\":\"https:\/\/nventive.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nventive.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nventive.com\/fr\/#organization\",\"name\":\"nventive\",\"url\":\"https:\/\/nventive.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"nventive\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/nventive\/\",\"https:\/\/www.instagram.com\/hellonventive\/\",\"https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379\",\"name\":\"nventive\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g\",\"caption\":\"nventive\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Utilisation s\u00e9curitaire de l\u2019open source d\u00e9veloppement sur mesure | nventive","description":"D\u00e9couvrez comment utiliser l\u2019open source de mani\u00e8re s\u00e9curis\u00e9e dans vos projets de d\u00e9veloppement sur mesure pour garantir fiabilit\u00e9 et conformit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/","og_locale":"fr_FR","og_type":"article","og_title":"Utilisation s\u00e9curitaire de l\u2019open source d\u00e9veloppement sur mesure | nventive","og_description":"D\u00e9couvrez comment utiliser l\u2019open source de mani\u00e8re s\u00e9curis\u00e9e dans vos projets de d\u00e9veloppement sur mesure pour garantir fiabilit\u00e9 et conformit\u00e9.","og_url":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/","og_site_name":"nventive","article_published_time":"2023-03-30T12:44:00+00:00","article_modified_time":"2025-01-25T07:25:35+00:00","og_image":[{"width":842,"height":474,"url":"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp","type":"image\/webp"}],"author":"nventive","twitter_card":"summary_large_image","twitter_misc":{"Written by":"nventive","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#article","isPartOf":{"@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/"},"author":{"name":"nventive","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379"},"headline":"Une utilisation s\u00e9curitaire de l\u2019open source en d\u00e9veloppement sur mesure","datePublished":"2023-03-30T12:44:00+00:00","dateModified":"2025-01-25T07:25:35+00:00","mainEntityOfPage":{"@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/"},"wordCount":1106,"publisher":{"@id":"https:\/\/nventive.com\/fr\/#organization"},"image":{"@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Solutions"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/","url":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/","name":"Utilisation s\u00e9curitaire de l\u2019open source d\u00e9veloppement sur mesure | nventive","isPartOf":{"@id":"https:\/\/nventive.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#primaryimage"},"image":{"@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp","datePublished":"2023-03-30T12:44:00+00:00","dateModified":"2025-01-25T07:25:35+00:00","description":"D\u00e9couvrez comment utiliser l\u2019open source de mani\u00e8re s\u00e9curis\u00e9e dans vos projets de d\u00e9veloppement sur mesure pour garantir fiabilit\u00e9 et conformit\u00e9.","breadcrumb":{"@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#primaryimage","url":"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp","contentUrl":"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp","width":842,"height":474,"caption":"Une utilisation s\u00e9curitaire de l\u2019open source en d\u00e9veloppement sur mesure"},{"@type":"BreadcrumbList","@id":"https:\/\/nventive.com\/fr\/articles\/une-utilisation-securitaire-de-l-open-source-en-developpement-sur-mesure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/nventive.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Une utilisation s\u00e9curitaire de l\u2019open source en d\u00e9veloppement sur mesure"}]},{"@type":"WebSite","@id":"https:\/\/nventive.com\/fr\/#website","url":"https:\/\/nventive.com\/fr\/","name":"nventive","description":"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al","publisher":{"@id":"https:\/\/nventive.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nventive.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/nventive.com\/fr\/#organization","name":"nventive","url":"https:\/\/nventive.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"nventive"},"image":{"@id":"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/nventive\/","https:\/\/www.instagram.com\/hellonventive\/","https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w"]},{"@type":"Person","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379","name":"nventive","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g","caption":"nventive"}}]}},"jetpack_featured_media_url":"https:\/\/nventive.com\/app\/uploads\/2024\/12\/utilisation-securitaire-open-source-developpement-solutions.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts\/7099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/comments?post=7099"}],"version-history":[{"count":0,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts\/7099\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/media\/7100"}],"wp:attachment":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/media?parent=7099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/categories?post=7099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/tags?post=7099"},{"taxonomy":"main_article","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/main_article?post=7099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}