{"id":158963,"date":"2025-09-09T14:01:01","date_gmt":"2025-09-09T12:01:01","guid":{"rendered":"https:\/\/jfrog.com\/blog\/agentic-software-supply-chain-security-ai-assisted-curation-remediation\/"},"modified":"2025-10-13T14:16:39","modified_gmt":"2025-10-13T12:16:39","slug":"securite-agentique-supply-chain-logicielle-curation-remediation-ia","status":"publish","type":"post","link":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/","title":{"rendered":"S\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle : curation et rem\u00e9diation assist\u00e9es par l\u2019IA"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full wp-image-157090 aligncenter\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212057\/Unlock-agentic-863x300-1.png\" alt=\"\" width=\"863\" height=\"300\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Les cha\u00eenes d\u2019approvisionnement logicielle sont le vecteur d\u2019attaque n\u00b0\u00a01 des cybercriminels. Le d\u00e9fi ne consiste pas seulement \u00e0 trouver les vuln\u00e9rabilit\u00e9s, mais \u00e0 les corriger vite tout en pr\u00e9servant la s\u00e9curit\u00e9, la conformit\u00e9 et la productivit\u00e9 des d\u00e9veloppeurs. Avec la complexification des supply chains, les approches classiques montrent leurs limites. Il faut une aide intelligente, autonome, et nativement int\u00e9gr\u00e9e dans le workflow des \u00e9quipes de d\u00e9veloppement.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nous sommes heureux d\u2019annoncer que <\/span><b>JFrog introduit Agentic Software Supply Chain Security <\/b><span style=\"font-weight: 400;\">(s\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle), afin d\u2019aider les organisations \u00e0 <\/span><b>r\u00e9duire les risques, diminuer les co\u00fbts et acc\u00e9l\u00e9rer la livraison<\/b><span style=\"font-weight: 400;\">. En associant la plateforme de confiance de JFrog \u00e0 l\u2019<\/span><b>automatisation pilot\u00e9e par l\u2019IA<\/b><span style=\"font-weight: 400;\">, les \u00e9quipes de d\u00e9veloppement peuvent passer de pratiques de s\u00e9curit\u00e9 r\u00e9actives \u00e0 une s\u00e9curit\u00e9 proactive et agentique de la cha\u00eene d\u2019approvisionnement logicielle, en conservant des progiciels plus s\u00fbrs, en rem\u00e9diant aux CVE et en codant en toute confiance.<\/span><\/p>\n<h2><strong>Agentic Software Supply Chain Security de JFrog<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Agentic Software Supply Chain Security est un point culminant de divers outils et capacit\u00e9s au sein de la plateforme de cha\u00eene d\u2019approvisionnement logicielle JFrog ainsi que des int\u00e9grations avec des partenaires externes, et comprend JFrog Catalog, Curation, SAST, GitHub Copilot, et VSCode. Voil\u00e0 comment l\u2019ensemble fonctionne de concert pour faire passer les \u00e9quipes de d\u00e9veloppement de pratiques d\u00e9fensives r\u00e9actives \u00e0 une approche de s\u00e9curit\u00e9 proactive, pilot\u00e9e par des agents.<\/span><\/p>\n<h3><strong>Curation\u00a0: une s\u00e9lection de packages plus rapide et plus intelligente<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">L\u2019open source est le fondement des logiciels modernes, mais avec des millions de packages et des obligations de licence vari\u00e9es, la cr\u00e9ation de d\u00e9pendances s\u00fbres et conformes peut s\u2019av\u00e9rer d\u00e9courageante.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Avec <\/span><a href=\"https:\/\/jfrog.com\/fr\/curation\/\"><span style=\"font-weight: 400;\">JFrog Catalog &amp; Curation<\/span><\/a><span style=\"font-weight: 400;\"> les d\u00e9veloppeurs peuvent d\u00e9sormais builder en toute confiance. Des agents dot\u00e9s d\u2019une intelligence artificielle, connect\u00e9s aux solutions de s\u00e9curit\u00e9 de JFrog via le protocole MCP (<\/span><i><span style=\"font-weight: 400;\">Model Context Protocol<\/span><\/i><span style=\"font-weight: 400;\">) \u00e0 distance de JFrog, analysent les m\u00e9tadonn\u00e9es des packages, la posture de s\u00e9curit\u00e9 et la conformit\u00e9 avec les politiques organisationnelles, aidant ainsi les \u00e9quipes \u00e0 s\u00e9lectionner rapidement les meilleures biblioth\u00e8ques open source. En s\u2019assurant que les d\u00e9veloppeurs ne peuvent utiliser que les packages les plus s\u00fbrs et conformes aux r\u00e8gles, les \u00e9quipes \u00e9vitent les \u00e9checs de build dus aux vuln\u00e9rabilit\u00e9s et assurent le bon fonctionnement des pipelines CI\/CD, ce qui raccourcit les cycles de release et acc\u00e9l\u00e8re les livraisons.<\/span><\/p>\n<h4><strong>Exemple de workflow de curation :<\/strong><\/h4>\n<ul>\n<li aria-level=\"1\"><b>\u00c9tape\u00a01\u00a0:<\/b><span style=\"font-weight: 400;\"> Un d\u00e9veloppeur \u00e9crit du code avec l\u2019aide d\u2019un agent IA (par ex., GitHub Copilot).<\/span><\/li>\n<li aria-level=\"1\"><b>\u00c9tape\u00a02\u00a0:<\/b><span style=\"font-weight: 400;\"> Copilot s\u00e9lectionne les packages n\u00e9cessaires et les valide aupr\u00e8s de Curation par l\u2019interm\u00e9diaire de JFrog MCP.<\/span><\/li>\n<li aria-level=\"1\"><b>\u00c9tape\u00a03\u00a0:<\/b><span style=\"font-weight: 400;\"> JFrog Curation \u00e9value le package en fonction des politiques de s\u00e9curit\u00e9 et de licence et des bases de donn\u00e9es CVE prises en charge par JFrog Catalog<\/span><\/li>\n<li aria-level=\"1\"><b>\u00c9tape\u00a04\u00a0:<\/b><span style=\"font-weight: 400;\"> L\u2019agent IA avec les connaissances de JFrog (via MCP \u00e0 distance) remplace les mauvaises versions des packages par celles qui satisfont \u00e0 la politique de curation.<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"size-full wp-image-157390 aligncenter\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/08202559\/curation-workflow.png\" alt=\"\" width=\"720\" height=\"720\" \/><\/p>\n<p><span style=\"font-weight: 400;\">R\u00e9sultat\u00a0: une <\/span><b>innovation plus rapide sans sacrifier la s\u00e9curit\u00e9 ou la gouvernance.<\/b><\/p>\n<h3><strong>Rem\u00e9diation agentique du code source, s\u00e9curis\u00e9e et conviviale<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">La s\u00e9curit\u00e9 ne devrait pas ralentir les d\u00e9veloppeurs. Au contraire, elle doit les rejoindre dans l\u2019IDE, au moment o\u00f9 ils codent, pour favoriser une innovation sans friction.<\/span><\/p>\n<p><a href=\"https:\/\/jfrog.com\/fr\/sast\/\"><span style=\"font-weight: 400;\">JFrog SAST<\/span><\/a><span style=\"font-weight: 400;\"> met en \u00e9vidence les vuln\u00e9rabilit\u00e9s du code source directement dans l\u2019IDE. Avec la <\/span><b>rem\u00e9diation agentique<\/b><span style=\"font-weight: 400;\">, les d\u00e9veloppeurs obtiennent en temps r\u00e9el des modifications de code contextuelles, conviviales et exploitables, sugg\u00e9r\u00e9es par l\u2019IA, de sorte qu\u2019ils n\u2019ont pas besoin de passer au crible les journaux ou les rapports de s\u00e9curit\u00e9. Le MCP SAST local de JFrog connecte la plateforme JFrog \u00e0 l\u2019agent IA de votre choix. L\u2019agent obtient des informations du moteur SAST, qui analyse la base de code et g\u00e9n\u00e8re des r\u00e9sultats SAST.<\/span><\/p>\n<h4><strong>Exemple de workflow de codage :<\/strong><\/h4>\n<ul>\n<li aria-level=\"1\"><b>\u00c9tape\u00a01\u00a0:<\/b><span style=\"font-weight: 400;\"> Un d\u00e9veloppeur \u00e9crit un nouveau code.<\/span><\/li>\n<li aria-level=\"1\"><b>\u00c9tape\u00a02\u00a0:<\/b><span style=\"font-weight: 400;\"> JFrog analyse le code et signale tout motif vuln\u00e9rable, par ex. une injection SQL<\/span><\/li>\n<li aria-level=\"1\"><b>\u00c9tape\u00a03\u00a0:<\/b><span style=\"font-weight: 400;\"> Le d\u00e9veloppeur demande \u00e0 l\u2019agent IA de r\u00e9soudre les probl\u00e8mes SAST dans le code.<\/span><\/li>\n<li aria-level=\"1\"><b>\u00c9tape\u00a04\u00a0:<\/b><span style=\"font-weight: 400;\"> L\u2019agent IA re\u00e7oit du moteur SAST les informations de rem\u00e9diation afin de proposer, en ligne dans le code, une correction s\u00e9curis\u00e9e (\u00ab\u00a0Convertir en requ\u00eate param\u00e9tr\u00e9e\u00a0\u00bb, ou en anglais\u00a0: \u00ab\u00a0Convert to parameterized query\u00a0\u00bb).<\/span><\/li>\n<li><b>\u00c9tape\u00a05\u00a0:<\/b><span style=\"font-weight: 400;\"> Le d\u00e9veloppeur examine et accepte ou rejette le code propos\u00e9.<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-157389\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/08202540\/coding-workflow.png\" alt=\"\" width=\"720\" height=\"719\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Cela permet de s\u2019assurer que les \u00e9quipes ne se contentent pas de trouver des probl\u00e8mes, mais qu\u2019elles \u00e9crivent continuellement du <\/span><b>code s\u00e9curis\u00e9 par d\u00e9faut.<\/b><\/p>\n<h3><strong>Rem\u00e9diation automatis\u00e9e ou \u00ab\u00a0Demander \u00e0 Copilot de corriger\u00a0\u00bb (en anglais, <i>Ask Copilot to Fix<\/i>)<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Les vuln\u00e9rabilit\u00e9s dans les d\u00e9pendances open source (CVE) restent l\u2019un des vecteurs d\u2019attaque les plus exploit\u00e9s dans la cha\u00eene d\u2019approvisionnement logicielle. Les identifier n\u2019est que la moiti\u00e9 de la bataille\u00a0; le v\u00e9ritable d\u00e9fi consiste \u00e0 y rem\u00e9dier rapidement et avec pr\u00e9cision.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La fonction \u00ab\u00a0Ask Copilot to Fix\u00a0\u00bb fait partie de notre extension VSCode et sugg\u00e8re ou applique automatiquement des correctifs, des mises \u00e0 jour de d\u00e9pendances ou des alternatives s\u00fbres. L\u2019action \u00ab\u00a0Ask Copilot to Fix\u00a0\u00bb peut \u00eatre d\u00e9clench\u00e9e pour diverses constatations de s\u00e9curit\u00e9, y compris celles provenant de l\u2019analyse SAST, de l\u2019analyse des secrets et de l\u2019analyse IaC. La rem\u00e9diation est ainsi <\/span><b>transparente, efficace et int\u00e9gr\u00e9e directement dans l\u2019exp\u00e9rience du d\u00e9veloppeur<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h4><strong>Exemple de workflow pour la rem\u00e9diation des CVE\u00a0:<\/strong><\/h4>\n<ol>\n<li><span style=\"font-weight: 400;\">L\u2019extension VSCode analyse l\u2019ensemble de votre base de code<\/span>.\n<ul>\n<li><span style=\"font-weight: 400;\">Si vous disposez de JFrog Advanced Security, l\u2019analyse comprend l\u2019analyse contextuelle, SAST, la d\u00e9tection des secrets et l\u2019analyse de l\u2019infrastructure en tant que code (IaC).<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Par exemple, <\/span><i><span style=\"font-weight: 400;\">l\u2019analyse d\u00e9tecte une CVE dans une d\u00e9pendance, log4j version\u00a02.14.1.<\/span><\/i><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-weight: 400;\">Le d\u00e9veloppeur choisit alors l\u2019option de correction du probl\u00e8me d\u00e9tect\u00e9 \u00ab\u00a0Ask Copilot to Fix\u00a0\u00bb.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Les informations relatives \u00e0 la rem\u00e9diation sont transmises \u00e0 Copilot par JFrog.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Copilot g\u00e9n\u00e8re la correction de code sur la base des informations de rem\u00e9diation de JFrog.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Au lieu de submerger les \u00e9quipes d\u2019alertes, JFrog les dote d\u2019une <\/span><b>rem\u00e9diation autonome et agentique<\/b><span style=\"font-weight: 400;\"> qui assure la s\u00e9curit\u00e9 de la cha\u00eene d\u2019approvisionnement sans ralentir les livraisons.<\/span><\/p>\n<h2><strong>L\u2019avantage JFrog<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">JFrog aide les \u00e9quipes \u00e0 passer d\u2019une s\u00e9curit\u00e9 r\u00e9active \u00e0 une s\u00e9curit\u00e9 proactive. Gr\u00e2ce aux recherches approfondies de JFrog en mati\u00e8re de s\u00e9curit\u00e9, la plateforme JFrog garantit une protection compl\u00e8te et des informations exploitables. En connectant des agents IA \u00e0 la plateforme JFrog via des serveurs MCP et en utilisant le plugin JFrog VSCode, les d\u00e9veloppeurs b\u00e9n\u00e9ficient d\u2019avantages\u00a0:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Curation des packages automatis\u00e9e pour une r\u00e9duction des risques de la cha\u00eene d\u2019approvisionnement.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">S\u00e9curit\u00e9 du code et rem\u00e9diation en ligne, en fonction du contexte.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Correctifs de CVE et autres, fluides et sans friction, qui acc\u00e9l\u00e8rent les cycles de release.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Il ne s\u2019agit pas d\u2019un simple assistant IA, mais d\u2019une rem\u00e9diation agentique et autonome qui transforme le DevSecOps en une cha\u00eene d\u2019approvisionnement logicielle auto-r\u00e9paratrice. Contrairement aux solutions ponctuelles, JFrog offre\u00a0:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Une visibilit\u00e9 de bout en bout<\/b><span style=\"font-weight: 400;\">, du code \u00e0 l\u2019ex\u00e9cution.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Des <\/span><b>workflows d\u2019IA agentique<\/b><span style=\"font-weight: 400;\"> int\u00e9gr\u00e9s dans la curation, le codage et la rem\u00e9diation des CVE.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Des <\/span><b>renseignements en mati\u00e8re de s\u00e9curit\u00e9 de confiance<\/b><span style=\"font-weight: 400;\">, int\u00e9gr\u00e9s \u00e0 GitHub, aux environnements IDE et aux pipelines DevSecOps d\u2019entreprise.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Avec JFrog, les entreprises peuvent passer d\u2019un syst\u00e8me de correctifs r\u00e9actif \u00e0 une s\u00e9curit\u00e9 proactive, autonome et continue.<\/span><\/p>\n<h3><strong>B\u00e9n\u00e9fices op\u00e9rationnels<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Voici les r\u00e9sultats auxquels les organisations peuvent s\u2019attendre gr\u00e2ce \u00e0 la s\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle de JFrog.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-157548\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/09133538\/image1-2.png\" alt=\"\" width=\"700\" height=\"699\" \/><\/p>\n<h4><strong>Rapidit\u00e9 de mise sur le march\u00e9<\/strong><\/h4>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Les packages open source tri\u00e9s par l\u2019IA r\u00e9duisent les d\u00e9lais d\u2019approvisionnement et les v\u00e9rifications de conformit\u00e9.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Les d\u00e9veloppeurs passent moins de temps \u00e0 rechercher des biblioth\u00e8ques et plus de temps \u00e0 innover.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Cela peut permettre d\u2019<\/span><b>acc\u00e9l\u00e9rer le codage et la rem\u00e9diation<\/b><span style=\"font-weight: 400;\"> des CVE.<\/span><\/li>\n<\/ul>\n<h4><strong>R\u00e9duction des risques<\/strong><\/h4>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">La rem\u00e9diation automatis\u00e9e des CVE peut contribuer \u00e0 r\u00e9duire les fen\u00eatres d\u2019exposition<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">La rem\u00e9diation agentique du code source r\u00e9duit l\u2019erreur humaine et garantit la s\u00e9curit\u00e9 d\u00e8s la conception.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">L\u2019am\u00e9lioration de la conformit\u00e9 des licences r\u00e9duit les risques juridiques et de r\u00e9putation.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Les intrusions \u00e9vit\u00e9es g\u00e9n\u00e8rent un <\/span><b>retour sur investissement<\/b><span style=\"font-weight: 400;\"> majeur\u00a0: en moyenne, un incident de supply chain logicielle co\u00fbte plus de <\/span><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\"><b>4,4\u00a0millions de dollars<\/b><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<h4><strong>Efficacit\u00e9 op\u00e9rationnelle<\/strong><\/h4>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">La rem\u00e9diation pilot\u00e9e par l\u2019IA r\u00e9duit le triage manuel, lib\u00e9rant ainsi les ing\u00e9nieurs en s\u00e9curit\u00e9 pour des t\u00e2ches \u00e0 forte valeur ajout\u00e9e.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">L\u2019int\u00e9gration transparente de l\u2019IDE r\u00e9duit les changements de contexte pour les d\u00e9veloppeurs et am\u00e9liore leur productivit\u00e9.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">L\u2019automatisation de la rem\u00e9diation permet de <\/span><b>r\u00e9duire consid\u00e9rablement le temps consacr\u00e9<\/b><span style=\"font-weight: 400;\"> \u00e0 l\u2019\u00e9valuation des d\u00e9pendances open source.<\/span><\/li>\n<\/ul>\n<h4><strong>\u00c9conomies de co\u00fbts<\/strong><\/h4>\n<ul>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Des cycles plus rapides signifient moins d\u2019incidents, moins de pannes et moins de co\u00fbts li\u00e9s aux violations.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Avec la g\u00e9n\u00e9ration de code et l\u2019assistance \u00e0 la rem\u00e9diation pilot\u00e9es par l\u2019IA, les d\u00e9veloppeurs peuvent atteindre <\/span><a href=\"https:\/\/www.businessinsider.com\/ai-coding-tools-popular-github-gemini-code-assist-cursor-q-2025-7\"><b>jusqu\u2019\u00e0 2x de gain de productivit\u00e9<\/b><\/a><span style=\"font-weight: 400;\">, l\u2019IA prenant en charge les t\u00e2ches r\u00e9p\u00e9titives.<\/span><\/li>\n<\/ul>\n<h2><strong>L\u2019avenir de la s\u00e9curit\u00e9 agentique<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">L\u2019avenir du DevSecOps ne se r\u00e9sume pas au shift-left\u00a0; il tient \u00e0 l\u2019<\/span><b>IA agentique<\/b><span style=\"font-weight: 400;\">\u00a0: une s\u00e9curit\u00e9 autonome aussi rapide que vos d\u00e9veloppeurs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Gr\u00e2ce aux capacit\u00e9s d\u2019IA agentique int\u00e9gr\u00e9es \u00e0 la plateforme JFrog, les d\u00e9veloppeurs b\u00e9n\u00e9ficient d\u2019avantages\u00a0:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Vitesse<\/b><span style=\"font-weight: 400;\"> gr\u00e2ce \u00e0 des packages open source tri\u00e9s par l\u2019IA.<\/span><\/li>\n<li aria-level=\"1\"><b>S\u00e9curit\u00e9<\/b><span style=\"font-weight: 400;\"> avec rem\u00e9diation de code agentique pilot\u00e9e par SAST.<\/span><\/li>\n<li aria-level=\"1\"><b>Continuit\u00e9<\/b><span style=\"font-weight: 400;\"> dans la d\u00e9tection des CVE et les auto-fixes.<\/span><\/li>\n<li aria-level=\"1\"><b>Confiance<\/b><span style=\"font-weight: 400;\"> dans la fourniture de logiciels \u00e0 grande \u00e9chelle, sans compromis.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">En combinant des fondations DevSecOps fiables avec des agents IA autonomes, JFrog fait de la <\/span><b>s\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle<\/b><span style=\"font-weight: 400;\"> une r\u00e9alit\u00e9, aidant les organisations \u00e0 fournir des logiciels s\u00e9curis\u00e9s, fiables et conformes au rythme de l\u2019innovation. Pour en savoir plus, <\/span><a href=\"https:\/\/jfrog.com\/fr\/platform\/schedule-a-demo\/\"><span style=\"font-weight: 400;\">planifiez une d\u00e9monstration<\/span><\/a><span style=\"font-weight: 400;\">, r\u00e9alisez une <\/span><a href=\"https:\/\/jfrog.com\/fr\/start\/try-github\/?utm_PE=github\"><span style=\"font-weight: 400;\">visite en ligne,<\/span><\/a><span style=\"font-weight: 400;\"> ou rendez-vous sur <\/span><a href=\"https:\/\/github.com\/marketplace\/jfrog-for-github\"><span style=\"font-weight: 400;\">GitHub Marketplace<\/span><\/a><span style=\"font-weight: 400;\"> pour connecter vos instances GitHub et JFrog et profiter d\u2019un codage s\u00e9curis\u00e9 et assist\u00e9 par l\u2019IA.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cha\u00eenes d\u2019approvisionnement logicielle sont le vecteur d\u2019attaque n\u00b0\u00a01 des cybercriminels. Le d\u00e9fi ne consiste pas seulement \u00e0 trouver les vuln\u00e9rabilit\u00e9s, mais \u00e0 les corriger vite tout en pr\u00e9servant la s\u00e9curit\u00e9, la conformit\u00e9 et la productivit\u00e9 des d\u00e9veloppeurs. Avec la complexification des supply chains, les approches classiques montrent leurs limites. Il faut une aide intelligente, &hellip;<\/p>\n","protected":false},"author":506,"featured_media":157093,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10619,10529,10531,10153],"tags":[10931,10932,10930,10724,9430],"class_list":["post-158963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ia-ml","category-communaute","category-devops-fr","category-securite-et-devsecops","tag-swampup-2025-fr","tag-swampup-fr","tag-agentic-ai-fr","tag-security-fr","tag-devops-fr","resource_categories-agentic-ai","resource_categories-security","resource_categories-swampup","resource_categories-devops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curit\u00e9 agentique de la supply chain logicielle | JFrog<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment la s\u00e9curit\u00e9 agentique de la cha\u00eene logicielle avec JFrog aide les organisations \u00e0 r\u00e9duire les risques, diminuer les co\u00fbts et acc\u00e9l\u00e9rer les livraisons.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/158963\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle : curation et rem\u00e9diation assist\u00e9es par l\u2019IA\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment la s\u00e9curit\u00e9 agentique de la cha\u00eene logicielle avec JFrog aide les organisations \u00e0 r\u00e9duire les risques, diminuer les co\u00fbts et acc\u00e9l\u00e9rer les livraisons.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-09T12:01:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-13T12:16:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212232\/Unlock-agentic-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"zoer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zoer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/\"},\"author\":{\"name\":\"zoer\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e\"},\"headline\":\"S\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle : curation et rem\u00e9diation assist\u00e9es par l\u2019IA\",\"datePublished\":\"2025-09-09T12:01:01+00:00\",\"dateModified\":\"2025-10-13T12:16:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/\"},\"wordCount\":1869,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212218\/Unlock-agentic_Thumbnail.png\",\"keywords\":[\"swampup 2025\",\"swampup\",\"agentic ai\",\"security\",\"DevOps\"],\"articleSection\":[\"IA\/ML\",\"Communaut\u00e9\",\"DevOps\",\"S\u00e9curit\u00e9 et DevSecOps\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/\",\"url\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/\",\"name\":\"S\u00e9curit\u00e9 agentique de la supply chain logicielle | JFrog\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212218\/Unlock-agentic_Thumbnail.png\",\"datePublished\":\"2025-09-09T12:01:01+00:00\",\"dateModified\":\"2025-10-13T12:16:39+00:00\",\"description\":\"D\u00e9couvrez comment la s\u00e9curit\u00e9 agentique de la cha\u00eene logicielle avec JFrog aide les organisations \u00e0 r\u00e9duire les risques, diminuer les co\u00fbts et acc\u00e9l\u00e9rer les livraisons.\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212218\/Unlock-agentic_Thumbnail.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212218\/Unlock-agentic_Thumbnail.png\",\"width\":203,\"height\":148,\"caption\":\"Robot with AI label connects to data blocks, security icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle : curation et rem\u00e9diation assist\u00e9es par l\u2019IA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/fr\/#website\",\"url\":\"https:\/\/jfrog.com\/fr\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e\",\"name\":\"zoer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g\",\"caption\":\"zoer\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 agentique de la supply chain logicielle | JFrog","description":"D\u00e9couvrez comment la s\u00e9curit\u00e9 agentique de la cha\u00eene logicielle avec JFrog aide les organisations \u00e0 r\u00e9duire les risques, diminuer les co\u00fbts et acc\u00e9l\u00e9rer les livraisons.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/158963","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle : curation et rem\u00e9diation assist\u00e9es par l\u2019IA","og_description":"D\u00e9couvrez comment la s\u00e9curit\u00e9 agentique de la cha\u00eene logicielle avec JFrog aide les organisations \u00e0 r\u00e9duire les risques, diminuer les co\u00fbts et acc\u00e9l\u00e9rer les livraisons.","og_url":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2025-09-09T12:01:01+00:00","article_modified_time":"2025-10-13T12:16:39+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212232\/Unlock-agentic-1200x628-1.png","type":"image\/png"}],"author":"zoer","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"zoer","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/"},"author":{"name":"zoer","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e"},"headline":"S\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle : curation et rem\u00e9diation assist\u00e9es par l\u2019IA","datePublished":"2025-09-09T12:01:01+00:00","dateModified":"2025-10-13T12:16:39+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/"},"wordCount":1869,"publisher":{"@id":"https:\/\/jfrog.com\/fr\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212218\/Unlock-agentic_Thumbnail.png","keywords":["swampup 2025","swampup","agentic ai","security","DevOps"],"articleSection":["IA\/ML","Communaut\u00e9","DevOps","S\u00e9curit\u00e9 et DevSecOps"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/","url":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/","name":"S\u00e9curit\u00e9 agentique de la supply chain logicielle | JFrog","isPartOf":{"@id":"https:\/\/jfrog.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212218\/Unlock-agentic_Thumbnail.png","datePublished":"2025-09-09T12:01:01+00:00","dateModified":"2025-10-13T12:16:39+00:00","description":"D\u00e9couvrez comment la s\u00e9curit\u00e9 agentique de la cha\u00eene logicielle avec JFrog aide les organisations \u00e0 r\u00e9duire les risques, diminuer les co\u00fbts et acc\u00e9l\u00e9rer les livraisons.","breadcrumb":{"@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212218\/Unlock-agentic_Thumbnail.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/09\/05212218\/Unlock-agentic_Thumbnail.png","width":203,"height":148,"caption":"Robot with AI label connects to data blocks, security icons"},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/fr\/blog\/securite-agentique-supply-chain-logicielle-curation-remediation-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 agentique de la cha\u00eene d\u2019approvisionnement logicielle : curation et rem\u00e9diation assist\u00e9es par l\u2019IA"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/fr\/#website","url":"https:\/\/jfrog.com\/fr\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/fr\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/506b8c11f17cb8a81546c486fa9f663e","name":"zoer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98fe27df64b29d39c0d9f3e1f93264891c82c56b04f5811e5b310089561acf52?s=96&d=mm&r=g","caption":"zoer"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/158963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/users\/506"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/comments?post=158963"}],"version-history":[{"count":7,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/158963\/revisions"}],"predecessor-version":[{"id":158982,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/posts\/158963\/revisions\/158982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/media\/157093"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/media?parent=158963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/categories?post=158963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/tags?post=158963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}