{"id":67604,"date":"2026-02-11T09:08:04","date_gmt":"2026-02-11T09:08:04","guid":{"rendered":"https:\/\/dev.outrightcrm.in\/dev\/store\/?p=67604"},"modified":"2026-02-11T05:37:32","modified_gmt":"2026-02-11T05:37:32","slug":"insert-kylie-into-a-security-bot","status":"publish","type":"post","link":"https:\/\/dev.outrightcrm.in\/dev\/store\/blog\/insert-kylie-into-a-security-bot\/","title":{"rendered":"How to Insert Kylie into a Security Bot?\u00a0"},"content":{"rendered":"\n<p><strong>Introduction<\/strong>&nbsp;<\/p>\n\n\n\n<p>Security automation has changed how businesses secure their personnel and assets. Advanced security bots need\u00a0sophisticated\u00a0AI integration to manage\u00a0tracking of\u00a0complex tasks, threat analysis, and decision-making\u00a0in\u00a0real-time.\u00a0Inserting Kylie into a security bot\u00a0showcases\u00a0an advancement in manufacturing smarter surveillance platforms that integrate conversational AI capabilities with security protocols.\u00a0\u00a0<\/p>\n\n\n\n<p>The integration process includes security parameters alignment, technical configuration, and system compatibility checks.\u00a0The\u00a0<a href=\"https:\/\/dev.outrightcrm.in\/dev\/store\/blog\/rise-of-bots\/\" target=\"_blank\" rel=\"noreferrer noopener\">rise of bots<\/a>\u00a0in security\u00a0use cases\u00a0showcase\u00a0evolving demand for automated solutions that can track environments 24\/7 without human fatigue.\u00a0Having an\u00a0understanding of\u00a0how to insert Kylie into a security bot\u00a0empowers security professionals to implement smarter and responsive tracking solutions.\u00a0This complete guide details the vital steps, needs, and right practices for effective execution.\u00a0<\/p>\n\n\n\n<BR\/>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-5-background-color has-background\">What is Kylie in Security Bot Context?\u00a0<\/h2>\n\n\n\n<BR\/>\n\n\n\n<p>Kylie\u00a0can be defined as an\u00a0AI assistant framework specializing\u00a0in\u00a0integration into diverse automated systems, including security applications.\u00a0When\u00a0implemented\u00a0in security bots, Kylie\u00a0ensures the capabilities of natural language processing, decision-making algorithms, and response structures.\u00a0While advanced techniques like\u00a0<a href=\"https:\/\/dev.outrightcrm.in\/dev\/store\/blog\/create-bots-using-chatgpt\/\" target=\"_blank\" rel=\"noreferrer noopener\">how to create bots using ChatGPT<\/a>\u00a0provide accessible entry points for standard automation, enterprise security implementations need specialized frameworks with tight security protocols and real-time\u00a0capabilities for threat analysis.\u00a0\u00a0<\/p>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Vital&nbsp;Components<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Natural Language Interface<\/strong>:\u00a0This allows security personnel to interact with tracking solutions via conversational commands.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>An Engine of Threat Analysis:<\/strong>\u00a0Interprets security information and recognizes\u00a0possible risks.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automated Response\u00a0Platform<\/strong>:\u00a0Implements predefined actions as per security protocols.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Capabilities of Learning:<\/strong>\u00a0Adjusts to new patterns of threat and organizational security needs.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>The AI framework&nbsp;works within the architecture of security&nbsp;bots, improving its capability to understand complex situations and appropriately respond to security events.&nbsp;&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-5-background-color has-background\">What Are the Prerequisites for Integration?<\/h2>\n\n\n\n<BR\/>\n\n\n\n<p>Before\u00a0starting\u00a0the\u00a0Kylie security bot integration,\u00a0numerous\u00a0organizational and technical needs must be focused on.\u00a0\u00a0<\/p>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Technical&nbsp;Requisites<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Compatible security\u00a0bot\u00a0hardware\u00a0solution\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Operating system\u00a0aligning with AI frameworks\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Minimum 16GB RAM for\u00a0streamlined\u00a0performance\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure\u00a0infrastructure of network with isolated channels of security\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Application Programming Interface access credentials for Kylie framework\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Database system for\u00a0AI training data and security logs.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Security Clearances<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Administrative accessibility to configuration of security bots\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Authorization to\u00a0change protocols of security\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Compliance verification with\u00a0policies of organizational security\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Completion of data privacy assessment\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Software Dependencies<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Python 3.8 or higher\u00a0version\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Requisite libraries for Artificial Intelligence processing\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Latest version of\u00a0Security bot firmware\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Compatible middleware\u00a0that can ensure system communications\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Organizations&nbsp;must conduct complete compatibility&nbsp;assessments&nbsp;before going ahead with the implementation.&nbsp;&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<h2 class=\"wp-block-heading has-ast-global-color-5-background-color has-background\">Detailed\u00a0Integration Process\u00a0<\/h2>\n\n\n\n<BR\/>\n\n\n\n<p>Effectively\u00a0inserting Kylie into a security bot\u00a0requires systematic implementation of technical process and validation protocols.\u00a0\u00a0<\/p>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Phase 1: Environment Preparation<\/strong>&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<p>Start by setting up a secure development ecosystem separate from production security platforms. This avoids&nbsp;possible disruptions&nbsp;to active tracking&nbsp;processes&nbsp;at the time of configuration.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set up back up of available security bot configuration\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create a separate testing ecosystem\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install\u00a0the required software dependencies\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure\u00a0the\u00a0network security parameters for AI communication\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set up\u00a0secure API endpoints\u00a0<\/li>\n<\/ul>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Phase 2: Framework Installation<\/strong>&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<p>The core\u00a0Kylie integration\u00a0ensures deployment of the AI framework on the security bot system.\u00a0\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Download\u00a0authentic\u00a0Kylie framework package\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Validate\u00a0package integrity\u00a0via cryptographic checksums\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement installation security with evolving privileges\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set up environment variables and system paths\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Start\u00a0AI processing modules\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Track installation logs for warnings or errors that need quick resolution before going forward.&nbsp;&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Phase 3:\u00a0Configuration of Security Protocol<\/strong><\/p>\n\n\n\n<BR\/>\n\n\n\n<p>The operational parameters of&nbsp;Kylie&nbsp;must resonate with the organizational security needs:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Determine\u00a0hierarchies of threat classification\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set up procedures for response escalation\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Establish authorization level for automated processes\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create\u00a0communication protocols with security personnel\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detail out the\u00a0high-security zones and restricted areas\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Input acceptable patterns of behavior\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>This phase\u00a0makes sure that\u00a0the security bot with Kylie\u00a0works within the verified parameters and organizational guidelines.\u00a0\u00a0<\/p>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Phase 4: System Integration<\/strong><\/p>\n\n\n\n<BR\/>\n\n\n\n<p>Combine&nbsp;Kylie framework with&nbsp;available bot sensors or systems:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Connect\u00a0sensor inputs to\u00a0channels of\u00a0AI processing.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set up integration of camera feed.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set up connections to\u00a0access control system\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Connect\u00a0alarm\u00a0systems\u00a0to automated\u00a0response mechanisms\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Establish communication with central tracking stations\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Map\u00a0visitor management databases\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Individually test every connection before allowing complete system process.&nbsp;&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Phase 5: Training and Calibration<\/strong>&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<p>Streamline performance of Kylie for the particular security ecosystem:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Provide historical data about security incidents\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Determine\u00a0patterns of normal processes\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set up parameters to reduce false positives\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Train\u00a0systems of facial recognition\u00a0with database of authorized personnel\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Calibrate\u00a0the sensitivity\u00a0levels of threat detection\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set up patterns of baseline behavior\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Training duration&nbsp;changes as per the available historical data and environment complexity.&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Phase 6:&nbsp;Testing&nbsp;and&nbsp;Validation<\/strong>&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<p>Complete testing ensures effective\u00a0Kylie security bot deployment.\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Simulate security scenarios\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Validate relevant identification of threats\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Test\u00a0procedures\u00a0of\u00a0automated response\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Verify communication with security professionals\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Carry out assessment of false negative\u00a0and\u00a0positive rates\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Track performance in response time\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Record all test results and focus on the recognized problems before production starts.&nbsp;&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<h2 class=\"wp-block-heading\">Post-Integration Optimization<\/h2>\n\n\n\n<br\/>\n\n\n\n<p>Once you successfully\u00a0insert Kylie into the security bot,\u00a0consistent optimization ensures high performance.\u00a0\u00a0<\/p>\n\n\n\n<p><strong>Performance&nbsp;Tracking<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitor accuracy rates of threat detection\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Track\u00a0utilization\u00a0of system resources\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assess metrics of response time\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review\u00a0logs of security incidents\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assess\u00a0the\u00a0frequency of false alarms\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Consistent Enhancement<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Consistently update threat pattern databases\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fine-tune AI training with new security information\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Adopt sensitivity parameters as per the operational feedback\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deploy security patches and framework updates\u00a0\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Widen your authorized personnel databases\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<BR\/>\n\n\n\n<p><strong>Manage Ongoing&nbsp;Procedures<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Schedule\u00a0consistent system health checks\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement periodic backup of AI\u00a0configuration\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review as well as update security protocols\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Carry out assessments of quarterly performance\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure documentation of configuration modifications\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Consistent maintenance makes sure that the integrated system&nbsp;remains&nbsp;reliable and effective.&nbsp;&nbsp;<\/p>\n\n\n\n<BR\/>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion\u00a0<\/h2>\n\n\n\n<BR\/>\n\n\n\n<p>Effectively\u00a0inserting Kylie into a security bot\u00a0improves\u00a0the capabilities\u00a0of organizational security via smart automation and sophisticated threat detection. The integration process needs well-structured planning, systematic execution, and consistent optimization to get\u00a0optimal\u00a0outcomes.\u00a0\u00a0<\/p>\n\n\n\n<p>Following\u00a0the set procedures makes sure that the deployment is secure while ensuring compatibility with the present infrastructure of security.\u00a0Businesses\u00a0executing\u00a0Kylie\u00a0security bot integration\u00a0get crucial benefits in threat response speed, surveillance efficiency, and overall security posture.\u00a0\u00a0<\/p>\n\n\n\n<p>The\u00a0integration of automated security protocols and AI-driven analysis creates powerful protection\u00a0systems\u00a0that\u00a0can\u00a0evolve\u00a0to different threats.\u00a0Effective implementation as per this guide allows security professionals to maximize the advantages of\u00a0integrating Kylie into security bot systems\u00a0while\u00a0ensuring operational reliability and safety.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction&nbsp; Security automation has changed how businesses secure their personnel and assets. Advanced security bots need\u00a0sophisticated\u00a0AI integration to manage\u00a0tracking of\u00a0complex [&hellip;]<\/p>\n","protected":false},"author":17769,"featured_media":67605,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[748],"tags":[],"class_list":["post-67604","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bots"],"acf":[],"_links":{"self":[{"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/posts\/67604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/users\/17769"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/comments?post=67604"}],"version-history":[{"count":2,"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/posts\/67604\/revisions"}],"predecessor-version":[{"id":67607,"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/posts\/67604\/revisions\/67607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/media\/67605"}],"wp:attachment":[{"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/media?parent=67604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/categories?post=67604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.outrightcrm.in\/dev\/store\/wp-json\/wp\/v2\/tags?post=67604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}