{"id":7898,"date":"2026-04-05T14:55:33","date_gmt":"2026-04-05T14:55:33","guid":{"rendered":"https:\/\/professnow.com\/profession\/top-10-best-ethical-hacker-penetration-tester-in-manila\/"},"modified":"2026-04-05T14:55:33","modified_gmt":"2026-04-05T14:55:33","slug":"top-10-best-ethical-hacker-penetration-tester-in-manila","status":"publish","type":"post","link":"https:\/\/professnow.com\/profession\/top-10-best-ethical-hacker-penetration-tester-in-manila\/","title":{"rendered":"Top 10 Best Ethical Hacker \/ Penetration Tester in Manila (Verified &#038; Reviewed Guide)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>Organizations in Manila hire an Ethical Hacker \/ Penetration Tester to find exploitable security gaps before criminals do\u2014especially for public-facing websites, mobile apps, APIs, internal networks, and cloud environments that support day-to-day operations.<\/p>\n\n\n\n<p>This guide explains what penetration testing is, what it typically costs in Manila, how to evaluate providers, and which Manila-based teams are most credible based on publicly available information.<\/p>\n\n\n\n<p>Selections were evaluated using a practical editorial checklist: verifiable company presence, demonstrated cybersecurity capability (e.g., published services, case studies, or security practice), clarity of service scope, and any publicly available customer review signals where confidently known.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">About Ethical Hacker \/ Penetration Tester<\/h2>\n\n\n\n<p>An Ethical Hacker \/ Penetration Tester is a security professional who simulates real-world attacks\u2014legally and with permission\u2014to identify vulnerabilities that could lead to data breaches, downtime, fraud, or regulatory exposure. A good tester doesn\u2019t just \u201cscan\u201d; they validate whether issues are exploitable, show business impact, and provide actionable remediation steps.<\/p>\n\n\n\n<p>You typically need one when you are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Launching or redesigning a website, app, or API<\/li>\n<li>Preparing for compliance or security audits (requirements vary by industry)<\/li>\n<li>Moving to the cloud or changing network architecture<\/li>\n<li>Investigating suspected compromise (often alongside incident response)<\/li>\n<li>Running an ongoing security program (quarterly or annual testing)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Average cost in Manila (typical market ranges)<\/h3>\n\n\n\n<p>Pricing varies widely depending on scope, complexity, and reporting depth. As a practical benchmark in Manila:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Small website or basic external test: <strong>often starts around PHP 50,000+<\/strong> (varies \/ depends)<\/li>\n<li>Standard web application\/API test: <strong>commonly PHP 120,000\u2013PHP 400,000<\/strong> (varies \/ depends)<\/li>\n<li>Larger enterprise or multi-system engagements: <strong>PHP 500,000+<\/strong> (varies \/ depends)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Licensing or certifications<\/h3>\n\n\n\n<p>There is <strong>no single universal \u201clicense\u201d<\/strong> specifically required in Manila to perform penetration testing (requirements can differ by sector and procurement policies). However, reputable teams often hold globally recognized certifications, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>OSCP \/ OSWE (Offensive Security)<\/li>\n<li>CEH (EC-Council)<\/li>\n<li>CISSP (ISC)\u00b2 (broader security leadership)<\/li>\n<li>GIAC certifications (SANS)<\/li>\n<li>CREST (where applicable)<\/li>\n<\/ul>\n\n\n\n<p><strong>Key takeaways<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Penetration testing validates real exploitability\u2014not just \u201cfound vulnerabilities.\u201d<\/li>\n<li>Always require a written scope, authorization, and rules of engagement.<\/li>\n<li>Expect a clear report with severity ratings, evidence, and remediation guidance.<\/li>\n<li>Costs in Manila vary primarily by system complexity and depth of testing.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">How We Selected the Best Ethical Hacker \/ Penetration Tester in Manila<\/h2>\n\n\n\n<p>We used a buyer-focused criteria set designed for local procurement and IT\/security teams:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Years of experience<\/strong> (team maturity, time in market, and cybersecurity focus)<\/li>\n<li><strong>Verified customer review signals<\/strong> (publicly available only; otherwise \u201cNot publicly stated\u201d)<\/li>\n<li><strong>Service range<\/strong> (web\/mobile\/API testing, network testing, cloud, red teaming, incident support)<\/li>\n<li><strong>Pricing transparency<\/strong> (clear proposal structure, scope-based pricing, retest options)<\/li>\n<li><strong>Local reputation<\/strong> (presence in Manila\/Metro Manila, known enterprise work, public cybersecurity activity)<\/li>\n<\/ul>\n\n\n\n<p>Only publicly available information was used where confidently known. If details like phones, direct emails, or ratings were not clearly published by the provider, they are marked <strong>\u201cNot publicly stated\u201d<\/strong> rather than guessed.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">About Manila<\/h2>\n\n\n\n<p>Manila is a dense, high-transaction urban center at the core of Metro Manila, supporting government offices, hospitals, universities, logistics, retail, and a large ecosystem of service providers that depend on always-on IT systems.<\/p>\n\n\n\n<p>Security testing demand is driven by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>High volumes of online payments, account logins, and customer data processing<\/li>\n<li>E-commerce growth and API integrations<\/li>\n<li>Third-party risk (vendors, BPO workflows, and managed services)<\/li>\n<li>Increased regulatory and contractual security requirements (varies \/ depends by industry)<\/li>\n<\/ul>\n\n\n\n<p><strong>Key neighborhoods commonly served<\/strong> (scope often extends across Metro Manila):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ermita, Malate, Intramuros<\/li>\n<li>Sampaloc, Sta. Cruz, Binondo<\/li>\n<li>Paco, Pandacan, Tondo<\/li>\n<li>Nearby business districts frequently covered for on-site work: Makati, Taguig (BGC), Pasig (Ortigas) (varies \/ depends)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Top 5 Best Ethical Hacker \/ Penetration Tester in Manila<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">#1 \u2014 Secuna<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Vulnerability assessment and penetration testing (VAPT), application security services (varies \/ depends), security research\/bug bounty-style services (varies \/ depends)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www.secuna.io\/<\/li>\n<li>Google Map or ProfessNow or Yelp Link  <\/li>\n<li>Google Reviews Summary (summarized, not copied; if unknown write &#8220;Not publicly stated&#8221;): Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Mid-market to enterprise teams wanting a security-focused specialist provider (scope-based engagements)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">#2 \u2014 Trustwave<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Penetration testing (varies \/ depends), managed security services\/SOC capabilities (varies \/ depends), incident response support (varies \/ depends)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www.trustwave.com\/<\/li>\n<li>Google Map or ProfessNow or Yelp Link  <\/li>\n<li>Google Reviews Summary (summarized, not copied; if unknown write &#8220;Not publicly stated&#8221;): Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Enterprise and regulated organizations looking for a broader security program and potential 24\/7 operations (confirm SLA and local coverage)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">#3 \u2014 Accenture Security (Philippines)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Application and infrastructure security services (varies \/ depends), penetration testing\/red team (varies \/ depends), security transformation and managed security (varies \/ depends)<\/li>\n<li>Price Range: Varies \/ depends (typically scope-based, enterprise pricing)<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www.accenture.com\/ph-en<\/li>\n<li>Google Map or ProfessNow or Yelp Link  <\/li>\n<li>Google Reviews Summary (summarized, not copied; if unknown write &#8220;Not publicly stated&#8221;): Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Premium, multi-system environments needing a large delivery team and governance-heavy engagements<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">#4 \u2014 IBM Security (Philippines)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Security consulting (varies \/ depends), penetration testing (varies \/ depends), incident response and managed security services (varies \/ depends)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www.ibm.com\/ph-en<\/li>\n<li>Google Map or ProfessNow or Yelp Link  <\/li>\n<li>Google Reviews Summary (summarized, not copied; if unknown write &#8220;Not publicly stated&#8221;): Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Organizations seeking structured enterprise security delivery, reporting, and optional managed services (confirm local team availability)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">#5 \u2014 Deloitte (Philippines)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rating: Not publicly stated<\/li>\n<li>Years of Experience: Not publicly stated<\/li>\n<li>Services Offered: Cyber risk and security advisory (varies \/ depends), penetration testing support (varies \/ depends), governance\/risk\/compliance-aligned security work (varies \/ depends)<\/li>\n<li>Price Range: Varies \/ depends<\/li>\n<li>Contact Phone: Not publicly stated<\/li>\n<li>Contact Email (if available): Not publicly stated<\/li>\n<li>Website (if available): https:\/\/www2.deloitte.com\/ph\/en.html<\/li>\n<li>Google Map or ProfessNow or Yelp Link  <\/li>\n<li>Google Reviews Summary (summarized, not copied; if unknown write &#8220;Not publicly stated&#8221;): Not publicly stated<\/li>\n<li>Best For (Budget \/ Emergency \/ Premium \/ Family-Friendly \/ etc.): Compliance-aligned organizations that need security testing within a broader risk or audit program<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Comparison Table<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table>\n<thead>\n<tr>\n<th>Professional<\/th>\n<th style=\"text-align: right;\">Rating<\/th>\n<th style=\"text-align: right;\">Experience<\/th>\n<th style=\"text-align: right;\">Price Range<\/th>\n<th>Best For<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Secuna<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Specialist security testing engagements<\/td>\n<\/tr>\n<tr>\n<td>Trustwave<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Enterprise + managed security options<\/td>\n<\/tr>\n<tr>\n<td>Accenture Security (Philippines)<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Premium, complex multi-system programs<\/td>\n<\/tr>\n<tr>\n<td>IBM Security (Philippines)<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Enterprise delivery + structured reporting<\/td>\n<\/tr>\n<tr>\n<td>Deloitte (Philippines)<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Not publicly stated<\/td>\n<td style=\"text-align: right;\">Varies \/ depends<\/td>\n<td>Cyber risk + testing aligned to governance<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Cost of Hiring a Ethical Hacker \/ Penetration Tester in Manila<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Average price range (what most buyers see)<\/h3>\n\n\n\n<p>In Manila, penetration testing is usually priced per engagement based on scope rather than per hour. As a working budget range:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Basic external perimeter test:<\/strong> often <strong>PHP 50,000\u2013PHP 150,000<\/strong> (varies \/ depends)<\/li>\n<li><strong>Web app\/API penetration test:<\/strong> often <strong>PHP 120,000\u2013PHP 400,000<\/strong> (varies \/ depends)<\/li>\n<li><strong>Large environment \/ multiple apps \/ red team-style work:<\/strong> <strong>PHP 500,000 to PHP 1,000,000+<\/strong> (varies \/ depends)<\/li>\n<\/ul>\n\n\n\n<p>If you are comparing proposals, ensure the scope is truly comparable (number of targets, authentication depth, retesting, and reporting).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Emergency pricing (if applicable)<\/h3>\n\n\n\n<p>Emergency work is more commonly associated with <strong>incident response<\/strong> than classic penetration testing. When urgent containment or rapid verification is needed, pricing may increase due to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>after-hours staffing,<\/li>\n<li>accelerated timelines,<\/li>\n<li>on-site requirements,<\/li>\n<li>expanded reporting for executives\/legal\/compliance (varies \/ depends).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">What affects cost<\/h3>\n\n\n\n<p>Key cost factors that move pricing up or down:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Number and type of targets<\/strong> (domains, IPs, apps, APIs, cloud accounts)<\/li>\n<li><strong>Authentication depth<\/strong> (guest vs user vs admin; MFA and test accounts readiness)<\/li>\n<li><strong>Testing method<\/strong> (black-box, grey-box, white-box; source review included or not)<\/li>\n<li><strong>Complexity and tech stack<\/strong> (custom code, legacy systems, WAF\/CDN, mobile)<\/li>\n<li><strong>Reporting requirements<\/strong> (executive summary, detailed technical report, remediation workshop)<\/li>\n<li><strong>Retesting and validation<\/strong> (included retest window vs separate fee)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions (FAQ)<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">How much does a Ethical Hacker \/ Penetration Tester cost in Manila?<\/h3>\n\n\n\n<p>Most engagements are scope-based. Many Manila projects start around <strong>PHP 50,000+<\/strong> for small scopes, while web app\/API tests commonly land in the <strong>PHP 120,000\u2013PHP 400,000<\/strong> range (varies \/ depends).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to choose the best Ethical Hacker \/ Penetration Tester in Manila?<\/h3>\n\n\n\n<p>Ask for a clear scope, sample report format (sanitized), testing methodology, and retest terms. Prioritize teams that explain exploitability and remediation\u2014not just scanner outputs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Are licenses required in Manila?<\/h3>\n\n\n\n<p>A specific penetration testing \u201clicense\u201d is <strong>not publicly stated<\/strong> as universally required. Many buyers instead require recognized certifications (e.g., OSCP) and strong contractual authorization, NDAs, and rules of engagement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What\u2019s the difference between vulnerability scanning and penetration testing?<\/h3>\n\n\n\n<p>Scanning identifies potential issues; penetration testing attempts to <strong>validate<\/strong> and safely demonstrate real-world impact. Pen tests usually include manual verification, chaining of weaknesses, and prioritized fixes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Should we hire a local Manila team or a remote provider?<\/h3>\n\n\n\n<p>Local teams can help with on-site coordination, internal network access, and stakeholder workshops. Remote can work well for external apps and APIs if access and communication are smooth\u2014what matters is capability and clear deliverables.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How long does a penetration test take?<\/h3>\n\n\n\n<p>A small scope may take <strong>a few days<\/strong>, while standard web apps often take <strong>1\u20133 weeks<\/strong> including reporting (varies \/ depends). Timelines depend heavily on environment readiness and access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What should be included in a good penetration testing report?<\/h3>\n\n\n\n<p>At minimum: executive summary, scope, methodology, prioritized findings with evidence, business impact, remediation steps, and a retest\/validation plan. If you need compliance mapping, request it upfront.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Who offers 24\/7 service in Manila?<\/h3>\n\n\n\n<p>24\/7 is more common for managed security\/SOC or incident response than standard penetration testing. Availability <strong>varies \/ depends<\/strong>\u2014ask for an SLA and escalation process in writing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Can an Ethical Hacker \/ Penetration Tester help after a breach?<\/h3>\n\n\n\n<p>Many providers can assist with incident response, root-cause analysis, and post-incident hardening, but not all teams do emergency work. Confirm capability, response time, and evidence-handling process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What do we need to prepare before the test starts?<\/h3>\n\n\n\n<p>Prepare written authorization, a finalized target list, test accounts, IP allowlisting (if needed), and a point of contact for rapid questions. If production testing is included, agree on safe hours and stop conditions.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Final Recommendation<\/h2>\n\n\n\n<p>If you want a <strong>specialist security testing provider<\/strong> and a focused engagement around VAPT, start by comparing <strong>Secuna<\/strong> against enterprise consultancies\u2014especially if you value security research depth and a testing-first approach.<\/p>\n\n\n\n<p>If you need a <strong>broader security program<\/strong> that may include managed services, incident response options, or multi-region support, shortlist <strong>Trustwave<\/strong>, <strong>IBM Security (Philippines)<\/strong>, or <strong>Accenture Security (Philippines)<\/strong> and ask for a scope-accurate proposal with clear deliverables and retest terms.<\/p>\n\n\n\n<p>If your priority is aligning penetration testing with <strong>risk, governance, and compliance<\/strong> requirements (and you want security testing to fit into a bigger assurance program), <strong>Deloitte (Philippines)<\/strong> is a practical shortlist option\u2014confirm the exact testing team and methodology for your environment.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Get Your Business Listed<\/h2>\n\n\n\n<p>If you\u2019re a Ethical Hacker \/ Penetration Tester in Manila and want your business details added or updated, email <strong>contact@professnow.com<\/strong>. You can also registe &amp; Update yourself at https:\/\/professnow.com\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Organizations in Manila hire an Ethical Hacker \/ Penetration Tester to find exploitable security gaps before criminals do\u2014especially for public-facing websites, mobile apps, APIs, internal networks, and cloud environments that support day-to-day operations.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[474,19],"tags":[],"class_list":["post-7898","post","type-post","status-publish","format-standard","hentry","category-ethical-hacker-penetration-tester","category-manila"],"_links":{"self":[{"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/posts\/7898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/comments?post=7898"}],"version-history":[{"count":0,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/posts\/7898\/revisions"}],"wp:attachment":[{"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/media?parent=7898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/categories?post=7898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/professnow.com\/profession\/wp-json\/wp\/v2\/tags?post=7898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}