)]}'
{
  "commit": "466b8c4ea26f119f2b0532ece764c543e78a873e",
  "tree": "70af80b53e2d5a5e149e4af38e3eb1694083cf04",
  "parents": [
    "e1e0bd1f75e64ba4854f288741aa88dfe2f3cf61"
  ],
  "author": {
    "name": "Dan Willemsen",
    "email": "dwillemsen@google.com",
    "time": "Wed Nov 25 13:26:39 2015 -0800"
  },
  "committer": {
    "name": "David Pursehouse",
    "email": "david.pursehouse@sonymobile.com",
    "time": "Thu Nov 26 11:03:19 2015 +0900"
  },
  "message": "Set GIT_ALLOW_PROTOCOL to limit dangerous protocols\n\nSee git commit 33cfccbbf35a -- some protocols allow arbitrary command\nexecution as part of the URL. Instead of blindly allowing those,\nwhitelist the allowed URL protocols unless the user has already done so.\n\nBug: Issue 210\nChange-Id: I6bd8e721aa5e3dab53ef28cfdc8fde33eb74ef76\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "0893bff727485041bd0c6b0d82a493781e2eb85c",
      "old_mode": 33188,
      "old_path": "git_command.py",
      "new_id": "63b7b6f2d51f453f89204ae349a7e22cce03be62",
      "new_mode": 33188,
      "new_path": "git_command.py"
    }
  ]
}
