{"href":"http://player.captivate.fm/services/oembed?url=http%3A%2F%2Fplayer.captivate.fm%2Fepisode%2F13ff1dfe-de6c-4e4c-beb2-a8b0d395f0ff","version":"1.0","provider_name":"Captivate.FM","provider_url":"https://www.captivate.fm","width":600,"height":200,"type":"rich","html":"<iframe style=\"width: 100%; height: 200px;\" title=\"Security in RAG Systems (Chapter 5)\" frameborder=\"0\" scrolling=\"no\" allow=\"clipboard-write\" seamless src=\"http://player.captivate.fm/episode/13ff1dfe-de6c-4e4c-beb2-a8b0d395f0ff\"></iframe>","title":"Security in RAG Systems (Chapter 5)","description":null,"thumbnail_width":300,"thumbnail_height":300,"thumbnail_url":"https://artwork.captivate.fm/6014e700-4d71-4fd2-b213-bb1d981686d0/artwork-20251211-201139.jpg"}