| ... | ... | |
|---|
| 186 | 186 | 보안 취약점과 the seed의 다른 점을 확인해보자. |
|---|
| 187 | 187 | |
|---|
| 188 | 188 | {{{#!html |
|---|
| 189 | | <video controls preload="metadata" poster="https://nng-phinf.pstatic.net/MjAyNDA1MTVfMjg1/MDAxNzE1NzU5Njc2ODkz.F8_DECdU00CsDYOfqX8vbmhL2MRVGo9coPTcOQJ0Faog.bUoeQvj3S_Zjsc8n2VZQqnhmq3-5YDrHuZCHXxT7isQg.PNG/%EC%85%80%EC%B9%B41.PNG" playsinline style="max-width:100%;border-radius:12px;"> |
|---|
| 189 | <video controls preload="metadata" poster="https://nng-phinf.pstatic.net/MjAyNDA1MTVfMjg1/MDAxNzE1NzU5Njc2ODkz.F8_DECdU00CsDYOfqX8vbmhL2MRVGo9coPTcOQJ0Faog.bUoeQvj3S_Zjsc8n2VZQqnhmq3-5YDrHuZCHXxT7isQg.PNG" playsinline style="max-width:100%;border-radius:12px;"> |
|---|
| 190 | 190 | <source src="https://example.com/video.mp4" type="video/mp4"> |
|---|
| 191 | 191 | </video> |
|---|
| 192 | 192 | }}} |
|---|