{"version":"1.0","provider_name":"AMI","provider_url":"https:\/\/www.ami.com","title":"Eclypsium Examines OpenBMC Security Across Multiple Builds, Identifies MegaRAC OneTree as Optimal Solution","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"P6Q2OtwdAl\"><a href=\"https:\/\/www.ami.com\/resource\/eclypsium-examines-openbmc-security-across-multiple-builds-identifies-megarac-onetree-as-optimal-solution\/\">Eclypsium Examines OpenBMC Security Across Multiple Builds, Identifies MegaRAC OneTree as Optimal Solution<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ami.com\/resource\/eclypsium-examines-openbmc-security-across-multiple-builds-identifies-megarac-onetree-as-optimal-solution\/embed\/#?secret=P6Q2OtwdAl\" width=\"600\" height=\"338\" title=\"&#8220;Eclypsium Examines OpenBMC Security Across Multiple Builds, Identifies MegaRAC OneTree as Optimal Solution&#8221; &#8212; AMI\" data-secret=\"P6Q2OtwdAl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ami.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/06\/Eclypsium-open-bmc-security_1200x845.jpg","thumbnail_width":1200,"thumbnail_height":845,"description":"A new study published by infrastructure security specialists Eclypsium investigates the security of various implementations of the Linux Foundation\u2019s open-source OpenBMC\u2122 firmware stack. The \u201cOpenBMC Security in Practice\u201d report reviews its flexibility, widespread adoption and various complexities in managing vulnerabilities. The Eclypsium report also evaluates the handling of CVEs and patch practices from different vendors [&hellip;]"}