<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Defendefi</title>
        <link>https://paragraph.com/@Defendefi</link>
        <description>Defending Defi</description>
        <lastBuildDate>Tue, 21 Apr 2026 03:52:47 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>Defendefi</title>
            <url>https://storage.googleapis.com/papyrus_images/ac21dc1b75d1ff36a2cfce1bbf3dbdb5</url>
            <link>https://paragraph.com/@Defendefi</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[The Only Workout Plan Worth Planning]]></title>
            <link>https://paragraph.com/@Defendefi/only-workout</link>
            <guid>YotxT1SHM8tXMEAA5LHm</guid>
            <pubDate>Mon, 05 Feb 2024 08:29:43 GMT</pubDate>
            <description><![CDATA[You need to be steel maxing. Optimizing for physical health will inevitably improve cognitive ability.]]></description>
            <content:encoded><![CDATA[<p>Let’s drift away from security and drop some life alpha. You need to be steel maxing. Optimizing for physical health will inevitably improve cognitive ability. The plan is simple <span data-name="point_down" class="emoji" data-type="emoji">👇</span></p><p>Day One</p><ul><li><p>4 x Bench</p></li><li><p>4 x Incline Bench</p></li><li><p>4 x Cable Flys</p></li><li><p>4 x Tricep Dumbbell kickbacks</p></li><li><p>4 x Dips</p></li><li><p>4 x Skull crushers</p></li></ul><p></p><p>Day Two</p><ul><li><p>4 x Lat pulldown</p></li><li><p>4 x Rows</p></li><li><p>4 x Deadlifts</p></li><li><p>4 x Hammer curls</p></li><li><p>4 x Incline DB curls</p></li><li><p>4 x DB preacher curls (2 hammer 2 flat)</p></li></ul><p></p><p>Day Three</p><ul><li><p>4 x Overhead DB Press</p></li><li><p>4 x Front bar rows</p></li><li><p>4 x Lateral Raises</p></li><li><p>4 x Rear Delt Flys</p></li><li><p>10 x Hanging Leg Raises</p></li></ul><p></p><p>Day Four</p><ul><li><p>4 x Squat</p></li><li><p>4 x Leg press</p></li><li><p>4 x V Squats</p></li><li><p>4 x Glute Raises</p></li><li><p>8 x Calf raises</p></li></ul><p></p><p>Day Five</p><ul><li><p>4 x BB Curls Superset Cable pull downs</p></li><li><p>4 x DB Concentration Curls superset Dips</p></li><li><p>4 x&nbsp; BB Hammers Superset Close grip bench</p></li><li><p>10 x Hanging leg raises</p></li></ul><p>Every day we hitting 10 minutes HIIT on the bike, 30sec on 30 off.</p><h3>Supplements</h3><p>Carnitine is the ONLY supplement you need my brothers. Don’t fall for the grift.</p><h3>Brosciense:</h3><p>Suppversity blog is the ONLY resource you need.</p><p></p><p>See you on the other side.</p>]]></content:encoded>
            <author>defendefi@newsletter.paragraph.com (Koda)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/13a94ee05f5013f0ed455c56146a30e7.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Fronted Compromize Incident Response ]]></title>
            <link>https://paragraph.com/@Defendefi/frontend-compromize</link>
            <guid>uQjWQNuy5wBTSqbBinWM</guid>
            <pubDate>Sun, 03 Dec 2023 00:16:47 GMT</pubDate>
            <description><![CDATA[This article forms part of a wider series on DeFi-focused incident response plans and playbooks. Surprisingly, only 2% of surveyed DeFi protocols pos...]]></description>
            <content:encoded><![CDATA[<p>This article forms part of a wider series on DeFi-focused incident response plans and playbooks. Surprisingly, only 2% of surveyed DeFi protocols possess an incident response plan. These IRPs are designed to guide smaller protocols lacking such plans, especially in the event of an incident. Each plan in this series is intentionally generic, accommodating the distinctly unique characteristics of various incidents. The original playbooks can be found on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out dont-break-out" href="https://github.com/0xKoda/DIRP/tree/main">Github</a>.</p><h2><br>Scope</h2><p>This playbook is specifically designed to address incident response to a compromized frontend.</p><h2>1. Preparation</h2><ul><li><p><strong>Audit and Review</strong>: Regularly audit frontend code and dependencies for vulnerabilities.</p></li><li><p><strong>Monitoring Measures</strong>: Setup in-house monitoring to help identification of any unusual activities.</p></li><li><p><strong>Incident Response Team</strong>: Establish an incident response team to engage in a war room scenario.</p></li><li><p><strong>Regularly stocktake node packages</strong>: Maintain regular audits and stocktake of NPM packages.</p></li><li><p><strong>Store MD5 Hashes:</strong> Record and store the MD5 hashes of the web body content on each deployment.</p></li><li><p><strong>Maintain access list</strong>: Maintain and regularly audit a list of who has access to admin panel.</p></li><li><p><strong>Regular Backups</strong>: Maintain a staging environment and backups for emergency use.</p></li><li><p><strong>Pre-written Comms</strong>: Engage legal team to draft pre-written comms to use in case of emergency.</p></li><li><p><strong>Maintain contact list</strong>: Maintain a contact list with service providers and white-hats.</p></li></ul><h2>2. Identification</h2><ul><li><p>Identify the incident from monitoring capability:</p><ul><li><p>Inhouse monitoring signals.</p></li></ul></li><li><p>Publicly Identified compromise:</p><ul><li><p>Members of the public have identified and alerted to the compromise.</p></li><li><p>A public security service has identified the compromise.</p></li></ul></li><li><p>Identify the changes that resulted from the frontend compromise:</p><ul><li><p>Check the DNS change logs of the webpage.</p></li><li><p>Have the MD5 hash changed.</p></li><li><p>Filter through unusual frontend interactions.</p></li><li><p>Identify any new contract addresses on the frontend.</p></li></ul></li></ul><h2>3. Response</h2><ul><li><p>Immediate steps following frontend compromise detection:</p><ul><li><p>Secure and isolate affected assets and servers.</p></li><li><p>Alert internal security teams and start emergency protocols.</p></li><li><p>Issue organization-wide notifications to cease all frontend-related operations temporarily.</p></li><li><p>Begin checking the software supply chain for any malicious NPM packages.</p></li><li><p>Check access logs for admin panel.</p></li></ul></li><li><p>Liaise with service providers from contact list for:</p><ul><li><p>Assistance in tracking and halting malicious activities.</p></li><li><p>Support in recovering compromised assets, if possible.</p></li><li><p>Advice on fortifying security measures post-incident.</p></li><li><p>Report any phishing contract address to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out dont-break-out" href="https://github.com/0xKoda/DIRP/blob/main/Frontend-Compromized/chainabuse.com">chain abuse</a></p></li><li><p>If webpage is actively visited and user funds drained, report URL to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out dont-break-out" href="https://github.com/MetaMask/eth-phishing-detect/blob/main/src/blacklist.js">Metamask Phishing detect</a>.</p></li></ul></li><li><p>Begin distributing pre-written communications:</p><ul><li><p>Where possible have legal pre-read and authorize distribution.</p></li><li><p>Use social profiles to distribute initial statement.</p></li></ul></li></ul><h2>4. Recovery</h2><ul><li><p>Analyze the incident to determine:</p><ul><li><p>The vulnerability that lead to the exploit.</p></li><li><p>The full extent of damages, including asset loss and data compromise (if any).</p></li><li><p>Necessary improvements in security protocols and staff training for prevention.</p></li></ul></li><li><p>Begin backup deployment and returning webpage to normal operation:</p><ul><li><p>Only after access audit and package audit.</p></li><li><p>Only after vulnerability identified and mitigated.</p></li><li><p>Reconfigure DNS settings and review.</p></li><li><p>Remove any reports to MM Phshing Detect (if applicable).</p></li><li><p>Store new MD5 hash.</p></li></ul></li><li><p>Develop a recovery strategy encompassing:</p><ul><li><p>Steps for safe resumption of all operations.</p></li><li><p>Stocktake of new and old server addresses following incident.</p></li><li><p>Preventative measures against future incidents (bug bounties etc).</p></li><li><p>Communication plans to restore trust with affected parties.</p></li></ul><figure src="https://storage.googleapis.com/papyrus_images/2f9e0e4f5a8a4742a2af64c2891d42f0.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAB0AAAAgCAIAAABhFeQrAAAACXBIWXMAABYlAAAWJQFJUiTwAAAGNUlEQVR4nI1WbVMTVxTe8iIBYsImm81mlyVLQgKhCIIgVAoVNGAUJLwIlIKA4aUEyUCkURyoIDrKFIuOWMcXRDQZCCUQwjawQphMuhSGirXt9Et/SL+0HzrJkkyQgMw8kzm5555nzj33uecsIMQkASFAxMzvYRBhEMF14zCIsL02gygIZXYyIQyAvXiFnq0oEV/f0lFT3/JlfXNja8elVrddp9E2tnYwaNZ2FhRVCJBYIRrrH/sRXlyaaFt8M22Zezb2YtVJ26nl2fkFF71mp5bfOBz0+ga9vmHoG+T7ZXogXiEmEREJCC5nAMJ4dt7Z1Mw8HkLAWJwQlyG4HCXifZs/zivw1leAiDEigQGMSk6rSo9nK2FUwqyIcJmP8aD1FWISIRqLEopOQ++q02WnlifNP9opykWvWcmfbOQivbGpUlfzYPxA+Qq8mQoxCQ/GWRw4V1ncf3v45t37JRW16qqLJRW1zdquO/dGuwz98qTjhyL5u0kC5ytAYkW4LApCz1d89cdff59Wlaak5/ARcRSEgXA0D8ZBOFqEy49l5tU1tC07fhbhMvdNYNI9eQXeZDkgCoRwUtJzBofuB7N4wawo33nZXgkDQew4RVr/7eFgFo8DoiwOzOLAEVxEgIgD5AshMVJF+rjRTK04x42TT8demcwWJ/1LraY9gouUVjXOkfbJmTnLAjlPUhYraTJbLAvkhHGKpBzk0vKcfSU1M8/Li8b6XyshT73aNzg8+vjW0Mjdew97B+68mJgsrqiNgtB8Vdng0EjfwJ0bt4YYY3BoZHBoxHC9/+69h/dHnw0OjSiOngD8n2AUhHJANApCD4MIEMoFgFAhJkk4kgUAIUAQO4wNRUEoiy0AgtjBLB6LA4exoTA2FOExIjjwoUj+oUh+GBvaUQcBIs5VFhcWlZ9SlRQUlZ9TV59WlV7UtHfoe/LPlJxTVxcUlRcUlRd6XPFJGe6L8lyXDyJMKsLjtu/Nd3wejD9/OUmvr9tIu52i3r3/3UWvuWiaXl9fdbp+3XpnI+30+oadoladrnxVWUDZ7tCDgKmDiCBkyYQ81QdcmpSRrSwouoASCkmCd92zByXifdULSL2dL4y6NctHxDw4ho+I+Z4YLh+NT8o4WXCeDSKMF4SjGa9nQ+y++YoIGJV89+AHG2mftlht5KLFamMwbbEuO5yvTWZyiZo0W2bnF+iNzWmL1Tg1bSMXraQ9X6Vmmm/gOiC4rKy6oVnb6emnXc3arjadwWN0dvcMdPfcaNN1M17D9YE2XbcHhg59T0p6zl6lALh8t6rCOUhopFs0oZHbCOcgQAgXIxTHsvKBT9jhHPeeIBbIeBmDGR8BqYHK2qaWdn1NfUubrvtSa4emVcdkXa9pq9Nodfqeb28O1dS3NDS11zW0MgOiTqPt7rnR0NTe2NrR2nHl06MnGG3s4B1+8Hjz7db4hGlpxUEuUbPzC9MWq51afjY24XKryj0gXpvMr01m88wc4zLPzC2tOGzkoote2/ztz6zcQhDCPuRlGj5KKDyG+xfBZTAqRXA5HyGOpOfk5BeBMO4dGTIEl6GEAkalKKEQid2B/q19h84EXkBIjBCTELJkXJqISxNFuCw9+9SZ4koEl/kWMSIBQmL8owLX1/8PX4jLk7JMUzMueo0ZDatOF2OvOulpi3Xz7ZZG27VbWwHy/cCNSxNV6urK2ktl1Q2euXBFZ+hTqSvLqhvKqupr6r/OyFYyx9rrRex6x5iEB8dwISyC65ZUBNetKlyamJL+BRDCZRbD2BAHREEY3+cFf5ivABFX1jYZrvdrdd/oDb06/bXL+mtX+25+P/pEb+jtNPS26bqv9HyrN/Re1l87kp6zW1uBeXkw3mnoo1acYy+NYy+NpqmZCeOUewosLU+Yph89ef507JXZYp0wTj168jwjW3kgXsH2uWKZzgLC0SAczQZRaUJaRrYynIN4FnEQxj2NiWBCYPRj9RX6VVmAiGPlyYqUTEKWnJ13tuRCHS5NjFOkSRPS3I1cRPiG1gHqKyKYvifEJFweqq66+M+//83OL7xxODxfY9TW+/fjRjNKKAJ+3exXX/8LlCaknSmu/DzvbK6y+GRBca6yOF+l/iy3UIhJ96fz8f4PlLSGReKcx+wAAAAASUVORK5CYII=" float="none" width="272px" data-type="figure" class="img-center" style="max-width: 272px;"><img src="https://storage.googleapis.com/papyrus_images/2f9e0e4f5a8a4742a2af64c2891d42f0.png" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure></li></ul><h3>Additional Resources</h3><ul><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://www.certik.com/resources/blog/49wUGTmcApcgIxkF3PFwbE-curve-finance-hack-incident-analysis"><strong>Curve Finance Frontend Compromize Incident Report </strong></a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://medium.com/@VelodromeFi/11-29-2023-incident-report-92865dceb757">Velodrome Frontend Compromize Incident Report</a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://github.com/ossf/package-analysis"><strong>Package Analysis</strong></a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://dnschecker.org"><strong>DNS Checker</strong></a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://duo.com/decipher/hunting-malicious-npm-packages"><strong>Hunting Malicious Packages</strong></a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://github.com/MetaMask/eth-phishing-detect/"><strong>Metamask Eth Phishing Detect</strong></a></p></li></ul><p></p>]]></content:encoded>
            <author>defendefi@newsletter.paragraph.com (Koda)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/8813fe1237e5fd7cd9a42d1f9df02082.webp" length="0" type="image/webp"/>
        </item>
        <item>
            <title><![CDATA[Phishing Incident Response]]></title>
            <link>https://paragraph.com/@Defendefi/phishing-incident-response</link>
            <guid>mupz8CwSgMbIJRpfaPaB</guid>
            <pubDate>Sat, 02 Dec 2023 23:31:16 GMT</pubDate>
            <description><![CDATA[Defi focused Phishing incident response plan]]></description>
            <content:encoded><![CDATA[<p>This article kicks off a wider series on DeFi-focused incident response plans and playbooks. Surprisingly, only 2% of surveyed DeFi protocols possess an incident response plan. These IRPs are designed to guide smaller protocols lacking such plans, especially in the event of an incident. Each plan in this series is intentionally generic, accommodating the distinctly unique characteristics of various incidents. The original playbooks can be found on <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://github.com/0xKoda/DIRP/tree/main">Github</a>.</p><h2>Scope</h2><p>This playbook is specifically designed to address response to a phishing link being clicked and assets subsequently drained.</p><h2>1. Preparation</h2><ul><li><p>Compile a detailed inventory of</p><ul><li><p>all blockchain assets and domains controlled by the organization.</p><ul><li><p>Crucial for avoiding errors with internal digital resources.</p></li></ul></li><li><p>personnel authorized to manage blockchain transactions and smart contracts.</p></li></ul></li><li><p>Formulate communication templates</p><ul><li><p>to quickly alert employees of ongoing phishing attacks targeting the company.</p></li><li><p>for collaboration with hosting and blockchain service providers against malicious entities.</p></li><li><p>to inform external stakeholders about potential security threats.</p></li></ul></li><li><p>Create a new hot-wallet</p><ul><li><p>write down seed phrase</p></li><li><p>quickly send any remaining funds from compromized wallet/s</p></li></ul></li></ul><h2>2. Identification</h2><ul><li><p>Identify the transaction hash that resulted from the phishing incident:</p><ul><li><p>Filter though unusual smart contract interactions.</p></li><li><p>Requests from unknown wallet addresses.</p></li><li><p>Unexpected transaction signing requests.</p></li></ul></li><li><p>Identify the front end and domain that incited the phishing incident:</p><ul><li><p>Using recent browser history.</p></li><li><p>Inspect recent emails that may have transported the link.</p></li><li><p>Triage domains though Virus Total and other providers.</p></li></ul></li></ul><h2>3. Response</h2><ul><li><p>Immediate steps upon a phishing attack detection:</p><ul><li><p>Secure and isolate affected assets and wallets.</p></li><li><p>Alert internal security teams and start emergency protocols.</p></li><li><p>Issue organization-wide notifications to cease all blockchain-related operations temporarily.</p></li><li><p>Pause any active contracts (if possible).</p></li><li><p>Begin sending any remaining assets to new hot-wallet</p></li></ul></li><li><p>Liaise with blockchain networks or service providers for:</p><ul><li><p>Assistance in tracking and halting malicious activities.</p></li><li><p>Support in recovering compromised assets, if possible.</p></li><li><p>Advice on fortifying security measures post-incident.</p></li></ul></li><li><p>Report the phishing link, contract and or wallet address:</p><ul><li><p>Upload URL to virus total and other providers.</p></li><li><p>Create a pull request to <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://github.com/MetaMask/eth-phishing-detect/commits/main/src/config.json">MM phishing detect</a> and add the URL.</p></li></ul></li></ul><h2>4. Recovery</h2><ul><li><p>Analyze the incident to determine:</p><ul><li><p>The point of entry and methods used in the phishing attack.</p></li><li><p>The full extent of damages, including asset loss and data compromise (if any).</p></li><li><p>Necessary improvements in security protocols and staff training for prevention.</p></li></ul></li><li><p>Develop a recovery strategy encompassing:</p><ul><li><p>Steps for safe resumption of all operations.</p></li><li><p>Stock-take of new and old wallets following incident.</p></li><li><p>Preventative measures against future incidents.</p></li><li><p>Communication plans to restore trust with affected parties.</p></li></ul></li></ul><figure float="none" width="554px" data-type="figure" class="img-center" style="max-width: 554px;"><img src="https://storage.googleapis.com/papyrus_images/d102cc9f8f8623943ab5aa13965f674a.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAWCAIAAAAuOwkTAAAACXBIWXMAABYlAAAWJQFJUiTwAAADuklEQVR4nGMQk1TEj4TEZCEkr5AkF78EF584CIEZ/MLSECkhcTlc2hkIWiAmqcjFL1FQXn/+0rUbdx/evvfo6o17V2/ce/7q/eSZCwTFZPDrJcoCITFZA3M7V+8Qa0cvn8ConKIqC1t3d58wWycfiP8oskAIbASvkKSRuX1EbHJyRl5Lx4SwmER3nxAufgm4ApItEBWXEwEzJGRVhMRk+YQk5yxe8+PP/227D+06cPzth6837z0Vl1HhE5LEdA1hC4TEZEXAdvAJSTIwMBRXNE6dtURMUpGZU4iVS4yBgY2BgY1fWDoxPb9/ymwGBjaQIKsQxDJQnCNZg88HYpKKiWm5heW1i1eun7d4VU5hRVRChpikYnpOaV1TR05hxeQZ87fsPpCWU1zb1NnSMcHMxh0zzhnwpEshcbn23ikbtu7auHXPtt2HNm7dU9XYwS8s3Tt59pZd+7ftPrRl1/71W3YvXbVh14Gjpy9e8wqIRAsxLBbATReTVJRR1BQSl2PlEjO2cFJQ1eXgExMSl5NR1OTiE2fmFIIgFi5hVi4xZk4hBlYhRLbAE0RwC1Q0jZ68fPfu47e3H76+/fD107dfD56++vLt9+mLN2QUNSVkVSRlVXH5HqcPINJcfOIMrEIcfGLiMirSihpCYrIWtu4aeuZikoriMiBz0aKUtFTEJySZmlOyeOX6nskzp8xa2Nk3dfKM+avXb1u9fltn39QFS9d09k3tmTxz/pJVoTHJkDAhLaPxCUnGp+XNW7yqs2/q4pXrj56+dOj42ZaOCTPmLTlw7Mzt+0+nzJzf2Tdl1vylQeEJBLMx7iBiYAgMi58wZS4DiyALlzADqxADCHAzMPBMnbVEQ88czOVh5RJDThTE+kDX2GbV+m0nzl4+cOzMvMWrdI1tLGzdt+w+MHv+8pXrt56+eG3XgeNLV21YumrDjHnLFFR1iS0qIOr4hCTlVLTLa1s6+6a0904uq2mSV9HRNrLqmTyzrKapf8rs5o6+hpZuENncUVXXKq+iQ0JZJCQmKymrambjIq+i4+4T5uodIq+iY2bjIialxMAKLiRYQQmfhUsYkgNYuIRJCyI+IUkNPfNX77+8+fDl7Yev5y/fePDkxZOXb81s3PEYQVoQQWouBlYhFU0jdV0zZk4hLn4JSIVFTJoh7ANH98ATZy9v233o/OUbh46f3bb70Imzlx3dAzELGXIsEBKT1dAzT8spTsspTkzLjUnMSEzLTcsp1jayIs/52FMRK5cYBHHxiUMYWEsFIi0AAJfksV2oG0jGAAAAAElFTkSuQmCC" nextheight="1214" nextwidth="1776" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><h3>Additional Resources</h3><ul><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://github.com/MetaMask/eth-phishing-detect/tree/main">MetaMask Eth Phishing Detect</a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://www.walletguard.app/">Wallet Guard</a></p></li><li><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out dont-break-out" href="https://metasleuth.io/">MetaSleuth</a></p></li></ul><p></p>]]></content:encoded>
            <author>defendefi@newsletter.paragraph.com (Koda)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/5a87c613aed3bed2834b4884fadcaecc.png" length="0" type="image/png"/>
        </item>
    </channel>
</rss>