{"node":"0xb337090784ba73925ac69dc95de26d018f9a60f63bd5a6300e0a1a6041495c10","name":"davidkbraun.eth","parent_name":"eth","is_subdomain":false,"root_cid":"bafybeicv4dggq3y3f6b52ey5o4hde5xasbatidv2nb5spbba5keexpjajy","title":null,"icon_url":null,"manifest_url":null,"analysis":{"root_cid":"bafybeicv4dggq3y3f6b52ey5o4hde5xasbatidv2nb5spbba5keexpjajy","model":"openai/gpt-5.4-mini","analyzed_at":"2026-05-05T08:45:39.310Z","path":"analysis/by-cid/ja/jy/bafybeicv4dggq3y3f6b52ey5o4hde5xasbatidv2nb5spbba5keexpjajy.json","category":"Unavailable","category_confidence":0.99,"summary":"The mounted IPFS root is only exposed as a binary file at `root`, with no readable app or content files available, so the target is unavailable.","quality_tier":"broken","quality_score":0,"security_risk":"low","security_risk_score":0,"threat_type":"none","safe_to_list":true},"contenthashes":[{"contenthash_protocol":"ipfs","root_cid":"bafybeicv4dggq3y3f6b52ey5o4hde5xasbatidv2nb5spbba5keexpjajy","contenthash_set_block":22479060,"contenthash_set_tx_hash":"0xc23f42edfc81eaa085f4b127d5935730d4f8377a0f8c796f191fe03d6b68e2b7"}]}
