{"id":16136,"date":"2025-09-01T10:32:57","date_gmt":"2025-09-01T10:32:57","guid":{"rendered":"https:\/\/bx.tech\/?page_id=16136"},"modified":"2025-11-06T15:34:33","modified_gmt":"2025-11-06T15:34:33","slug":"bug-bounty-program","status":"publish","type":"page","link":"https:\/\/bx.tech\/es\/bug-bounty-program\/","title":{"rendered":"Bug Bounty Program"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"16136\" class=\"elementor elementor-16136\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52dbbdde elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52dbbdde\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d9cd5ae\" data-id=\"d9cd5ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67ddee1d elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"67ddee1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"a\" viewbox=\"0 0 217.13 516.95\"><defs><style>.b{fill:#d3e3ac;}<\/style><\/defs><path class=\"b\" d=\"M80.97,0H0L136.16,258.48,0,516.95H80.97L217.13,258.48,80.97,0Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-494c2a6e\" data-id=\"494c2a6e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c09dfa2 elementor-widget elementor-widget-heading\" data-id=\"3c09dfa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bug Bounty Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6de04d54\" data-id=\"6de04d54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fbf0c68 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"1fbf0c68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"a\" viewbox=\"0 0 217.19 516.95\"><defs><style>.b{fill:#d3e3ac;}<\/style><\/defs><path class=\"b\" d=\"M0,258.48L136.16,0h81.03L80.97,258.48l136.23,258.47h-81.03L0,258.48Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25b1720 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25b1720\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-47405b3\" data-id=\"47405b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82c331e elementor-widget elementor-widget-text-editor\" data-id=\"82c331e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>BX Technologies is a farm intelligence platform that helps farming enterprises turn fragmented data into actionable insights.&nbsp;We welcome responsible disclosure of vulnerabilities. Please act in good faith and avoid harming users, data, or service availability.<\/p>\n<h4>Ground Rules<\/h4>\n<section aria-labelledby=\"bb-rules\">\n<ul>\n<li><strong>Disclosure window:<\/strong>&nbsp;Please allow up to&nbsp;<strong>90 days<\/strong> for remediation before any public disclosure (unless specified by mutual agreement)<\/li>\n<li><strong>No harm:<\/strong> Don\u2019t exfiltrate, manipulate, or destroy data; avoid degradation\/DoS, spam, or service disruption<\/li>\n<li><strong>Good-faith only:<\/strong> No social engineering, phishing, physical security testing, or attacks on third-party providers<\/li>\n<li><strong>Stop on sensitive data:<\/strong> If you encounter personal data, secrets, or payment information, stop testing and report immediately without retaining copies<\/li>\n<li><strong>Respect rate limits:<\/strong> Keep traffic reasonable; coordinate if testing could affect availability<\/li>\n<\/ul>\n<\/section>\n<section aria-labelledby=\"bb-safeharbor\"><\/section>\n<h4>Safe Harbour<\/h4>\n<p>Good-faith research under this policy is authorised by BX Technologies. We won\u2019t pursue legal action or law-enforcement investigation for activities that comply with this policy. If third parties raise legal issues, we will make our authorisation clear.<\/p>\n<h4>Scope<\/h4>\n<h6>In Scope<\/h6>\n<ul>\n<li><code>bx.tech<\/code>&nbsp;and subdomains (<code>*.bx.tech<\/code>) owned by BX Technologies<\/li>\n<li>Public-facing web apps and APIs that power BX features<\/li>\n<\/ul>\n<h6>Out of Scope<\/h6>\n<ul>\n<li>Denial of Service, spam, brute force, or automated account enumeration<\/li>\n<li>Third-party services not owned\/controlled by BX (unless explicitly listed as in scope)<\/li>\n<li>Low-impact issues without demonstrated exploitability (e.g., missing security headers, version banners), self-XSS, or attacks that only affect outdated browsers<\/li>\n<\/ul>\n<h4>Rewards<\/h4>\n<p>Rewards are discretionary, based on severity, impact, and report quality.<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\" role=\"table\">\n<thead>\n<tr>\n<th style=\"text-align: center; border-bottom: 1px solid #ddd; padding: 8px;\"><strong>Severity<\/strong><\/th>\n<th style=\"text-align: center; border-bottom: 1px solid #ddd; padding: 8px;\"><strong>Examples<\/strong><\/th>\n<th style=\"text-align: center; border-bottom: 1px solid #ddd; padding: 8px;\"><strong>Reward<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"padding: 8px; vertical-align: top;\"><strong>Critical<\/strong><\/td>\n<td style=\"padding: 8px; vertical-align: top;\">RCE; full auth bypass; DB read\/write; critical API takeover<\/td>\n<td style=\"padding: 8px; vertical-align: top;\">$1,000 \u2013 $2,000<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 8px; vertical-align: top;\"><strong>High<\/strong><\/td>\n<td style=\"padding: 8px; vertical-align: top;\">Stored XSS (privileged panels); IDOR exposing sensitive data; SSRF to internal services; privilege escalation<\/td>\n<td style=\"padding: 8px; vertical-align: top;\">$400 \u2013 $1,000<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 8px; vertical-align: top;\"><strong>Medium<\/strong><\/td>\n<td style=\"padding: 8px; vertical-align: top;\">Reflected XSS with realistic exploitation; CSRF on important actions; leakage of tokens\/keys with impact<\/td>\n<td style=\"padding: 8px; vertical-align: top;\">$150 \u2013 $400<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 8px; vertical-align: top;\"><strong>Low<\/strong><\/td>\n<td style=\"padding: 8px; vertical-align: top;\">Minor info disclosure; low-risk CSRF\/clickjacking; best-practice gaps with limited impact<\/td>\n<td style=\"padding: 8px; vertical-align: top;\">$50 \u2013 $150<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 8px; vertical-align: top;\"><strong>Out of Scope<\/strong><\/td>\n<td style=\"padding: 8px; vertical-align: top;\">DoS, spam, brute force, self-XSS, outdated-browser issues, non-exploitable header findings<\/td>\n<td style=\"padding: 8px; vertical-align: top;\">No reward<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>BX may cap monthly payouts and may pause rewards after a cap is reached. Rewards are guidelines, not guarantees. Note that all payouts would require an invoice and would be done by wire transfer.<\/p>\n<section aria-labelledby=\"bb-submit\">\n<h2 id=\"bb-submit\">How to Submit<\/h2>\n<p>Keep it concise but actionable. Please include a clear description, reproducible steps, affected URLs\/endpoints, impact, and a simple PoC if possible. Send to&nbsp;<a href=\"mailto:security@bx.tech\">security@bx.tech<\/a>. We aim to acknowledge within&nbsp;<strong>3 business days<\/strong>.<\/p>\n<h2 id=\"bb-legal\">Aviso legal<\/h2>\n<p>This policy does not create a contractual relationship or waiver beyond the safe-harbour statement. Rewards are at BX\u2019s discretion and may change. By participating, you agree to this policy.<\/p><p><br><\/p>\n<\/section>\n<p>Last updated: 6th November 2025<\/p>\n<section aria-labelledby=\"bb-legal\"><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Bug Bounty Program BX Technologies is a farm intelligence platform that helps farming enterprises turn fragmented data into actionable insights.&nbsp;We welcome responsible disclosure of vulnerabilities. Please act in good faith and avoid harming users, data, or service availability. Ground Rules Disclosure window:&nbsp;Please allow up to&nbsp;90 days for remediation before any public disclosure (unless specified by [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":2921,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_angie_page":false,"content-type":"","footnotes":""},"class_list":["post-16136","page","type-page","status-publish","has-post-thumbnail","hentry","grve-entry-item"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bug Bounty Program - BX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bx.tech\/es\/bug-bounty-program\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bug Bounty Program - BX\" \/>\n<meta property=\"og:description\" content=\"Bug Bounty Program BX Technologies is a farm intelligence platform that helps farming enterprises turn fragmented data into actionable insights.&nbsp;We welcome responsible disclosure of vulnerabilities. Please act in good faith and avoid harming users, data, or service availability. Ground Rules Disclosure window:&nbsp;Please allow up to&nbsp;90 days for remediation before any public disclosure (unless specified by [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bx.tech\/es\/bug-bounty-program\/\" \/>\n<meta property=\"og:site_name\" content=\"BX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BXearth\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-06T15:34:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bx.tech\/wp-content\/uploads\/2022\/06\/BX-Featured-Image-Card.jpg?_t=1762443273\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@BxEarth\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bx.tech\\\/bug-bounty-program\\\/\",\"url\":\"https:\\\/\\\/bx.tech\\\/bug-bounty-program\\\/\",\"name\":\"Bug Bounty Program - BX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bx.tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bx.tech\\\/bug-bounty-program\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bx.tech\\\/bug-bounty-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bx.tech\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/BX-Featured-Image-Card.jpg\",\"datePublished\":\"2025-09-01T10:32:57+00:00\",\"dateModified\":\"2025-11-06T15:34:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bx.tech\\\/bug-bounty-program\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bx.tech\\\/bug-bounty-program\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/bx.tech\\\/bug-bounty-program\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bx.tech\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/BX-Featured-Image-Card.jpg\",\"contentUrl\":\"https:\\\/\\\/bx.tech\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/BX-Featured-Image-Card.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bx.tech\\\/bug-bounty-program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bx.tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bug Bounty Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bx.tech\\\/#website\",\"url\":\"https:\\\/\\\/bx.tech\\\/\",\"name\":\"BX\",\"description\":\"All your farm data. One intelligent platform.\",\"publisher\":{\"@id\":\"https:\\\/\\\/bx.tech\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bx.tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bx.tech\\\/#organization\",\"name\":\"BX\",\"url\":\"https:\\\/\\\/bx.tech\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/bx.tech\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bx.tech\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cropped-Favicon-New-BX-01.png\",\"contentUrl\":\"https:\\\/\\\/bx.tech\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/cropped-Favicon-New-BX-01.png\",\"width\":512,\"height\":512,\"caption\":\"BX\"},\"image\":{\"@id\":\"https:\\\/\\\/bx.tech\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BXearth\",\"https:\\\/\\\/x.com\\\/BxEarth\",\"https:\\\/\\\/www.instagram.com\\\/bx_earth\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/bxtech\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bug Bounty Program - BX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bx.tech\/es\/bug-bounty-program\/","og_locale":"es_ES","og_type":"article","og_title":"Bug Bounty Program - BX","og_description":"Bug Bounty Program BX Technologies is a farm intelligence platform that helps farming enterprises turn fragmented data into actionable insights.&nbsp;We welcome responsible disclosure of vulnerabilities. Please act in good faith and avoid harming users, data, or service availability. Ground Rules Disclosure window:&nbsp;Please allow up to&nbsp;90 days for remediation before any public disclosure (unless specified by [&hellip;]","og_url":"https:\/\/bx.tech\/es\/bug-bounty-program\/","og_site_name":"BX","article_publisher":"https:\/\/www.facebook.com\/BXearth","article_modified_time":"2025-11-06T15:34:33+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/bx.tech\/wp-content\/uploads\/2022\/06\/BX-Featured-Image-Card.jpg?_t=1762443273","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@BxEarth","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bx.tech\/bug-bounty-program\/","url":"https:\/\/bx.tech\/bug-bounty-program\/","name":"Bug Bounty Program - BX","isPartOf":{"@id":"https:\/\/bx.tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bx.tech\/bug-bounty-program\/#primaryimage"},"image":{"@id":"https:\/\/bx.tech\/bug-bounty-program\/#primaryimage"},"thumbnailUrl":"https:\/\/bx.tech\/wp-content\/uploads\/2022\/06\/BX-Featured-Image-Card.jpg","datePublished":"2025-09-01T10:32:57+00:00","dateModified":"2025-11-06T15:34:33+00:00","breadcrumb":{"@id":"https:\/\/bx.tech\/bug-bounty-program\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bx.tech\/bug-bounty-program\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/bx.tech\/bug-bounty-program\/#primaryimage","url":"https:\/\/bx.tech\/wp-content\/uploads\/2022\/06\/BX-Featured-Image-Card.jpg","contentUrl":"https:\/\/bx.tech\/wp-content\/uploads\/2022\/06\/BX-Featured-Image-Card.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/bx.tech\/bug-bounty-program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bx.tech\/"},{"@type":"ListItem","position":2,"name":"Bug Bounty Program"}]},{"@type":"WebSite","@id":"https:\/\/bx.tech\/#website","url":"https:\/\/bx.tech\/","name":"BX","description":"All your farm data. One intelligent platform.","publisher":{"@id":"https:\/\/bx.tech\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bx.tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/bx.tech\/#organization","name":"BX","url":"https:\/\/bx.tech\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/bx.tech\/#\/schema\/logo\/image\/","url":"https:\/\/bx.tech\/wp-content\/uploads\/2022\/04\/cropped-Favicon-New-BX-01.png","contentUrl":"https:\/\/bx.tech\/wp-content\/uploads\/2022\/04\/cropped-Favicon-New-BX-01.png","width":512,"height":512,"caption":"BX"},"image":{"@id":"https:\/\/bx.tech\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BXearth","https:\/\/x.com\/BxEarth","https:\/\/www.instagram.com\/bx_earth\/","https:\/\/www.linkedin.com\/company\/bxtech\/"]}]}},"_links":{"self":[{"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/pages\/16136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/comments?post=16136"}],"version-history":[{"count":16,"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/pages\/16136\/revisions"}],"predecessor-version":[{"id":16320,"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/pages\/16136\/revisions\/16320"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/media\/2921"}],"wp:attachment":[{"href":"https:\/\/bx.tech\/es\/wp-json\/wp\/v2\/media?parent=16136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}