From ba9860bef4899934a2d48549a49d616c22fdea89 Mon Sep 17 00:00:00 2001 From: 0xrinegade <0xrinegade@gmail.com> Date: Sat, 2 Aug 2025 00:20:33 +0200 Subject: [PATCH] Add OSVM security audit report (2025-08-01 22:20:33 UTC) --- .../osvm_audit_report_20250801_222032.pdf | Bin 0 -> 882435 bytes .../osvm_audit_report_20250801_222032.typ | 21366 ++++++++++++++++ 2 files changed, 21366 insertions(+) create mode 100644 osvm-audit/osvm_audit_report_20250801_222032.pdf create mode 100644 osvm-audit/osvm_audit_report_20250801_222032.typ diff --git a/osvm-audit/osvm_audit_report_20250801_222032.pdf b/osvm-audit/osvm_audit_report_20250801_222032.pdf new file mode 100644 index 0000000000000000000000000000000000000000..fe479bfd11e54b2152e02fa329d2862f4bba7331 GIT binary patch literal 882435 zcmce+Wn3N4*6)dXaCavV95(Lm?(XhRfDl}Ry9Rd%F2Nx{Ah-s1cL*N1P4a*4dCtta zcV_O3+5O|QyQ^2NTD7XGJK6Q6QWBG3U}5A$p!x`W5D-|IIY^mF9ZhTy`1lY=Ntx8V zoyCueP9?&4!>asF(0>P;0 z{|UrV-N72DXHLq>%>7!5ARvGMSign}MEz>`{}{EXwAicX|8K#+HV#x&^>%eLx0iOX za3uYc8K6|f+|t_B&BdGatuPRVIW1rblq$NI0UZZ=_x8Vf_s2 zN!k928?fVg6(=zL*|=ZzY6qkM5QrT_3OHwH1^feNY_EFF7|=;Tf9!x_z%wV1Z6NVL z*g($NfeRr2K-=tq>EGkdd)M( zt5}$U?t_3UAZ{RNAPPXQ!vX>#1_m7HKF4d;NjZUFfQ$oT1MYGF#ejfe<@lr5!R26o z6&o<<9H2kq;v(e$OgUb?=>PlbdR=h;T3vGH4wi0KfGhUb8T|JNAu4a|^m?T!|GGr~ zJQ^gd?cB^=fGKWg>}D=z{SqjDsEBIiC;v$QucOi zw3hWTuK&8w6&aRiT|E$G##f17(YH2~>CdYXDsJYbN0lnam(uC*DGxH=u%@vS5`_({$^dpPi`B;UahJ{ZxS$_%);zbOV?Uq&);W zx)nj(GT6yPIxMAgad-ff%>s?-XCx^I=g&}&9zwLZrNtljlaSzuDb>EFe3bfyZH0vz zHWu9QnT^cjoT@(uEMNs19d!YNOD3F%7=1YU295V($EXA!J*htosufHm5FLpYeS2Rn z9#5d3elr_Z$kf<0fF{-1bBogku%aMbtxrO5_C*1wt`#ybo28;XA2mA z2uE9q=g({u{zFtjg5b?~JJOFsB<+^lu{P&4->dNJ(Ut}g%t;5ZHdCTlx{Dp2s?RYb_WTfht~(zg3xD_-y}mX6nS}rI{Q*1< z|HBODWMSd>^N{`zGZ~oc|MPA5-`^{u|2D^~ykYg!EN?i%RnMj2s_qc0J#mG=RV|8`)cKNxGw4R8Uo5>T5w4T>c^f#8T zf!Y3A1Io*)I-VImiz^|-C%smUo(3z>ioZcb`rgA)51b=Di{HNObZb2w^6W}KJ&Z7& zCT7KcaLL_#I^(^y)L+)qzt8u?fgXgC(SVZ8$LPgKNbT>Z9t;T!rIPbKcbNO3X)&4x za-Flq@av_-Ah~0A*4L8@rhIF>ncpA$C9UNyRZmZ%rKOF2n0|Yek&Ye$MK`KrZdmf? zEX4b3xL>T7IJe3=w=CHOJ+4Szi_0(lzY-l5!2B7UPi?XkDrUJkH?Ggb_eRK2QmMwM zG{4TYGJ2d4#PgBc_bWQcu5{wzaa^jdGCq?(dj|S$$ZU)%BT9lk@vvnOQ4m~3J$AjA zJxw>0-!I?{HVM`~f49t8-eL(zlemuYG1cSdPFC}dH>Flu9PEo1PyONXmg(ZVYtmuDDSBcf-5vnKJ6Pevcb#thea454IqkWVA~ z8s8K{cDps}zT03!Z_3;2#^~TZY5Zt@bRb_*u-8s6p}T=~O`~-lJHDhqR1}+Kb$9H; z@_@|q-QSM|{zT|%t^iGSGJL)VYfiX(r(zy=Qlpgu4clepD_`5Xv=$t(7z*d@9PZR1 z1%r3QrC};@XCiz==F zc`CCDoL?!koPxpB?_==Igj8uBBbVCJ=0XR4m-L6B>*i=J`Jlxo8>#)qJN2BeXKRIR3oY}a8P|qCs z$&3Qh&yDO<6%)ZeUwg88wMHtD6yMpPtf!2BAHF4dcE;iuB-dh#)~jF|1j)(wWnT$I z8}*y)!6Q~PvPei-3=1nGk|7$-0b9nlFbh9Nl5gGGoY>-XgnDyvP#pWHs z<(%O~jai|KGImXwF+GrP@?;F4a#EAsrcOlvGPk{fX4^RNE5j+vLu5#ONEb1$&62=Q zlR4CpI}tDH9qs@%`IZ;k-x46$hf4H?8^m>?%x4SBv^rmPk|VNHX}d`&d8x4fnrrJ@ zM|Mz`gju|SlEhEb68%&eZ&O)nv;WhJur+@&(NJu>s`C64&RB%!rbNF`0f{@Nfi0i- z-dy3WYX?luIgeMHGj^I#FL}@2!w;ES{SZ$@ntE0aT8kpayVYz26uR5pG3v)3$Ou9_7AmV~w&JUDTT&kAp z*vj@z7~-Pd@9T@zOtBr<%}@C0u=8kS3!TsgT0g|D1W~@F(7n3FJk7J8;~OESV-nPL zFn6K9$wDZvZdz3)QYXQuj?k&iR=xoJ8WyPHiXE*jR{fCPdGO8!gy5H8K*pEfVD1w& zsne51KZ;M~H_sV1mPdfQZ*seW2)BW6nzBK6L)s`d>^<@v;deKAAc`N(%nJALDM*J$ za4Ab+&}?)>JLMBj>WVfWEYsd;Zp9IXj^_iFn8YM`gY+}8?@a8~ z^p-7>5ESa&VAS2CwF6#yPVw-tQ9iT`k!|7lB}i49-64vLo~fNaU7_4+w7M`RtFns0 z907Azj(}l2T$M^WBI4#laqjPVl+CUyd+`CjVqqh-qhxmHH=j0-fXC5Q=x?1`ZTs%n z>b+32onltn*2&0aJ7b3?x|=t(L%~xY(r%^+4;Yl$6lPD(@hgRM)}?L(R*~B_EXay2@Ul*GP}jz*U)yg)c}upXh)JM82(HrH>RjsIQZywGCU*~ zlNVm~-NuxMN_v@Lgt>6noJHIFW?7{C%c>QlNw~Lp)8g=xN*>&tO-7%;b9&OwWz@(4 zeX4;&^p8HUntV;iZ|MBYw-_#9xCVLO?J5hqGZiV3@_$0-O;(Dr3CEAnz0Kb{^;mRU zJLGAD`Pt-?N?;dll!%fqJXgccjf!cC6N=zMHf z_0*pKc`vYZAn+}8T*3kS0oNp2^V@mbdSd%Bly3;EF{aLsE64ps=fFcgGv=ST1tAQ| z+9A*I$uYPv{Lp0WeLEy156a8w9wzPt`ox=wFWBxxRaBD;;?ng8U<(6XO3EBg$G&{% zlleNBj3H34zW%GfbdiEbjPjS7og&-$A1@McCE)9ZM=-f$4BGD@Ahn#a+Nz!3-`5u@b7^ha|XeCL)6ciVQbDeVreMpcj!)({#0f& z7>Q(??`I)@vrFSkbFCQ6u+YT;M?QI%YXE!kZL7#$|GJ0xF+`XpI@cYNU(nLM!JnDo zXMCMUHtwb|hPUwx-!;3-Z4^>A0lX>Gi~CvfRrFh}=^sS(TTT$%UeA4z(h->$3(pj! z0{CBuXQx8A2kg8f>D~nxU|cCY+2*xj%G$*1X*sv38;W6NsO#doDKJ|uiQe9%pMrHZ z6W`Q7-b!5G;WpuAkqthAV3={o6Td=f{BVZ-qMnB; z>{E#nlOeBmv$*G3=c?*bGFN9Y+-_lMO8FW8$@Fj45-d^bu3IL22Gtoy9!vhWoHU1Q zGrd%-FK-ab%AWcQ>+oR`YT!a;5}w{fYfpX#Wro-x>Q2!+%q1TkT8DV2YUH6llotIQ zp^e8Pq3ZfsfchN$jP%S5&XJ$GPPK{O?i0cHD|yn488->zz2zds&LQ&-Kh)dV?726D zJl|4Qql!^oy^PJyDwtPgt!MF(25i?i)t8oaCY(rQ6o(h|?ZlkcAt^D@=XGZ1=(Vp0 zpbcz_R4VH3{P(Hs8D^T-io`|mz9#(o`GD$$;3H!iWRq?i&Rp6+Cw>~7iYCbDBB_yd zm}A+mR8}oK-*VOsxpuxsN#L12LJ*vP$4ARq@pBeQ_zU5{*PiBOwaYKV2^lTk0`KQ# zldI}V87hp@QwIuJY6q@8#3$DwNl{FiL+w8(!N=?zniuIB@!?;}uq|PQBvq*yrVMsZ zJ5@K7eDUaZi`Akwq07KU&yVWpLPUFt9;rKbiCo!wn!4$q!tUAk2WCe;JMI1 zD`DQUyie;5qOCvNWt5=stPZD@I<~4}tYNRUn3J=$!_Qo${xPqOnDJIpmX$nhM}>G2 zL~Eja?R!yoGf{IG1JdA}P;<3s zm$gcJk>t@aY^DB*k|KTey;6Y>nG9xcTr;~r=J{@sb#oQ+x;lJ3={mb32*t$c40Y`T zhl~8`6MFBprrAP=D~TKyK!P09EZW;{4Tpuw`Ro+dtcmc!Pa`&XS3wkC;N1dksRuh2 zrfN1rELKu~GOsbM2=OJdLsH)__VZ4#JYA+a+<_`;!3wd`x7>+5QhwLjTNS%m8Nqba z#m<(q9`uAK2cO(GBNGzZQg(+x>Tb0>hL-hky6PuCKe;KJWsQbiu8>DXo1vrEnV5W2 zhQ6RuX(M}*((-Hj!p1GgZa|2aj(*f-|3XEZZ8K!7sxC5luyN&r?!Bkny7GPcBrs!a zY-&?bYI04M&9_t7@ht9c;t*T?Hwotaph87Wt$)sM4!lBcz7GQm)y}IlW;|zXCgoz}5^L(4?uRH@)B4hdym`c1`)rkE8^3x^^-VyptyD&Y>zAAWi7>W@Vq zwn%(wl*lp~$;7X<`bH8q;6+pO4mHQ6kLhS=uaDzyC_$z||O=oq>_XTv0?F zhT@1Tep+(h8as5G>FDR1Wduw%gle|6t6mAT_pEtwsb9IoYEuxR z*$Fz*N!`9MhiST&ElepAS*@_zr|Ep$13%SHe}~zFF<<47g+#f1wOn6wjx#34xL?(} z51%Jdq*nTkd&fD2P{*3phS^UCzdx74J6MU`RAllFHSe57iaC4#Nl&Svq_De~)sp2c z@_VV7APx8j!7d2JH|-XO=YZ?hshuf8A1BdBFb8}!4dRSyp1Z#}Espr@coMm?`woK! zkJa9q-Py>*;JvUynF#I|pD@ozu0qn!)DbZ!TqWImgWVOWMo^-@e6@0&Or@dK$P!Fi z*vj8)AI3VG$W_59nBJKZyglygfeiUIDyQ#mEgS2_T+GmpZM#@(LXd2!{1!ncAZ54KbY=Qz3W@P%Duq56|IaH$-)3fL(q#Z#n~ zF#2Shm8~G~*`Q?uHbY9D(pyq?k?5fn=5hp? zXYTD`$Bm47LZc^ zR#&4+zZ&6uMdZbs_&vlYg$U(A1!jp$F2xVRK0R?er4w24_Hv(BrK4khmBi7kO;}Y} zmkWMaKpf}}9~(Z}%r)TW385AcNlYEp`eZwcuUCx}taNeqdju=0fK(<^T zSkX8@0rPM=P3i$pfY~60vn{ZLW=tXCPYi<@?%MLa-v2epnDSml$!^eCiHx~^fb#vJ za5Rkm&W?wvPJ2kqkBS)Eq71r`o7rQY^XRqEBq8{qM_%3HD06&aug|Pu5gm{azq{Ze zx&o5O)5rw-JJxpW?An~ihrScc-xz-F-lkPWs4L}M%W3wZ4GCuIQ)R|5c*Y#q*vj`= z_3g-@RZ7Oc932+r?)WJgTs-=mZABl#QP65dADKNFBH`PX^Yg>*RuTcG1Rm`C_W4IP z=J(Wb{Wzbu#u8%cyt+bc=i2Gb>4o`RwF5q&RM&+u7Lj>UdeJaaYU!Ad8{L={C50({ zP4Fy{x|$xYPurdgh!#Mo$E!K&Za?#U-;_?)xzBh;z(so+BN)5?owqNa;y^5&oI^Cr zLB{HkvDAuvn&yfq)IugHh^53$aC;34b-t?qjS>&ykExgZiwtagzmOIPQQ4IO_7B8T zr{SNv&IL=6aj^+P`b@SW+j#eUZgLh{oHgyPUvd`i+>!ilq>!XTp_Mr<L~#8=%N`hitSmyF z&||?vmoSfu06{6?@$^Z8%vlXrpI|KLqWclH9a>>Y9`!!Lmbalr7$lZ}mCPS<&&@%f z_WN$Cr8}uo#GA_XRz&~En6(`~ak-n0#xZb@Chm>4)$x5ub`rBt+Xfo$MXkP<`@#>;b!V%3J}c zhBd!ykRHyWX99)RghlzfP6_B&?0z@Z?~1x4s^ymTOfi`CQOX2AxMsmcH}1k$f)umv z8s~z8DEzAgjY9@{vfYp#5k|RGjT$ZYEHe}ik1}^k7+E`FiYo*ojX^G9IB2qur)EK= z#{TIqVPAdyX!xN_rB11O;t!`Z7F1$Z#il1^w%gusOszogS^F*!O-!PI>sPO=gGUJ+ z58S)#Nr{5%CYXwjm##+Yw}`YjiEkGkm|%hzcs>(Z5JSe+JVF>zzE?ociGQ0{b;gN8 zWF@%Do8&n|D)y-~qSB6O8b@`{HnmEeFif6re`+$W-SkZa=^jx=0eYGJp(>1!3IySRk?A`G((bUeJ+U)~*JB~%QaxaSyKYe1H+6uT;>wz9w85rN*Cvu%G#4}|wIn)g@_Ysn6)hLYGdp?tB72*#rt^!=f4IrExEk|urhAs6kMVgLb5 zI2!Z4)uxdd!8BIe=&tO^<(otawlC7>VecVtGxLWoi(N#aXXkfco|fGxvq-X)l;XF4 zJS&V%ZcZYZ8iv*~zX@jQ#pri;z-Z2F-}Zs{SNE`*u=b*G1vufS20~WGeMjH1v5)rn_|_%8@S1(6VIWP4 zfE#`wi7)!;nFZ%6wi^F&6-8FaF^S2m(*5~Gn%G&iNQG8i##sMyx0rjzW38c^D0(d> zj_T^$;b6RfSJ{IxEU;~YQ4)=eH4^8^<{*NEsOaPF;zfpC*tAj<;f}v79H)7kCcrx3IlnYqZPa}4IA`Cw=F7_>=b;p~9uis@r17v_L^{S zHcY`Ak(Sht9$SUy-03r!KdZ24>ZKPce@6|S7LBP}t8qALt$)MU;F+ogDAI)M`65)w> zjh~~jRN(0CcA8Wgb0{pLwO`a=RVktRg2uF&`-uU>K%#TzXoh=-)fqsHk%#qod(%38rbiIP0p561aZuxaX?G*}`5W z8S`P%_V&yX(((;S3?;$VIY(`@t@^_lAo zIjfWWUM^7$uE73h-=Fsz{MOUnlPooQNJlE*GU_>!5ff~tNvL}h*UbAq= zTr9B!+>mvUrLk~zUjckEBx88X?Dypi8394t`9t#`myJC&q&OGvs+itXm2l=fQ(jmi zNCe7WZLmf2DMqOC<-|80*UloF%3wVY;m*Y-2Ukwqqri$2dK|@->tInzj3bg$Z0%&y zUhhhzy)iJv{;=#3hquqA!XXr}*9u*uX{A*wQ?@su?6CMA>cqka#102o&hLQPWXlHEc3cwdE%$!{RRZ&F5(Th}< zfrFJ3M9RPh?EZ7Ga00{yGYdN-Gw|W~1II|a8QWQ#3OiWZ{j>Kj{7TZe0Z_=FE&9J; zjTr}u0KGP(3ZN|-0NTOD_;qhW`Kw0cgel6%zVm_@9RB z-va;do4Kzy{zW+b@8f^9{r`^>0#J_E?g4H7FE}BNR}SUBb3)vIIUx{0(Ev~hK)wLr z$15lFN~r(`2%um7a6$lo^2!OZ0rtS)17dxhZ-2xN@Hs#d0liX2KnQ@?xd1fi4=418 zEc(LkswA1(?55KR_G+P4y4!1GM&+^#K9c z%|EQqE0gty^?A(>kSaj0+}2;#hZ8XWhxOrl&HJl3Ug<3W`2m~*dH+lOuyg%EeqO;J zX0|_z9Weca{%`^0(_i$5?bYQU^oJWb`-}d70HeR?4+t2kzvvG;z#RQWf7rQ!*8ZSB zoXkLtKj_bEc3#mRU<^2b2h1O_zRnK-Rsy;K7;yp}0OA7j0!#)#ATA&;e*^*&2f$T; zIDqVOvcC$%4M0RdrB`?fxC>kW&e=Hs9V+^>K>xKG{|hSOVtbv`|L0Iq@`%C~GiK$TRJ!8a(SiW>pVN~bug=Ym__6#Y#=PlD0oRShtK?BXy z`tsjSskpZmi_<=08pDJZI?A6P&SkEkH*h z&a_!|2x>8A#X<)8{VIH?*jAQVjzj$m&5K65yu6JN`rF#h+*hPb%|~OmCG&dg`Xv^5xLv)J_+_72oo!pasXM3jKM%R#KG%Eq8gW7lokvy zWw-(w--=`uif;Y(wm%-6l{E2ugo-GtL0V~Z``vc$mZ*D@%j^F2d|cn?$+F{%-Qz-% z|D2y)?xRPQsvnM0N)VFN+-10mu;ypj2~ak?6|piaB>x1hZ7eCG&V)Bsd;oty59Mcw zq`-Byx3a2A1B)OjH~cv0jUi08)u4V+m|oF9R<^!)w@tDDCeic(WolY$R2?K@)&|@I zG1{lP<6^Jr+ptVwuJ<_V17EekU@-qPp?EoJe6ym!5%umLNE z*6oNcLKK)AJw7MN)@5p>lq4ieosBKIcfO@f=hkjI8+~7~1Qr;4@dacp@S8PQF+5Jk z*T-c7>tdlmw?@)RiPcoXqg7gj)?@UP!aRuHi04Y-f@(OMD6=7V6cG^q8BmB9VJRY) zl)yQ>qhf%dXkbWtuCOJ(fDnekx9~z&Y~{#0x%MT~;)6}K_~U8?ELPU}HIM8Ei$R<7 zUD#;31ZJCFG5)b8m-*WdH{SyAVYSnA+_z#9TW!C7dH38O|KZL9Zr}U@N8~({>OcK^ z0(eCJ_c!Z5OM(k{M8B?y|HRV)#s4oTq--5nU(DG#MI>D@J&1hHmdL;2C5iRBs*Hq>gl<|>YgWOTK;&++F8(3 z=PmJ(=b@k1(+bZEuR*oW2k;wt#?p%N&rMD}?+^`jT8uXGOZa*N zb2HSA%Ix85(Ru=;6{}ifX9t4#iD9Sr}@1NjJTUKT{Z*TlW(Ir0Jv)}kh z?0pd*Bf0ke`mP|CANy&6WgbVLcHU;*-!y*VHr8<)@ox1=<@x2wem_E>+3FT&^ zt~x!3Z90cC992Yun*Y~gWqSRgrDGaD*W+M`;d`F_gC$qKU0*)W?etwstnng&d48sT zRqk$Imi_2zR~WsdY25n`h60zH9slv|pkyHw4H16Zq*0`EqAuYoceR%jK+pWB=AS$(;YLC)=&g6&hkVZL3;Z7-%McFjFty1q z5$qUz^~qNB-8$j^gGbW%^hWousb7(qx$%6Y^s>gwC}pbpUAW-9M1ry7{ST9;&)-V$ zu^3b^G%J)!uP(HVeOKG~Ld25G5}Z(EN2g98S~Ba|B@f9cDACO$6?*Lpm-b^~sLP!P z2(uNm$tImU8bn5EAie|#`RN%q;6{u2NZNX1tZL-mVZ&>>rtHe{n+Ib`+fps#w_!=^ zmSy0%Hc07|Z=FtVTgP8lWQmxQnUjS+v>`5DG!2_keod)Yqg?sTtIew}NOt6G=s~t; zG1scu!BOIUOug+Ap=P}8u?r148)!a5zP+HS{ZOVxUQDlNfQzIEF3k}-8$|DX-#0J$ z@f@E60-Jf7(4th_qMPwqQ#87BOq)E(AwHI%SD;vd#5|k1U+0sOt2kH|7c~AbC50I1 zQ-Z})c0j_7LS1voY5yR^@tC5cFUT`jv%!%x;FA<3D^-YrcLja$n%>g%!pB^E14wOI z)7@U{1LMU_H`YeAVq3J2&D>b{1x0b|Jx%B3{s_BqRU1a zLvCmtSc59rpI_(WcgQ>K`l3X!5{+%`On;e+eJE@5Fe|bU(!uLG=Sbo06fsmTWt`KT zkAYV`=0)=30X1qL63Vb%^JI%jDP67sdobggr$|IG^61d4>W+79-p|j%aq#`Nyt{4% zL{unrHiLT8aKXJl6RBH*i%!XwiG_Pqd2*9WEsuSY=Z1sttnMm-rfvbFc!Fl{h{_X` zPlu`qTqW(>)^2+8#EM{8Dv%z%NWN?VB|0NY6X}w}#5>g<(>2l#fydohv`Tn8Fg}6v zT_YM;_L8JviSjWTlaPQ!4Wg6`O5TBd@waQ_*?fYM4Gr=UZk5&}T9u~Rh-qFQeBFKB z{oM7%-DUg;1GF(rF)*Z8kxdcU)($ISnSz|oKO^3Sr;iHKPwy0aF$5VnqzkKSeP+DnbMVKyo?~6# zbQZ%zN!Q!3N2c8A4WoU3(E^r6~G)7&HQzO?Cd%dWpU=h+5B_8_?H z5r5iz2z)QQWxoFN_ir-hswW|1=NgCQh%Wh}gwlomQfbdEljh8w(S#opdq!=UTx^Ot zhMlNTtwkhpDIEp(>h!?~g(7`h`!mjY$kxIJC)nMA-y8;J^8NA`mcy49D&IPkGxIW$ z=@w&evS?3o)9$3ZV-ba_GL+({7kvqggZv>{HfF;-4&BbzO9JDn4Xu-1j1QZ4T;LQ! z#izB);Q69nq47S=;mj^GxPnx^g{J@ohS_rEvTie&n@f(UalkPq>}mizaH8`prGjmoIL|Oh#{_U~^C#KR#if3rD#g>08XH*t8Z>{UDE8kHrz!$GobH5M8#4m!W2Xo@SL01jR5E{{>_)4h)uVxgC(&7JuF+wWD zSUa0u3CwU)EVPU2qJN`zz8hg3W)6%a4ZOw3VGmsmJ%hG>xKf=k&ciHcFQX}RArEoP z$6y9;Vo0y5uC^x@9Kp!WHNLelqor;9uFVeJvlaW985m*el%c1KCV-~T)$}LW>U~HVtL|MJm zXz=Aa`_A=7BItxv+2Dstz^L#3!1ws@D=IM=UoRE%FV>te1;)_cVVa0wE1?HCF60stN(z*LXxkcXYw@sgESP~p~2E5nwA z_d56ct=PRqv*#+rMn?SAp; z$mrLb<7;Q?=vPD?CQJ3`XU4~)M)tWMch*}r=xi=AX-kHFMg9;@ z_gxc(k>bnrg!#%;6{REDA^iK3v6Fe>b9bCL>P zvg*hw!%!-RE1Mp6M7wUz!kT2&O4XW2`dH-xuQoJfCFS@$>9ki=ME#JNmC&PZIBb!f z;qE|Ka6eim>}{Oak5Tt{iJ(cyR6Ua#o>RJmWZ5r{jFi?b8}8!PvcC zw*#9Z>%r3%Z`dx{LQyM0Q{}QYjuT&6<)~Ow%y*GbPQcGf?0uY4%(v}(it7=oo`QTC z%qp#pwjQe;A1Z6tmm4X}9O;k5oIb@ium9v^^_{GPDNglo zTXf9bV_a)dV=a$vEK{|!N55uoCK7%A{DqaIkSAzDmhtnnvWjmXw*-kM7OGB&iiB72 znT!`mh-xN08r?x#v8Wn}Ntq@z(J8o|QsH4&402Mjc_Qqwye!~5xn6djxcNp6!D$EB zoZq%P)yRS(FMV+o#DM6N7*N{G8vglFygTbBKF%>%On-iK7^=#2V31@ecH_GXR8g&F=;}2b^@%A!R zO}3ThC1W}^(yQa89UXS=ogc8Cmd_wojfU?vBO6i&F0(|XNo<&~FfoN-X90XDN=TO1S)Q`+ge)*Ow$WC zi9-y-#|Mif2m8D&E`Ge3AdWM|;M-W>S$sC0<`}K2E~4`H&IN+5x?pykDLC3%4d+<5 zxWnBk1T1kQ%bkr0@dp%N76My+_!8UMoONVkn=IgfSg@{`{Pf;%cYIv!e@HjDJ z?uoS<1U)sA#SKM)|kmZ9}v2D8|xS zg|zZDf`H%%Ej^tmSvf|+x%$NSuxuw9%k#wBo`!lur$LpWuO53rnnL?nILxriJM$|% zzZjfI*2znU=h4T-9BjO9?42fseF4eOrmgZE1}qIm)?YY3a$;wB}5Z8U%yH?L;eVhjC7sL zhmLHhsL?NNG9mke7DOwzWIZpuD@>1EX_j$s#P0*W{0pVUhu?RS)T2*lyfpS>a^DbQ zae&UP9HMMSJU#q?F&M9&`BY(|iwrFdt>ebr(~3oF1naaO{i#cl`dajr(JsGmxhtBL z3poER)Dsv7=I^D%+3&kO)pbceM}%?jEum~Xf|h@y?1z@g4`DZ=wo-15_lzmzA2@!w zE|sJ47wwMHY+@5E=6P|Oh5qqK0B1Sx7lS&)Zp2f?OF4z0-imOVF%xHBe=dLg`MORx zL3^lGC7+)Y?YuJy1&i>IjmlyC6ZF%*p5%nwE?e7gID1ioq=GS93*Mnd?lmH3;aTM2 zSgdC5fim%`X*7*a7lVnCV?6ez(W5?B2>r;@b-waBkflbhN>k z#J*Q>M10Qf3sq~x$oU|EPt6mfmh++p=J=6V!08cB0L*XW;afc!!KD)a2@;>s(7a}s z#H?*5cM(}g8AL3pL`+Cb1+H9)Zo1w%Leu>!;>VGB#zbYu5gM6!BaPHK?Q$n9*m94gcrxg1@Pf&IEfLk}!CcqBB~2|DU1L+~=?93mS3 z)x`3BDc@=!0^L@}ueV$6G5N}|8v7{$a=1{dZ8{VzL%PTdOcTf5x5e-D8Nk>5-S_-}k%VGo>15h#DW{a8+L zH58~u+Q5b}YWLE~imHf5fyA~E+`I1g z3W;R1QNccha`A(hjt+Uc$0v#Mh_?dc-B-chRYs2&rI*m}35k3~YrIP-l8I-L&YQu!+i4!5K#r8*Cr4=D=%QC*GGyu~R%{9MlYm9aRU{a^$U(W%2Ar$n^KP`tBP$ZTNp@ceq8zH?cx z@~u_5Ce9`#Z0Qe}I{u#tL`+(2@9vT(=JCfC)Ie`M)C4p?R;`2icPi=(*?OPl@@P)8 z`c5@D!uRNgagE0=jumQ@K*S=;mmkGyqM0v22y7dw)7+O!XBUbbe2zL*0;vVb8x`0d z=)ks?%PNx-4~a64-}B~gt(lNCr6HrQ9Ov3V%&RA0*UNme8jYG7tNe-psVP3`LP;?m zrvlH#{)NJG!j1I4q|>4VcK`JBxeVzrttP;akXS29?fD$c%DsiXB`D+j%ROWb^5^!_ zb<{J%$8X;`d&JL?wXT;eiHZ{EbHI4+n8?>jS0tMouT^3FYmzxzAUpg?82sF9ZP)zy zMj&&xW@ewxdi44Y1&uo|2|ws9(I4c|Mv22c0~9+(`&k_-pc;pN(gZ`b?n|I6ucVg}nRk z4Z83L!Xtl zHCgg9mY0M-UH)Jp5G{2_o?K@N}qup1UudpP32!0U2qxv>D zHz1(+KFG}@=-abE52WiLn8nQDgT5eJ4T-F2C@uww!EPaKh>5m_wJj3(8S4?5Kn$Y( z9@X7BC?q)`TNuT)c2Y&NFp{w4=U#QZbWVMJj33V@pBaD?efK46hKv&yquteuDS?(6ZIV7t`Q$~IMF7sZPH4kuM}O>%dXbNkz*1NjA}G@xx0&NZv# z^qq(eMUy8VgF|Z~NvHaA`UwMTaZud3~Um@=YJ*Mns$UT$?3ynVYILK*)A}IQq zYrEr;-YwG~T>xQsM%%p@9sQ`BZlY8LD#EHzJ*V=!45kr|F$_(1!ftrPav>KT##-k- znAb)aB#E8`3g_GowOW2c@drXuwj;Kx>Rf#t?z&6#b3AZkiiPiaKI7arlY9p`w7&zA zn|>~qrNG;J+SCy(a=ghau2KF~ozRl2qKLdBA<2vCo?5WZt8UupvHNfUuV`v5!e*eX ztTTx}N30^6LK&PPa{gusvJX`xo1pyrMLpx-Rxc$t?RH!DU1J=L&^zzi7fd@erzwrh zWSfi$>s;zRfrW=|1hM^*8%4gQkHb`%jUfQvcErLFCp_-3Ia3}SK-mz8`N5!+oJ$*Z zsD}|r*bwnCdanE(1*0Zm6Xpg8lx~d8`prnL=3Bf2U872oh}*yiv7;jHTrg`!8X*|} z>Cf}u6N7?i6yLvbSlr%ej96!>A9#?|#L|M&2vR5RTZeNR{Ls!hl(pUmU2wF`PMKzo z7j|N^6wC|r*$O@yu7HBZ?_z|^+dPS-( zu%Aikms|vds65jFoc)xeGFHVe_6?&9sudU+7ZBS#R;A1+%SOorvpNjblW=TGZM)qS zl}OndX2J~Rtx~dqesZz_9St^KBCWV|36ZgDim(cFx27fSqB%Q*J7viypMTwU+e5zW zG6^~PPN;lHYZ>a);)5APs2?uec}9*s8)CaG6N4p|bbOTME7pyj)F2eAdt@xwEq406 zpBpM1&!`y^ehDfwUNRUYOFhZeUzQEL)6H5_Lsnx@cf{Zt2%PPzA@F*B+f!8mE{m$~ zmwVC<{1_f|zpytyu*mjvjFwG+U86y_tQkg+I6^8WSEk3kKl?v9cQ-{1f@N- zuUDO=Q3@|9^Ul#Ge|RvY7X+WdMc@WGvTUZ)D)DaOtvdc2=PeD>`jv@1yk;Jg6Evu> z3F$2jf5{Zwl+;X23@qZ@lq|f|OzOSBGp>adTKXfDmrv$9Jzcc+>9k#3(;_8?SvlA| ztxc?qT1SsRBsxW?RpXLs*y$Z>lr5CCW_EBgWbm!eTNds4%>)tu2YGJ+RacX33kP?% z5FkKscXtgI+}#fD?oMzB4#6#0a0yOu_uzpLED$_+u(u(f8nf4u(RIGk}f zb!zWjwM+I~t7gsh=rf9awW$i~p8qRz|yIBbbl}65)*97sEG-U1^ z8^}xZgkDDwZX4aMA9J7736Tg+aWD}_sdTT{k?=69m5w}f*AiuShZlK@PmwI}1nl!H zYGX?}@r9XoIWxSxpW%p7ed2{)NTo(P5w%Wcl=`YynW{;LGk5%iKC6b4l;cy5vJwTu zzIF(dCFlz9Wf~luODNNB@!0Q_J}TCERbT@Am0#Wam)~9V6eSG4Rz@$HfL&JB7hk!4 z+u7@7ED}u6)wlzm+5BY`W$83|d0rM}!nzCw^V3)ggo!_0;UlQ}_sQ?2#{;!@a$q}~ z#bdsul14A-&Y|QkhgizHenlW$hA@nju|0S)1$bF!!&A|uW4&h+ZN0( zfVFaT<=PW`Y9blW@&d=u!R)se8Fj!_Q z+BJ4l8mr%P@h8}2ry=rJKTpXMQY2Tfv1g{2k$e$jK0sf}nQvo3=DGM4?K7=it?`{T zcLZBbF~{pM!;Ja&w|z>p!S9V=?Ovu^rb5xLKtJC2WPtZlouLx%y@x6z4|ch!5PP%z zt_b3H#;lC?26tC4(Vb zT+g@QC*ZTPGhSO7qb7#;X7q(emQ6Vi8F z8}h(+VG#DaYp<4+wBfJ5wJGUXuX13{k7eBiHvm|^sG=u0~R88=eZ(6&uRRD-;_<=gI3nrfvegL&lS<>I@9SC%P+N3YBtWLOcyHRh_?z0lA zl!hvR2hVvI8|dxct4|2AWaEft!|+0eF}_&bh#Gt;M#bXw8%f%@6X!^@uF91W32v-^HCg}=UWnE)wSqR>Gz=8P>~$qA&@>XBSR?itoq@#3<0kwsn{~0S!Jxu6uE8dz z#GGYz&)PVSjaRn8-V@mI_rA3^2zU?2`niM|*H|2liyPxb!({b0=S%T8`;ejA3*-YS z8w^;puh!sW?~>RWpK>97Ec=8E!9fEZ6p5iUD2Jjn;}$o^ARIyYh6r1)2DDeI8?`9s z<$+o$8@okJ0urr}G|)&Zg15Dr#jJ}(jUKet81~wfF=iSPumF_{=yEotx0ky29nrva zKpg1IsXb}1*x8YWtEHrc5xLIG$T~}&fjzfE(OZvwYRe^>4eAhcGuah4@Lt}}Kttf0 zL?1_5z5^$rI%WSQ(c+#x_b2!0PYUCoQd|#=3xEgtgSh#RsegdV(SOg~ycdP~!QEtH zX8RXen`{sC&>yT#E;jlHlIK0|^mo$cJ&)vXNSps#SvM&OIbkKazawq_V4VK%Ih(%} zb^};}e^>5*QP}OjE&hEQ|9?o?{72Gm>;NzCp0ddb5c2?PB0v`eNQS_R<(~BiyzU8s z_b(Pe?e6|{FY$Iy*}NxXK1jQ90Q|}a%I2Sh!5_p;c7W6OgSg2GPz-+%H}7eZKZu*0 zfRx-lJM*3x3Ggx>G~Vu|(|!;)nE~?NZ^TW2Aozp0$pTOoe-Jl0IPXcq4+3xZ+{_2c z<~^nKhrk;PZ~=gMcrSPca2oG5-R^6_^*2PoU#g3-vi*xh!1y7XRmR7`=e)tD{-QWC zyN?FsRV1t*QAOw~m!vvZ`ld*9N2eQiEXM4ujVq`~zw)~4`En7r9rLd1S|OEW1V@0& zvv3qqb+W~+d||+;iOs=G;+#P={6os#zJ_JgZjq^2Bc1b7^Q7X?P`26I%kuTG(Yjk& zKyTx5(=sdlrNTK5PCD`X018!V3f*(H-UICc+iD%_6Fv-N7fq};N1IKO=xplWHbqfn zPn0b|dFVVIOJNeJB_Kko>!IGVNe;qt9l009axdxR3tqCTGIPYao-dr94VrY!5hytc zZ%$KJ*YVfPo1L|<8<;I3xW`9^P?}?9hUr~PPoqk&2G~wCNRji45Y8s8LJnk^=82<6z%4IOy%A@fj$jsU?v6W(yLzWKbJ*ALPgsePTu>NHb22ij$3B z3t=rJm(BN`@e8$B`6D_(EqUkwVQ9WK=$Wu}9{B_7>5?You4(n#-US7wg9`M; zMCS^xbg0hhDJx?FvYNlOPG#&**@9E=^I!2c$A58W`Eqx2^XdHV)~8*K_BE#hDRxAm z_p4OuF*VaoY-}&mu`y-dt4xosH^a64c|G`pd|yL58u|=H=P=Rs?LJx>k@I(8(+vRmP#9 zJ`O)-;V>yG{3MWeb)DWgHtOxO-?B|;+F$tTIU669UMiWKlANA;(Wv|;&MI1G96r~T?Mhpyr}Ud zNZUiqLjt4oF@(Mg=U?)w28jmvQa-_|NcEH5itu2w&|iHSwvAycgoR#}?=nd;p_IoK zPnd?EnVacg@HNZm_9QLY$5GnjtAB4nG~Y*8&u-zgN{T_ISd!=Qy%Gb#zWU6E(1!sW zZVasCpU(!LnR>0mCpG96DbMbAQfY3#KQ{xLz~PU-}_1SfqLL$9&7m^-&&aw3)a z7UaVv5H+S1vj|TW1^qeeA~WleF3fmhCIm^!#B-0-aB@_FFZ*y!iyAn4#%9T-Y|)0< z+ReS0Dg@acF)G@Do zTH{&--r+K9DUkN{T4gv#4YTZ4P6==X zV@DHXIwD5KJX1Y0ngu+@&DF`%?i?p19A7i9Yw18U?UP!eb;|G?JU3`w@29$htw>K3 zP6O}!^@HE_O)E#>50=X5)#-LcWOnVc?gXwB`160Nx5yt{ry7&3Pl;!8E12(o{IM5| zxqNb;9X&LRwuZ7Q#tpg}JM|k}er;!E7`TDmao~iXM{uT{~)DRc5fFV%%@h*Zb;3 z0CdRKFrWv?qSu6Y06{&@aC|0MxrB3e3K?sW*Url`ZG~3pv2PIdatVUe38j1@hlQpp zhQyBT&8lMl2UFP7@x@LbT1avcyR~VZD_iy)pXBM?-p>p&nS$8U0j;;s(e))pXO%#D$nkqcn;a{$ z;<~gK2~^9naUSqF>M#)*NwgbUM2_|D@!0d~(oV>ka}N1{8q)hHxlG=EkV81WTqhuiYH(@VSM zkuD!h7UVm@+TphWv{3AOzOv`Y$DCOTxo{IApp^%voS<{QrjxVGje=l=op8?g z3(eso-VI$T^9Qo5&GPPoYo={!Q52lIW7GHV#=vjL!0ZHEh0Z=1Nj$#7{4PKH{mOQH z)GoUbrrqZR+U)|ySp9tdI6~l(hz%mo47MeW7{g+P*k>UiD(TP;X$A>B+nWal+KG^4$`1K?tA8t+-X-&jpA?OQ!L(gd0-!=AI3bS2`rB&DC z1&ZKAf8u{BeHXK}*|vkN*E&jf$!+0;+d%4A$4vJE*3GBa+K0T|&-djW!Ce@B&1UQ+ z6zpB|oi{Qs82=+VaD37brZ(u^IIsyq^h;bW<0K9L;{)U2lusv{MvEhx-t8ARGl$ z=P#2er<{1%5Q+V>5%1a;!$2ww3m)+HQ%@HH3CceKw1*Vr!=+Q+o^dJ5i) z2cNv22+NrRh%|PewlLH{`6av*F^UTI>@?y*GAQ4 zQ$thh)A~b;N<^I*hBPYHv&mx_u4>`-Z@gJz9sPjtwYN{|;>O4(wDJ`@JlURX7C}}| z<0Yi#BR$A@v&q0Z1$m5(nl03bCE--Y+oLLGN8Lu|kZ?7HSHag%5~2IKX|KQU?lHm9 ziXaF|%!FexzDi<;2?$L-tKvuOb~q4;gdDxHc?-?VLZ61`+^AlG0At#q`q@9hH=YyL zO$d!)Nkx>4n8(rUU_hrKi3b66B@~0KR<6{%UztYgX)iwMP)#`%!jSdWjEzu%dBB-2H>O4))0Yl} zFDv}fPy&PLb#2K0+pxa%>5{P+>huCaj|+k=mo=lXcW$iNWC9D3K0)gSwWL94eSO6( ztunfRl`5HKco-V%oK`X(JyY%>@YSHqBd=imZKu-3EKyB3?T2SH?4_QgdtBe%F)$@D z=Zo}ODTzY!1t21e8z1V49hQT`f1D;XxUjD}$GL1iwx&%%G#R-&zWUTT;0Nye>asKO z^9o<8uB+O2_8VGnjq`$-a0xx;Eb9J8NAb6YcHfrT>^UzEJVVr`KEkJ#R8`j1RaMp1 zRVoxv(<&QG@+iX^TW`F<4x67a&3%7;TurkgNx5>wnI`{=*8Hbp|00Rpq}ZX#?|GxBPNVJzMc*ZIcjQooB}s9Bo)kUWcE1(;o~}5xD|pP zisYqJZbV>n_lm!fT3a}H1gu8g`b@{zT?314pJT{Tx<_t3)OPW~(hNGQx%yi_Bxo1D{k=T`hwV>QmYT17hzJx>&vpzUCg3#xO%yztLX3smdag1Kp)n5*( z*iiDhS(VeZM238GOZBl4x9m905%ElWiX2}Squ|()=-G6Fg=o0NP$}|0f)2W9yT*Fn zaJhrBE|C?XJk5p+S1NWrcnH?Z41K0`V2jiY@pH%59IdBElVU?m^)JhjhzcD82D{JI z=q1ouqr*5w0tN6dzP#2lzreAj%r_x*4&X~L;avFEnO$)=l)L$?(u=5KL<4h(EU5gn zGgahcrh;hioVjAr0&#V>p;}(ci)WlR9t5%qs2{nEX#ymgyEcUusfq&OQ&>Y+8lh%y zPEtm4KWuLpdzA}{CPZPX>(RB)*`e`q3ZCZ>sZ_7gZoJ1ktH-zgn6?uxJ**jD3%fxW zi@B5G9Kev9abdF(e&7}^Dwk>F2V|z#<`J!K%?RiYjyCo_J7W1QL0fB2x6rei z5tWnkM*VS&X&|lvR>i)PYDi`2V#t9XRe$QL?FGz*njXfk5u(dH%@sMK$?|p)m5QoS z;^o_CFp@RHYFS&7p57-gr6$LQ44Ho6q>To65^KinhI zMK)6%sqnN$t~@6whkjx})k|H8Cm^JF6kOPz+gwd|D>0O`K(wH2Fx_w{T*y&@w|ByN z1*6#XNs*pTs|IXLLZwxK_kfRiKNBPBHW4FHGgQ_Y7P7e`y8e1!{S_PdjIO_9qj?^S zapfERRE6lljo3yCsx;{8dECLUGX?p?)(&mISDiKy-6m14bzMKBY%I6z0;{F&Z=klT z$JNxEY%PQI#iFcN^KO3kx$nZ$CMN>cT$7R070|%Ye5uI{$|9ij5tB=d1?S;YK5TMe zZvseejPm_hh{$=9qPiUP;W$ZG7pMKNeQ6zB`iLg|I-lCCMyuO&komvcX(;reV~@sc zgrkwuY*mQO8xEc2^4`>}W%{7LxQvMegVC!ldD_G`&0N(y4gLEB{g6E}9 z>t};OezNeU`SIDi+*J(13sId zE#-ggHYR}E@sZZ^KjBJJskAE+L`_fALoN3;IBST zz`68ujsMtD`d@9H`&o>hAgmebJrQcp_q0{ISL^mcV~dBvr6$d6|%Xs<}i~zNUOhU1Hd!(bBX?JgZm==v2pJ{`N7%s z!`G~;_*_~=g+|ua$yUVH%GN>5+SbDS{s2Xgqph=p5y%nnz5Vd;0*Uu--ye;@c)!1& zm7a-}5!my~#LUV@&%^}m(dA<1pa;Sbus$@%eeM?qP7daPrU2vpo?=!`PG(NPAq|uh zc>Qh4k7LXo9GyhW3><#Q`pX#n{7uc=*vSki5a8nbZ9ls5pMg36ci?Y{e-%Xlvj4Gt z{r<%A4z@;)e}vUAwQ{#J1Gb$%6zYD9`;SN&e?$%WJ^aRxyZL)EkPo;UqUI(hAP11m z{Y?VGW-$CX*L^jBlK_8z2);iQ?avi}-}?&Ff8%ugv%8QH%PY}6#QdNGHf9t3-Y#?x zK@iBuL~V_n@56k^fTgui!v-xq_3;r{+B0p&6=w=s73t&kha;{VY!@?YtV{65zJjm+?q=*VxA(tYZm z(j!0T{b?oZFN5@cQn??bTFiiufX+{&_phs2zl~ldHjbYnlBmlWT7Zn4?l1bsOe<+^ z05mm_@?Y$wewfXG^^pf>@^2C;Ow139ZNlbGj`AP}VD#A8+B|5h+@D9%1_*ItXL}#v zgvi9e%JJdk53{z?eb*w=VvrOOxmOS|26`qiQ#?$lN-qo?ErI#%VGZmr;Ue}j_#&{? zF#CcN0#vatAE6Kv*?go7k}#%uH;_c7NWKmsv2bz;c?s@ML`519{Hm5XI8L^*2Ay`- z$r&w{;BIuy3rD_lsjUEE$8qPDL@tuRDT z$4AL)D5vs1)`-5lULO(2Vo(3bS1||+t|9Ym`tAxsmQXu)3a$MD>-g-`nB84p4zT#6 zLeBCk7`X>G$_+;q&e;B?Av9~GbBWATUXTKad5sDX9iVfy7Or|zB@ zcNAfzMNoH1(?~1r8#yX~8tjHvb@Y^R#XnZN$t9}b(tA`ped(>AA1Y&0g|N9$qpEe?4K_6}W)=_jlA?;xt2Uvmnx;0pF{JJD8-G`9622 zCDbfgL>j2@Eu402kcET8q!QSj2|}KSeIOO`*F+lfJjgA0wThrzxHzcbwWd^xar3z`0Uvk1{1>v1lyND9s_iy%2ggs0QxTy~Y^kK_OAw>9k|wyM<>@Jz>a~?| z@zAQ>W^QcoX1!Hjk_#t=YWGS%R(VMziyc2yXQ_83vYtB_85U2*igOY00`D1)${Xog zT9wui{B;DhaB7z9#GW(t;2V3KNa>cwBIcK>*o&WWRBz4}A15Ge4vYfl@50w8@reH< zfJ5uz<)8pE88p-%6H82`iug=(u$eWKlxPqOm2Kg+$?R@iJcy_tTTt?@pVzUWGusIG$!yB11E@Tc{PwKr4|vy)nK7m+k95i68GuV57*R&3n&dL9?Mc1){w!_? zJ+Z1>0~HeApYy^PUW_`Kj5>am95vfzJZJb5zLq~TF7}0ys6#P!flMxspku7nwu44E z^RsGBM}v8p`YKq^q;nRu_?&PDXKx)ByX57d#DMUZfF#!B5;suXS?jvCl&ZLVQi)GV zR)4Uoqg9+?qU4hOlgGqq(y4>}gNnlRDzSscTXihSV|!7qEc4>#gP}u;(^|%&^z-z2 zl%VR<*U(?$)r0ev1=>Oie`FCIN${$$Pnn@jU4ghgn4z1fKv!GCew- z5C4K4Bnbq;w#bkk}D+1 zM6_L;sG4qxk@#k{6p7SM*RJ6v2WHG-=M6v6!O-)F-t_jA17$08A;ka?$SZhvkk)MH z@lps6IWmSS90fD93#i+(7TGOv!Vz2iaU$Bm&}*UuV5St7r>|zYJGFN>zc!|?*iTo| zgRDXVG1z8JuU4OEe@M1!42m|=)N`wvP9ASUY45(OeiC}AE>9V9+MXp3YN$jqELzKH zGz&B6*oCc9PNKiisWU-l1UW#aVMwuL=ggRKqlL-Lczhfl*Q_AHL+Cqwx&C;W7E??C z{tLl@(CEis;)1`jBz{M;j9mB6s2@1_-~2fI=@|z+>0Qi?K+hcv-0v^<&ps&sgwt;6 zdy9)vBut2+3gU+P%mzfV#YRQ)_%R}fYJ13M{`LZ5;rX=@jbIH3Fcx^Xulil@ED4$U zbuvk_hF-j^KXe^yM%+D!%tFHd<_ulTT(r1|$ZsrvfZrvk3cP3V0|nWEcjXcjxN(RP zZ2!}~N3V3E!HBN#H;7<>H|K%^f@;HKmjsfhX9KR37?F}Y(5rcvRmO%Ks~`cQ560*k(=*=C2D_}yEr}UT&9%fNFfO> zWDUffrlz22N>iBCZVUuW5)bUIyH{@tcRBeG%l}D?q5|6;Vi-R`TVPQI! zS#;?{l))VxAp`wxl{>$#z(Rp}D#DdSkf1{DN|WWwMl+&TawPik&*{LzYGx%}eWCXw zfrN~dD5yb=euSFt?JjeImRDkD3V zS_i%jDkC@6^UwIQsEqtrj&S(&sEj07MpXE~?-W={lK3X5j5Kw_5^IbBe(vU1k)p^L zuqmnaqY@j8etwPSi;>3BKn@=3)X!^-*F9E{U<9cqtp52~(PK{p--kQFM?<4ll4k_0 zp+nY!yyV*QmF%?r{BGZ}azph|!K$aqcG!c1&%B|+KU2G4g6RVbjp(}LJDWE`j@CiF z+umYyAMU7vP`q9`D(u6@U;pl7_Nn9iU0dRS5S-Hhtx;g} zx=d=wW(V}At=j7=HkZ~^Iu0JQx2?Xd>Z?ZW&2jmFwl*+;#;t;1Kp4wys{QsJ}cjn5INKKbHesYK4sXDy>bsX zaUzJFim&!M+Y?eSY1nlz2bg$;UH(~LPxq0~y7Zn)DmWyNOYuxKKiS87T$ZM5^Zj(L zqFE>pMnJD~s12HZ!UbcjF+e4}B#r4S5!~@seoaG1y-&!g^l2?Jep3k!zNX@OmAO!j ziq%acsl{Qj9mS)_12I(T8vnsIQPyuM)bAQugcaQLrIiEUY<*5)2|HSUileyS5AVTR z_)ezCBy({pkG(vbk6i=Cc@m67cS5mDIoK4$5UIHQ1>1)M^h=)sZ_ z`ok&n;~^qsG5O@DCBCnUj;9BR2zsG2rB&cLZ!A8v}YHTWbaf zXB!(J9x9y+piyaT07N-u_~So1M<)XZCo141KyUuZ^84NH`#A>fziV^?I()x5rT*K| z`QxSo2HQ`?VtzRG?*=I|;6Hn~X}<^)`12_3(Ui9R$d1}}rPgn6Z5p34#8KRaOt&Cn z3+7eox%Fo55mdDxf!_Cnp$)|k!)BrbRT+~*b)W_GGqM#*SGr4*GdSdC;%=gx*8aXzvd`2~Pt=OF5Z{22vVaZPt$zPp zJM*5F!e0!2T%Dc{4U9)_3+!egXFD|Fo7IYAN|hdI*|(q__rc&xB+Zddy+I77k!t;f z2?F&C#z!D->zF$5L|(fbaK$sQo#!;-(cI4+9o?v0&BO~BBTLQ%d6OnQUrxgFv<>(! z6ILu8eRJ_TwV9%F*W5sgc%KWJDJzAbBnw7Cc7LR?4-IFhX!4YjvsKEeU3})$%?$0D zQDuZHU*!dA(J(syCl2^X65?^DOVJm=J(g_Y+7SInB>t>83vVJV0TeU91Gl11QJAvx?~p75$QFsCVCgrqJz z(U2uxJ75HcsU&xkvhQ zWoh9-*j{>`Dd!mk98ARs3;jUn!yRn3DX7S@NS#r;4Gbw`0olp5Rfnjm?duMAy^W#a zTm?AuF3xRh5>EV3!c=UI1iRH<#O$=s1u;}Q{$^$R3r@kwn{n}%$FTBLzD`e8#2=B` ze66ON&BcVq(=!$sE3>SH)t%Ve!WEw3%j7aKqx@nfCF<@871-^bh@@E^@ZB&M990L= zwY_Mc+xWfOE9eyd5FC)w^78px!kSdPg$ilPPiU&vL9TE z_DRq=ZJpYu?u}g;gbX0qG%dC}(%yO9*}J|am~_g?*el?_%~3wId0R@}!LRwbr5?IW zL5%7uf10&Tx-nW29rhHOc978vO+bmbhSEDnE@Y z0+YETAiQ7x!m_#aGge||bjyxX_4+ob5lHeymR^K->=`*LU2Pd`t?5R}SlgH=8K`M9 zBcaAyG8ogz+!PhmP^EMW?Qk+?(zMDF^DkX$Ze`&FVa!;DCB+8rAJlVJW$N+CKAAGQ z2tiponrg4|DOYXcW|(}MJQ96HK`fK4?*y0CZ-2 z&BNZX`o%pgtxocW&neWhdr97Y?qwVmpCTG_-FfsBUy)aNBW2;zphGsR^b`Ck+*yoe zcz!=~-XI}%iz45$GTap#c*C~ND5kiUZ=TL#R{F4`!Pm6BAd3urtCVWpaLkfS{0^95 zZw*M>)AVE(|5>~45-WWniV1`QQxVshFf@;ncuM)JvagU3rsB_w?I&RhsL-mh9w%I< z%X!(Y}CNAl$ywA(Z@@!_mr`UNkpEfQr~F$W8y z2j9wIIGNlngX2n;8s{LjXNOJnj^;P6AH&@ z(rHL=R#V+P9SW?Y}k6^FC3-K=Ucfk<)c#Te>N_wD53-6v$$FS4&)ayyC8@^_9 zeLw#^u}rcayJ}6TR6#QH(^L{TvD~gSP5BojvWDKwy25Tv(kupJa*zCmF8mLK8rrIM z2IWe9lpaepB9VQscCPrUgfe~<@JP<#mBWhyQoM9B@qzU&w)APbdPqae z89Y^**td*N$*gB#E0iv0X{NAmo7Xn3h&eyVGvceKst9i-FcfhO`P2z7r=+ZBV9Y+A z^RqCuB36JelKj@Lvah5{p5^+v8&k!0I<28%$D%Fp=mz51yQWwSZ3ngwyza$@u1%AY zTal|XvmdM^BVHqnA6^bQ&RuGrka0U%l-|1-&>CNNb?^- zeqgzmo|A(aSO@;Ink+0F^gzh=|I1qQuM0WxMWBv`a_tYir{>f9-_VEhesAt0)1fyKL<{-H4j~rn$u`4!VdQFY80qv3{<0 zdf%(^>hYp1r+R6xG%ZUHZrQv3Q;C{Xonk?7+=db3W+UuSdQW5L8Yk`jmtOXgJmeTA zT@)Sl^Typ)sWBmi0w>Au=CxBbr%LR1!LX$-SUs;VeV+31Kw|XH37Qp*mkmRJVOn11 zKzTk=Q;&Fb6>lF(DOL*JIYRqhEG|7Ts=%aqvq@Z@kPN&IZL;I3q+^AcGUjI5j0&^J zH(RVwduMP`rJsfuk8~E%e)AVzHm1)Eo{=e>DCdCWY{W;I zw{Wd#!WoFslg(66ZtB#}i?)s5zRRSQ(*bE22nM%*FG~r2%qlA=&C3E3=Ni6!XDfb2cZ6Z|CY^P;A zByF)5G!$0_+d-gJB? z6Za~kzP9gaI$9shw*MSF?rNw?P9A<>@RYy{P=JnJKCTunVB9O&VW4>ai zsiSy2U^t}WzM2xGT?^-C;6=GSS0G*oL)zC}RwGJRtRd@Dls1;2w21b6;&d6?(Of*g zQ=sSbAw6Lj$a{^OejggrtKBThT~muv{9Q_4AQQTjIzgqSE<8gAoOW24l#G)cIeETw zr@LPI=4hWxzr4GIxjC{91ycv?_XRh&X|yV<_#6XDaB4h-_X97D(r2XY zN~}arG(jZPc=jIb!tN9;i0ay4cpd%KitNH6aZ<0}w(w)&b!oRk+sJYChr`CQ7PK&!XAKjQdfnxK=XN`Y?THMf_t~@B{n{S z6(mb;sZ}@b94tu=1&lDR6C!(VSk$x^8Culj8O|U>_biD@tgo;?ZWP!F@h7zK&KyN7 z+L;72O$gOD;8HAcMCCF)EruX!*)io5c|2lG4^$uaHvzGr0-0dAjU=Y;_@7=dN~^qC zC1b?GPB7C7V+bzNUoYbo+n{QqIL5>l**E~p3VTy&P;s(lzen3so?a1^U-<^V;jdL={tNG$`ua76V*X?z#Zqd zE1UHav5XWlge-(8y;?d*4MdzfOO2qQ5js_aNU`9%q=%^AVkht>R#L5o26k$<6@|1oIsSD5(Uh8BO2jviJC{$!K>-P#m05F!Uag#bEy zSjz%-a6fp>fzRJ)On>o;|8n)2iS>s{!LO)Re~T7L+3wNe7TGI<+V0|S&HlfkMI+8v z*`I4;^&LNdTJvepIs0IRVw_1sBjx#Vs($B4rSZBL0E@n^zk|i8tDYOend{5*gF99^ zLhNxbHxJ#9caTVi$CVn_hn4St0*hX5ZtWMRLu`-Uf-Q{)=&-q#;~sRnsjbd6wLtOI z4o22=^GAA5zZ<)x?V2(?)jB>rUhNAZqGw*sO%#51_|2xNbTs%8TfM`y%#&lg7yx);48F`;0dT=iRJn^GWceul&YtnVZ&l-{a!B`W*!1Hh zpL7fa%^xaMzF@~?(%M|R-9KLfrH&*Pvz0&T+c&6!%Q6WO_*5`4K+I_ni4>#?zck2; zDp-|t;8_V_7hDHhDexpDRI!$t=p!kZ4aET0oVrCl&;A7L*Fe#1c46*0V)OmF(C|*L zwI(SOi6=LA(QH|Khqa!bB2>f$^NHBaXA$@lGKhVmu%LhsSC4rI3==9^kzO7;`&-L+<=3Ath6QDOjEPFC#jByGf&OrH`&M54CR|Z~q3W(pNUr3Ors+Bkf zMcz%C#~nS-pS_^7nE5jXS^LhUzV>k)GS0LTHg!b6H_v*v)pjwS#tR&5HC=>?8~pP8 zZ@B2jnl#pdE?R{+PssCvyoIxd6f~huF3S=*;1tKYck+$qx_>QN8;O}Mvs z^QY(T#qza9{N>jiOB;(RWHVOF=_?#H>@WmOe&S>N&eV~0VFjYXZG3VN?;M59YN;VOtzE(;{B0P>&PvWo{ z>CuVtJ1{AWeNz`~=oH~Tk4KUdFb&qcsc8l$yD})PtZR5wqy9*`7v8^qKoRX%Je zInB?8c4}IQ&`P51&JxWSGD7qrZ$7xe?j;^>(XXDu{)QD?qd|jeceNZ-$Dggopy>z{>E znx_RYxB8sMeB2#@wJ zJedDeT#rELw|}9Q|2bgtSKg|B+A{dh0h7OiS^so3|6{=9U$NN_%i!MyCV}9H{}h$t zVR`_-^1NyWTF3A^TOBeeIz2ph@|dFumIDa1KyNfQJyZ6l$N4vEB3paDzuUb1G97a+q;1?SMiVT$vaxicmVp3fVX@H^ z24G1J{t}}p{oIedF~mBc90dXM>Y;1)cQYqW>9?snXr?TSivEzycJTve?`avEcT=ZF zChZ&XzV(ppJ${jblm)qH9FJB5;(way^GVO9x{O=gw9k*{%%@jKywl{5{;{own$|m}zk^S@d#r`37H5Oh~g7*w6Bv6 zlRNmVDc17`CU;}H(&oMle5hK)B9E%VU+J%MFjG!`DB@mc3{y#>XKGGX828L6Gb~$; zz@=9^-UnL_K^>)D%)G%f)rt4(cX;g@_5aPkI#lb&ka&3?ymZBm!n2lUQ~ z&vF{%Df;DK;HDCo?N`5-n(wiOx%WNZQ8%yfpzs*us&uk?>h=@1?k>K&27Hgj>@;5} z(gzHcRNYNdWg5*`4?8d9m#d_sTyV4bO}RW}f#-P&zn2de?}#ABfQqN0@lMrTfB1VkhXh zjq`vY=H^unYwYACzDMRd42jtWzm#o>k7GguP1V`nL<0($NP&sw*Gj1UK*0I9zXtm; zTbL^COrQe7G>dH~rAv0FlH#*bY z;HN&fciR_v@I3ND><7kfC^n)H3^JHk8{W!)gsD;9;HUS$8qevkD{DserNL$0%U- zwgcYXArut+CR)Cv0WtHEJwsPpL*(#T6Qo^8NI8QZE!`fEK|wQqi6?%Ok)-N0+p(%| z^ZPzaqF|Izib}@}Q;_gI)}T*3Va(ZQ7AIT_L@_Cr^3Vp~HXv5!E$f#4%=_4#W%7MnlPOkjR1tC32LG2xjUGjC$`5ed&io%fAsk zU*WN`46;D`l&~MlCoAhpNiBPZJ9zk}2wVILORp^Q?kYF$a~fucx&8*2PEvV46Mz;b#C|tnJenzsHNgKk(vJOl6JY zb2053gybWMs9)m6|0kS}KnURf7w{sWKKL(G^FIbJ0`Zmqg=+rC;Kg5!%zqnR{3o4{ zKoso<=i|cw0`THP54->Th4T^6n*6z0e%}fT1S9`vD7kxDlD0b!l-wdWYef<`maZ4d zYT1IGTV;N>Dkv}D&rc9*$C7Wa6cLJv`RYHCFF$$~`dCui z3M?DyZ3y;mwMR+m5mlrdS+sRVy?%&ls(q3j%3AB!#TVQ|<65-7rK$o9KHBc~v1mAD znCSk=u1h-3)R0A0i9^&Deij;yMbR117#p3uFP#!o#h3EqbvhS6Xs%5ee5acw88vY! z0EaVP;f~!4)*x!I8v1Io-S7cvdo|7_l3eCxOh8%uK-=82nGBazXWc-w9s&Gx ztf$qw=MvU$hfGh~Q*bpDd@Ewx>x z`D3O*>EK);XZ6d9<{=JZx>~DF!29^U4DQ_Bh5D>!#`xTMe;0Ao@jLZKOWV~4mGGcd z8FwOYG?1}Fw7V?0ZXSwH+i~W)5uDqn3P-X z_(hr<{kXHx=Kqj)mQhtL?$!rHr9rw=knZl3k`C$a4(XDT5a|#Qq`SKWr8}idN>aKc zJ%&l_(y;vh|*gjb^ z<3BqGw+76rIU`!#s%$^=W)+Kl(Q@wRA=)JIGAGT><~ru)LVi3f?6$g~JpY-}Uf1Bu zOr-*$)P>Xl>qmW-*!wIQbg^AHl*rlDdC9xj2dS|^2{geDZWClMN(#^Lb8wWKHk9db zTMQQ$a3k931L5?2O|Eeix4F_Vs2{o(%aa7caq(efXwkhnR%?Qy4v1P)%}4oC$YdTp z^G#V9rcyaw*v1!br1^98t9L1-0-V0^7>aq3rvu8ty9JE745!yY4ANIi>KX5xsRJHV z$&>IbJd@%qDqY@2zB98o_+o;UMHvP-MdfasJQT9@Ofuf(g%~*42Hn*AZdQ`Qis(e` zTG1A41kqMauc!2vd3!mC?*}7ih7IGE?Gr{ON3~ln@#SE^@7cRAw4DpXjf^TCb+{rw zj@Mk{3uAZ}HnM&W9iU#YPgwijLv3G7j_g3y4Egawt2_EcrWeb${s`ofj;Io|xY;6=co^MAO?e+^y)f}sBom-+9Ji@yh6yzMK_ zKP4C0ei1K%9}ggT_+zsXe20PF-+~vx$GinE{z$a?9~@kOT$H2b0MDv(v53juE4x{` zs8T69bkm{MK11>~b8wgFS&8-`Ix}e8$xnaei(~Q-ex!5Wx!yTJ0LSY6&0K~L=d0HG zLAHpusxCfiN9&6%H)FisIzmTZ56qp;&{%^9u1!wbuHo8>FhO#0j2k2u&)%xGcu(IE zM4pnRn{slTWk1quih}I%$M|Vi&&%umx?VG5gMq>q^&V!l7rE2= zL$+f(MkrzYo%e(v1@0OV!lbDUMDR^5*#*`F8@6Brlj>)^9(9rkT8{_0YRi?aYv+bP zeY8dOoq?HdMUr*I3dF((@S-^{@ebd5<%scu~Y7stY>it}t~VbH|p~ zlXzDqDYe2#>>V0*Y<$;LP4CCcq#G1l5~fL&BTfwYU0}TUVlvmZ z!EhB6w?QITZEw_t_{_nVZinGOgW_Gj>dKO=EuV7vij33d98AKy1VMc$*4q@12aeac zlQs-j%{{}6Y%?AXJV}?(QAmtNNYY`ClG+cjoauob;e1)o8qe;TvsP=3`;t$W)?Vlp z^&@$TTU|!47DmviJHEa{Sz~nOBe=>P^9s`Rv$jzX4sx|)3MJPD5JLWb$u22 zs|*@S$FrkTfjkU7g|SD6yQoj8P($Ix{Eo9@qo&P2)590VYR`NTjH#!&X{i{T9sGc# zLlMQOFjRP+Iq7*hp`-W}Zrr5$YR9xB=8!?-itF``PSr53@R|dq$YC;XdEq7qaHo z@rC+_ z`68qUnHZ?k6*)>kDk-Xq5Q13?51z&ttsrTCShFyx_;b;)0La9B!ZXas?x}iMTiF%T zZWYh4c`MTa8&|E!p|K7WF&>gaDqJaylTV&fIO%M9clpwk$zUho+_NxfHtb!8+s>&0 z*+_QO=u3#euny;rt?Po58DWnM$VNZHbqIHmYU^N zpp%6H(~AUj>76AGToo#mnie!Fm|9 zZ+DS!rA2OIjcm6OjbEPg{cFVIZGVV=`6~Z4;*tILV2$j*2Wte%YX0-9z(1xQe-So< zpAR6l_+!%%e2W3^!M}sQ`C@<~p1+>(AFz=H92@yR52wHT|MyDeM>=;~+4)#JgQau@ zeNTrqAr}h>EwE;l5UQr7Z@lubxU%XdC{CLJ+E|y>z0|~YMQnI?cafkWNQJV<+Un$3 z-|41yQ7yq*uq;mr8sMx=KOFp^2Mo@h&r2hX4hZ$GHMpx6cKuBULSs%>Og2TlRyzp zU6eUfWNa}YT-VJfl?Nj z99-Mge=nw|MtvGV7b}@$;mx^dX{*`S?kNh=&X1VWbwt7P9%vLb6&k2>lKyx9iERLUK?75zuQ|lja5Y1)DEe(TVZGI+nP0i2VyK#aR!<3C?+@#u z&K`RqSs3G;g3DvSPVSanCA*-#EY%}ypUz4ARMSetgyjC`VT#)vCMuoKT-g;!vH&w8<6__V-KWkX)-O16JjDLc2mTAQE$1 z6#5}|H+Vu3k&SHYZP6(o+Ow|gMoQ6fY4{3L6kvgP&cawLernw(ZyO5rZDFumHcSn(}f|1Tne5(9CK~NA+RpDC{ z#1`7O2)o_;4*7OL&KL<3TiCkZMm5xSUF7cx?rGJJq3FQPL@m`mC%C&~rit zbHOLv%OfBU6g7o#=~u5;uF9M!VIF^9SR#^6kXQ^iV~=Sj9?Pc1cNbI3&mw7;Y$vZ3 zcIg84q*~1KHqi)JO8@$x|NoRY0ygOX!&Ux!MC0#49NB*l;s`Vv{^w2mPl-mrG5<>& zjo{}4NF@G1j_f}+8o|GVzllchF>gVREWZ>Q1u|2ELZblD7&);^%EZ@JdjSns6|?|% zu6iQhIF)LU_KM;9ES(TNXinV{%|jRBfvA?GXa7p_(mrUV(TC%wJ*F*a{LA9R)zPBv z4F@vO(_v3fSFQPPaDbP(R{h$uw)HRen5(+WvWt~uBnWOnjvBqmfmfC}xr}^qoYnNU zAHs{7$7l}-b3E9pBEHfZ+LnK-tiQBA>C;BR!m%HbB6;BI#&NB(F8n-6qu#~@QN9>Y zpb)gu_=lC6b(*|+pqP!1AlGNvy}vTi8f>NRF={jgS*Z>Fv{DaJ^uLhvv#tO})XYT4 zaz0xOlRvH0gqX<(=FaCwL9EGB|yTcQVW&g#*!$e(nta+qlFJw3J-ebn5Ob$2FtaSF=vHFIk7`hh6F}s~}_mG#{ zb=Jb_YO#CMP+>kVolp1nXe*j9buP(`B-dE5yQ@@Zq`uV1%CX8*zy`_aQ%Rd+q^;Mg zE3EOw_!C}nO%wi%UF zJPVnA7v{GBZ;fGzplK>-C-!p7ZLMXSVX+H+q&(440T$!YRZeY{o{;Y4rn8G{#u91ZK=ZhY2dqA6y8XyO|3D%ukyl z1>C1=ZNHMMP%2uh4$5)HbmY9Tr5=fW`S=b)81foH<43au$StPIZQ2;=f}Ib@;hS^Z z^E}Iv4GT_Shm4}KJ;b{qaRYV8`f&LE4`%}O8e}q-@Ese3$5kAUg`*1Z)D2|Y5xsdI z2lSMSpBWsAfE_Y!d#*b{2-zVZhs@DK0c;^)lh9r1BssGk`08OB(dk8rL(Mj(7({1B z1T5n@5Q%@{kDX|(zGhk;uZwv7L3YUNVJF!m9&Yx5+H0{fZ*`#&te6Lg^Cc-x*e1c+ z)C{c|gD>u6Pe|t#Hc1?7tcg)GIJoMF{#b0(0mjsdZVw2gSj;PgZ{(YRG4+}ly)V{C zIz$by*k~&ZEH*MIx<&1FGzEWOY*di|78@lsfW<}~U`%~T`g5^SCiv%KqfP+G_Pq+z z6dX0of(~h4+WAscGx7Q7Iu4&ra;7Ql|#sv%5zjsXG+dr<7qx4FPs-fz>RUBuZ_oUaup`< zLjUnIU^5ZwKwpzg`Q^ELlXzI9<2j*deQ{Y|79oY%=dQN3>#M?Z=!afp4t&Vl)N3CU z36X?2jT6qRdfh}zRR%L12!qynwO&hR#+nMcS-o_~4+~;R=VlY6DHUNN>{pCC;Dqla z>%&dYfkGw`sG{$jnBbYLA#q~!>R!-H9;u4;N!UD|Ahr!VIem2#bv)rmHKFsy zw*4hGxIIfVg2ufK)@qI(feu}n_1ZexB8{5GtOSl1a8S`pKbjEdp4E? zz*HTQEDD&a{YQ*70aNvQwv7Zw!ZSTqeP%Bds~FnH{qg5@jTcIn_Ay0qd2Bn}gY#_$ z4?w1BpVuaGNFRck*ikH~p3#j7LUd>}Z+}2~Z#+Tz-kS;OL3W;sU|k|~U3j!(S@}mR zm$~5w-$&J(dO=xKqDyx_J&)!|xi8ve&0R>~6=dS@d3eTfud!Aj4plJ;_=|77n9cOT z$d@TjIMv{UpFY_LJgVm0(PYQw1zD>NqYbKLs-k3RP05~>QW=cRHI|@UEIgIG;vE{e zSuT3$0)dDt5+xKc(Vw-u^6rWpCQO%gv zT6@Z9N^&m_O&)CspKryCc2jCZGF?BglfbJ8WgFIno5o$CGBzwlq1(K46TjLqrG{1N9&96;K9!g`hTS@V8Yvk0 zlon3`$p}oT($`toX=lK@HV%7*K#z3%QL;)0I;8)6i@gs}RV8uAyws4S#j3b3cMK_SX z-s8#Whq+94mSce|9@2|t2YF_u&jc|rB%po7A3<1K<7;-He#1n=Ylb@$Nuf zgzFkYaKys!Q*v1}rky%G)za}hZQF*zj4cB_AtG4|?{m(YAN>C*&ZJ2S`n&D?K2Z7+=!s96GOtXUU{$?|Kl7 ztcjOy(O$d4xBMmMh%hDUzDpQv{yJ^+Q^69wJ~z)Kex%xpJa~D&48t=SE-pV5I^RQAx}jU8GPeuoAuW zI)D3=ZzpR|p_~wB-5W~iLdxbg(a7;zuttvGgEeye9;}h$H(`ypeKh|m(Fk-i{t{~h zKOaCM@ds-J-(sNmx2!jUk9iww{KWzFPtj-=*)H40K0r;M@psjTqkDLkjwz+GV^N6K z$nhLI%uG_t!cB#iKQDdsV3D9*x-3oDOc+p#PB%d=KHsh{1;)p6<4XAX_)2$uMll3W z%G9s-%ludiCa7JJYYP0KtXGHt8VM{oS`=#{o(x;Glyu*pj9Ku99P?A6ZnW8t_ z4SzEfWQeKM9@PZGcs3cYUw$-98nBkmR*3P%qnOPs6Lgq@Cy}jcf zvXKo5Ql5>1bZ!7jOD0;n>;RCBij&Y=E+K;3=o9WiS@;gRwbP1K z3>cC1(XKz*&{1eV1Z1NivI~*g6|Zgb&A0-siy1C!IH^C3b)c-j_8zQN9sZD2b(i{l zVNb-{h*Tz!Z1fMG1i~9ZhL|G9n-1^Op$(av94R@`1o7AG z{HscxH<9X7@}`UOXQvvc^Gty=4N1Z#u8tyz*13Iel3#GtuCyWS1%FJlVZNaAvZ9

O-~DMv`@6*d)NJqg;#>dflFd@`#JY(t=xXP3G6iUU$VDSheq;4x(7+@9X-N9c8h(}&rdBoR~ zaW@T(o-7v-noK_Q)V}t)e%h%imN!LC(_Se&JpO=zx-%dTFi^iD0Swf1dPVv86@~+R z@I_pWA7_1E-~)!3=9kUz?m@KvQj9}`eP1)Nd@eEd%?$Fl)D;Al5h{zP_xqWX97fEz zDX|Qq9?`Q+We2(U?!+5AWc3nWopZj`>AFmEjV^IX88E&ZRe>HyAVTz2qI)~7Ar7kY z?Aqn!#OvIXM1yC@?m!+-`N!%9bGwSzD3YIqebM2vyjbq~HLE(oOy}>p;=^=~LXV6A z{%Q1JVl#a~2iqhYN71P`wZ>C3gy0Wq`SmZjt$ZOLJgy3aX%}d`Hq7TPs|!w%?*?&Bqsh;vSMv0&2*9INjL(xe*r0&E-s>Qe8Vf7Pm;TA=y8YaI2d${F|&tBNTI%lC8&O^k%71s1~v?A{?d zG_m4`8tJ@nYxb_anc*zzg1mP+LH22KUJI<3O1b7sPL!=8Y6U2Srb4b|MI+Bzj$7*n zSY^)g*$W*N18|Z%zrhEQD0|#08h;DY$nkrSM$X@ZG;;nXr17?II{%nx{6*5p@q;vi zKS6+41m9wy*IP&<$A3c_*%<$K7U~TWFUeOA`w?86?t%x@tEwl%S$1*^f|m}PEez!L zcuC=N6wX%9VGI&c6V#h=kOaD?d@mct&h*KdEj?!Wyfx;p)5qWX++cBJb zGu)afto6P%llI#UT1VTOZ^ex_ZYL}6(6DHhGd_oreO#Lldm9Z0*{b`s;U#XGnhSeD z=Gdnv^^6g{4Tr*+_CS2&eym2{VoI)0$w_c!zIFa{5q3KfBab{<6s=ROahdg%JiLu% z-aTv?i5DIp*o`Xst=hZB=J&cHXqd4S`bu#-f%L{;xoSW$<^bu9*i5R30jVt0j<_(y z1@Uh+!0C<5dLU2Co0C=&EpkZu%vH9jjXA5@>Jms0XjEjf0YD>q#y*st;C{-W|C1(D zZi^kSm(*Nix+mq6^RsV-83)Hp+PQTEMqlR{`9?~mKPh)0N+4H{)zg6Q$3InJ1GX9y zWxPbANv9}gBvAV{Vdner%URD#cmnEAeA|b{YQE~?i#gn170PrlG7|2S%AGE8!LiE2 zmousk%GxzPUcp*mAx$V@oGMyTVZGK}IIJ&xHiQmyWTX|;;9>2OP%eOeevByig4W}x?v-3uN0(0%i0#Vf`l)K?P zfx529NOgwX&R!oD)m4M$OOCr{?mDk(Q@~hrS!`aG-9{y#7*VrQGirepN9jcDL>d_& z@|#LFa%YCf@5X;p@$;fIa(k*h)?*d1ipYXJV|k+jb*D7Okid9aaO92#MRlG=2PVxE z8d>u%HbiUnf)kmp>R(H{B5Z}@u?u>D`SflL6=*(vj`dWfO6L1~8csh2m``Jn!gmBJ z`ZoGW**oOalljI~yqrd2l?5VqLV4DC;CYM^fyf=6;VM-_pR?f;>Mz|0J z=F`xL>6ou$_F6Qn9w(_{g|2xFA1z?pJC!{9q`EHb^AXzSN_<7&#nU4qEj*JVx^T}f zGQm0;8O}*JBtDsMnWSc!0#df2_KvGS7Ja=GcH2VU=oJaBA}FJ2(YrXT9pm? z{3da?N7Mk4N7#yMQs1@=TSkbXJ{WfrS+c(z8ha3Az(+03HnD=QhP>IUIlq16wwXy` zXUK=U&D4~15^0EGvex+Sbg38BMfP)^T*^rv%#2zDovp?P+N2oQO%dN`jg`GX@Xkag zvw>Mr*8?@=4*gXk{N)9|lhG5liD&L67?a?s`7D5NRCvn9-qRDp0d#wb~WW zpt2_gBZQrCMk-LXIS+EiU@^o!5Frx?7xdoHVHzQ8COBg{=b)7J`&O6E`FV{gKs?as zDt-Y5mcX`RBV8b(zGrFJ6*-j7|9#l7bh`!_Kkzd>7zvJOLnG=Oco=nr_KB}XjO*!4 z8|Bjs>h8W$krBeUY}_yQs8#oSaIepm=yz)pn~4@XD6(aP8Esmpd?2?;q-k$ck({^j zjbEPq{ad^-oVWc!{^hIu*Q_~m{vPO&^EW|{xBWK%DHX~2i|7&jd;qD&ALtQ$i-F$X zf*!%gybV2qn?!%b8?*8~h)04WKMIlMk2S|t)iaQa#7ol#sxcFyDJ>)-$o43_A=?c) zB$f>c7ZHMpjI4;S8r$p+a0AbZZBzMacW-JwzrFc((c*Sd_x$t9*wOO0r)DV0K_|=W zL3hJ5@nLM~wmRK>)7k*?i0R{53H2N!4Ns%2@ADwr0abf0s^Rt_=FTuRnkmj6$wFbX z*Ptnm`^&Yr18uf1bqW3Ix`SV;!iBu=Yuqj2#)49|TC0!*k{j9i^9^%>6mWY&kp^%I zcn|%`?3@M&JigeDGWn6*n9_6FP0QF|)dou9nM3>vB=I}})*Qt@Onh&Qxy%)CN=UXU zc~V@r#p#UvlH4=3c-YGke7l-s^CGIE@J%N7QWK8Saj|oL)@d!JFb!&U}xQt8=I0?`w|Fnj~{> zIDRI91K^Php2_UZ^LST^&#FKYxR`Cy4(#?J#Ms1zL+?HjJUq?Tj^@^aPG55)zKHd7 zRwT~CTqlRu;+fKL$0H$L$q%FL36VAxdJ0u?0>0!)NP2bI;5EniQS$hJIF#z?(ptVE^MdjQZCkc`)_}iA_aOu=~ z)#Z;ZM`K{ik$y3P%Amt!P@UXpD$_2(G`FC|OvZjs$`s2kb?hk>(eZqCiQ+?a(=BM6 z0xGh~I|E*rYD&)bv%VCLls@XlSf1)Xf(d2?zeDd%1m|c+``TWFqZmSoUdXI~M^hM}h5pz1NS%5r-T}qV74SF?2lxm|Y zlS3vKyO0qnMxt3z&y_@v`L?E25Z=wP;-t6W3(D_x57Q|u5;x{U8gl<*y>*zsmw4E$yYJH*y zU0l=^&+!hGa9-W>KwmIuetI~`tfmg=++LVsNSaN^Y#hll)lox@@@T@KM|@B6GJqU#=C@(T zpqce(TR=k}Fte89d!0?aX%CwP%&d>AfSL6XP#Y5~p3SRTn!`)$p3eIz1REKTT`7Wa zC}n>tzVeVjvzgVJl0^A2TuSI(SqUN@V2)wXdi|iV*9G5qudMh%ftV*xga1|VDy{bl zl-PFNsrKkvD8EgP*{kDVNw3ha)F&T4^pU{i?%=1W)<=w3#$D#kbuHB+W0{OnuHncN z&1Ps(A1yt}Q$!qw+mY`F5-^SV2mQWwS3I7*elGpOI>)+^p{&xvG>p->v-~ZD!%Io~ zTUFz4!5%q(5BA9Qd$32Y--JEhCXW9x)%c6-k@E+81b>16wFth&K(Dv3N6!C-J+l5H zd;B@Drc7){Yh%~$&{p?_=pm_vXcpsYN8-+9ihKf|S1XD+SC8X>=haiubsrB4)I1~0 zefRf}+Bz)J7iyc`F3K8i#*$jTeO+1nytx9G6d^ZMc=q(nbPvppDi~BUo3=4st!KR>19mFq={C!iJS~m;4R}~kV zB*8Dk>ddkuVVat@zZE!=2+9;U*#JF*CI5ZTV9Szw)^vZ3GO;g$mT3haGrVYmwc0!_ zK|&*muGVNcs5(Zn%;|e|%+e_z>JPh$QJ4+zS65lH7$G zIoLJXQ+e?cX<(;6zZyKQrY6r~1-8@{y%RyI(cpU^j~06$xIo5!YSN0)6^5C|8yHtt z$y7uQ(wd?@E2T6zn)3kVeZMt6IBK%~hV^%I%p;IFW>D4R&GDL() zx>Vw;gtpIc7guWtbXzhj=M|sK4JY#wjRs4rvte*~4z6+7;l>f@vfD2axX4j%gCf6! zfXHtOj+}6hlE>PxNl%s18A+#~@Bf zPXm>Ma($Ae;L5?_6!zDM1K++2N8u2afB=k^w?a|Hk3qtby5>LZF=mB&_|$b27**dxxt6davj{888ec`xU zky$}FU#N~e|5RV+?ao+)e0+dog{a3a@PEyW`D&Urfex9$L$k+Js^%8ac0@>lt{5Djnk3ih0g||T`of#WK#0~P$bE8F2fffHoadntk|6BC zc&PgGL|^JqBD<1~wt?$n9M^ek){0^Q>?ngL1rv85oSVT5R1N~zam7{}s2t4Z4Ht9+ zR}MB4tUMrFJq{CJWweP&Goe9v=KkgYcfN%CAw4X*MI3}%B7{9q6VupUsB-V2doeR{ z93&U-on=r>4DTH%BVca5Ch!Kf8i@T4A_%k?Z#$j$F4fs$T}H{~Cu3*KMNemoM|*=JMMzCg&$<-V9MIf$?6vEy`hnyV-*RY_Cs{H2kX;x#Q}wj!lc z(L$H8BxYtnHC#wrv$6jNa8Y$MdW?0(t7j%$c$;NhfA)~S=!_Y?^$T$*2)@;wNy&rddR#Ik7+*f(6!0AID)Pha)8^=I1lGG zduD~$*&>E_eaQn)Um7^+jijac72zI`<>;&g7LL7?`YjCodq(DA*rYM8Rp5mpK`dXqf>srysd-xTRKp@Hy zSarOJ1xGomoPILxdiIQ953tE-@8!G(Y%&;B1)To;pUKK;{pLd9`xnjx27el>t3cI* zgX55MpA|Qdf$BjY37T>-btE2W@p@V-Kt5-qB>TAGQ?eyJPZ5i>{=ZCR+U>Gn~ zt7HQsRv*A7W7%lft~pAC#$|_zAYqGucbCDY@?p}48)_Y!<;FACaKH%++54h0W5V${ z&~>+3E#;;R_I3Oajj6A*3eR^1{i zR?ClQQzD}H2q;FvH*$}`R-O}m;gdfU<3%0x)(^$l>Io>ugo}6x=HM@DAbuRWINo|CSSb55m>na(?)lE-;?jOQE8Oyl#^?7e1%`Ym`P z*KffaSr~r{-pIoEoAAclKAQg&Z{+$#-Uxm^fHWfL6QoG|{T2hg-ohKf$Gk-|{wi;j zw*7NTJ@R4+fhglg8qbeq#~)*Aclo6Bt|%8Y9(F-!Cc2OaH%}IP??}KQvxm7X{@o#S z?(K9|>+(IraU}?F$nb(12FEc3omzl6o|gaOkV&{aD->w9sGcZ(;cix~`?S`HZDD*x zJD|MSt?+snmt!!xN#^;R@npEo&o?=^FdhR48y+Nu!&+4$;fUCX7?nSI-51B+LM zIpz1&tXgwtSB8i_k5r22wZ6uNL8P7~MuxT)?K^wwj{J!kkc|R(K@fSkXb*NxAWI(g zkWaZ<)M(~gLY)+fra8e`z7tnOQn*I2tNQS6a7?s`j%fU(`7Q^Kqt$i(B;VBAPD;^Q z20%9Q5TXfVO5`iAQ%w*qSEyr}#-7~^ZfnNyC)uEMq>Ff+Em4zbWt6yf1wC&Ws+Q_8 ziLtS?1&=8p*ZA4T8NH7n>E5f%Zen50^fA3j9w@*Gji&iUU-iuWa3vwr6d{hDWh!lD z!05t9yie)r*T-De%e6KvSR^@x8k^wCm?>aT&5*(S4o0Pc%AJq2`hesu+cyytBa!QC zwiCM+sYL>%s^UT_ix-cspU28a^@id!SiZoU>51Y|bQ+aDm63MvO^%nv;-wlbOIF-g z-s}!}y3k>6);k))lv*R7f`#+du^c<*t>0Vx>&D;;J(V(jSYtD&wmXBC1G5E-F*=l;hKX6T)I zs2C)^DkyxYGv-KGZCC^R{rd~m0>wrtVu|{fofYJ(umHR z>8Z?(#)OxtxV#Yxu_xVu|E%I!#L47eR8El`;y}*4j z_YEInHnIE7YQrIu!fFLa3I|j%PzVoC79f%ET&9G>eo#vyc25!+ih+3mO~)&-D>G&t z4s(fWIhh)Ep9!0WZBjmnZlAa{xMrXD(I=s>>H?bv!*gA$`Yt96ztKisdG4j zhCR>I<(`UAprF8$eQ^|fj6o_IkQnhu!ZJZmH8^s$S~vimboE>`7`7S?yWI7jD9C$) zO2R&2u%Tw`LrW?Om^(-k1Oukj4lX)%2jNMg-v`1_iAr1=khVLksFm5CN=eX4FOT4S zc+2yE6hM0hWR3VfamNXO!cv7mw{PE2DYCT#{gWS~I~8K_zmV!$B-!Nm``Y#;_WWDdR# zz@P}lOOp#~6@7S9nd^!MI!WRL!RM|7g>UaIDV`$>EeQLdUu1eQT`!SPqOmqTxLjH> z!6klQA4AmWfVpefl~58w9-t3BqG?amY_r^n@OIx28!++IMWERcHQV>HLX=8*Wg$2t zee61Jcx)RJIDdH}UG_))Z?Z zCDsI!Q64QTE~bn#tem6efJ^S$TTmnq7&xMFBw8W&-}_)Z1OUfD065wL?J)pwyr7+; z&;$X;1J|?5C5M>exO}!f+|OXAOeM%EGYxXe{G~mn4``2ptZUVPo?_@E$v{szgyE2U zzD@Z($gvL*@%x5jH>R^hk_fsE1QKQan44g`$Dk=)4^iC(`JuLB`T8a={U8Z zQ!h}EBh24}9D#0Xpli_PD~@ES-ru{apS*JcmB%FiQ62+WtBVtbVzl>QtQ@#fE9MEK z!HGQmphTWly%x>1yo`y|}z{vR~K7sr3TfO`Y?I$b`fwd@bKLgCu#1fI&GwgHW=ZN8qWkEW6QS zevGLot|L=vCv(tH!_@=Xm5O!vNA&O8zQP&@D)5`qFnyz%*;vz63+AGG<1CF5(`&33 zX;Y#8mmGi?2(Nixqp6e$9f%43M$EJ%m-Zt%cwdit9FT)>rX z?FImjKzB?O5agH9F^V&NypXI;# zkf)xd_!Cq-q1M;nE8U3Dx%r|QB)L|ol01IGGH7JaUC3M64~R!xPW?BfM^nWVjbZZ0 ziQ1-#T8hTV-|i*q=&gH8^GcpIQcZj>r(O^Rm&XW$%40Tw@|fbN`07A|V+8jFJhJAQ zaYBGNN}vG5(N7sO%ZCk~)S5h zKcGBD$`9WcS^-oZqeHe34GpW{;EuXVjcXNaUUk#u3LD$qb>1(}wlKz&IU)0aDDLDF zqw)22#)S0if+F#K4baM>z3YTXy(;G>pdNn=t7owO7*-d4A69$0S@L*rz5O|?z6OTX ze9HQ=Z+BLZb>q*^K-^Is;EuiS0C%KXD&u=8CxBq)!wu?=DI)~BV=4&6_4vX9d_DJr zJ>Vw{=Q#FZfrdWRclKh4vHYi$g-M0Q<=hK6#U+R8aVL6A*`UI~XhQjM^zR~cw zV@}>peNT))vrU?#9toguP@0@Cth6y~r0e{n|8zk#VS?a~<`_jzpl}d`Q-S7~HE?r` zT)V59&ugG?a5tc<=1tt*)M54}P&mk}xS{MBWXlk!Eqyx!Y?q zc`nXZqASm{`;4}ZL+;tZa6IJA`FQuh8D?EHj?y5o*VQi1;(=)44(dx)s)$cN`K|c& zQ_!9xBOz$dacKls_YH1Z;AA=svPq$o>zlhvQO2)q&gbKgyPixU66u(V4WjGswYB>| z4!n}cxm7#f1~-0r?)NWo$FMNo_GkE)ukzpGj$ygAYvh+N^WQS7X1O&T`wj`b7RLWNT>mr8@fY_T|EQ@p(*@U5Yis*L zeMzr{s#oD-rJ5UqALa+#G1Atnk%ZzlAnM4=I}%;je>h-wF7)AEYYPtoR;hyP;svnV zxb+R$^4rzrnNL!#9F5ucTpquB21-lQRpmw@2!o3kKJkNBc)xT|vb3%*z>Z!le6$HW!71fe>uf4)da*5OAXLa&txn zo7Aqzl8WKHx2)5~-pQJl?%c91YwqpS{UxA1$2lX=o?}1#Y(;}QH@%BUb6pleCT!(W zj9xMj%Tv?e)i$cFh5kr$)SATkndTUg#q~YS(F2_3$X~GM6-2@1Xz>LM9i?EY2AbPv zYKabC>s7pe12S1(pa3T8Fw_a^he(&9i1(0%Ou8Z@6#HvJ*hdrBtO9m1#H;}5h}i0S zrj98v1VBf7<#?Xw_gZ^a2PS;ws9 z7h2IE8x1{X&#=-+;y_m;{J&l)HL-Pb>*nB?zCQymyq`1eqDmouNvlNX4_f zwQM!(AOXnZY4K#q4Gtf8^HQq23<&fa%K6h41JaCuEhZOai^2MSDY&6Ij=G6erMCc!HxURN=Yblha^D&U7LCWZ>@)jb_-qFx^7{1N&) zAJ_X!Dxc7UfFoy)8Sdy}z8MPESdx=Vx@vvUA2?4!qpt5^j?IuvX>GgU zFh_r21GCrv&GY+AsP2zJVUDhmCf*MB7N3V<;uw8Ys1fR&&FiuDhmycS@#$@FzT7zrdAxu4`!hmGW(fAUu^KqW{J ze5M8yC`)so=!yi0Mn~nOOb@mJ{So*z$iu@^wypy;rN zJ^n0&gJunD$Zc>N9nhE?bkbzZm4!u?eX- zi3zt4PY6K@B7RdL9iVQ^4g4f?GMNdwOu2uAe?Qv^b;#!h!oMll1hYJFf?`~X8w*8LH`KW-;TtZEa2w@NFn~9jo@1h^!^sw__x6F zKNKVDFV@EVNgK;kUKl2IXvZMJMB+QZf6|N<*-3N6z0-3Z-GW>lS!7U2$K`Ab!Gv8- z6=FnJ8rpFm2Y2^o-miu8Zh!p*P*wfZ#RvC#Qo!eGme*VT;B()~*w(J;0t72S8zatW zU@~b<2eIW}IU&>?3hV;WjF$x~Z(Q(qrW`75Y^+)4*T%FVl`PHs2BxI=22d|NxBAk( zGAhGtD^K~>no;HE%)+#Be|>aJph zdlEy@7?Ar>V{G33Vto|Pp8Xvi1{OZz9Lh8y96WRaAC?n~E56emZLLpOnXo;8HwG~g zA@S9@Yu%-YPd$a>gX$cWwyC?AFV8>nTz%EXO~HqHVAvsOc2}u5&G)_W$e~EY9)y+& z9rO;?3W{Kvs(Zlp!}lt&P0)D$1J0W6Y|k&WN#)HcXctMS0x5kUIkiGl23I72V4eaX z0`Qr`=Z{GurHxZ>6`4tnfhfn?1Xc<-b>b|=)Lgadc3{7eE|Cc}vW*|Z|ARe4B^{s{ zp=U+$s0_H!(metnNCUkwko>3ok>_qR>^CnnC3Zh?nz25E6^;6}Olt`cUtF|7;TYZILSY+KqDx3nkikJU9j~Q1Jy)aN5gU!4WlT6u@EBR(g`xOs~g0WNE)FTc&gd#oD zkaRnL9#+Id`<0xRlo=J9%(PGKWb5nr9GD;wZ)DHM#Z4 z+TO$joTV1O2aWNRm?niVOBPgg-L`9yFu-J^)5~F)fTO#j?S_5A1#l!LcghUU>)?a6 z+2QkC200X}wHN6jmJ*4q6_TKIHhgEvmpZdpN%*_W{5*zELd>)Jru^YETOsDQal87eiF^12R=jzrJpN=8>p+> znq#TQmj^lIHhFy1HzSQHx3cfB*2YJ8Zw`z?_!yBG^QFBoVTwlZN>UdF=`bMwLhFnZ_1R!xew0ZGY|j5hW%{ zPA5sK7YTZl$f*_{VXZf-;O=cFC^y#*W5K%8Xvj^4?hRN5Kz8M>*pQdEUK9`e_$jPY zSFd{P?y(hHYjc>FJ$2mX&=ISNHyDBGtoBs!SGj&Cs`p04%olnX1~egA4YA*a?*GQq zBXN-#@q4?DAGD(4$}^{#3k!L%SX^1#)RH4;AuE?9|obc-vh@+;%@bK$5?cT|YT}XYfx{`?yGh*)S>S8?L z%T9xT5IHja5y+A0&p?h3LaN_pasM^Q@j+$v+b{FK2RVWr<$t@s|7bjhh3PkuUe*P0nhJ$2l85oyu9FlOTni^{B_NLANXGalIb@KdHxoVl%mU#OUcHzD#|4M zcHMN|)^d;W9%YQ-ih>v}uVj%5sGUwf^4tr^p4e`EKtSd_Vq;~#tq*d6hkFBWWtur( zN_1;?w(oU!T?*u^V+VqO4Ki&E<&dUC97S0~D$&NSRKE7Q_{1=x7?=IHq#vrRidfjE0w!N`^T##D=H#vu31af5w2E_M zO_u{V&LY)F0xbKc*A8Cc!`0QaLRTR5oQRd7JPDi?)_*m7Q^xlxgjOHOR;RjqcQNzs zX1aLt4P`<@;Tc#ys}xUG9(fa;dU|d1{2Zd>02}H|5fEkfV`8A-1d-;{3~X>ALI=7tba zAlt!xo!M!JOUo&Tjl1eZFYkOW&O3<<=X~LtNStn{*m{fJwV%ZKDrPgz_~pExh7K@V-_=}M$TsnW zypCFo3n2W0=X9w~0^dViJ~7&^#Oe4rCn&K0+6kgkpkqf5<#mc-*^h?Po)7#HAPK~{ z*_mYYibq_q0%)CPlQh|?daAY`jZuSeOId@lPr4%Rs`)&ULIt}f`-R99XEStl48yGI zEH~CHbl~c}k7FCvgG~2%?W=?fYKBQaes5D1(k3Gk)gPGX*r!PSAbVTsN!>}`%~Kan z(L$S1J;Y#H{n#okJ~ASMjPAf6UC9!ZIvLROB#feu#4^|l4~SDwK#UtEkvgho^Ap|~ z6*=tHjFmWl)4(Z5&XJeX4NagX39KG9u8!}K3GFoOEx7;ZFF4Gn9+8L)guUt7nwZ@>!`Ks_Q1X!l<47f^<)}J~}4Q z>O!tAYa}vBco!PJ4po1SM6G7yQO^H}!8cU30ixV{Wc8JyPY6$3dF~Ytwpuf-Qjf0% z36kWFq}F!H`U;fvk~p?v`FnRZHQk>?)X5d^w9(Q+FG7o&wYb&52Q>6SP=`6dIkfdj zpx6t?c7{eWgk;GnGHgNUhAJ|=8zf3g<{(2l%BWz0MQF_2GCp7lVOrTpJ~})o6A;W& z?DY;vsBXnYNMMT2BamxS?$p&TV}|Q8LAJEihamJc;2|(*-moL;Z0_vrQMV5rLIRQ| z1~w?+K5=ChW>}g?dd(Xem%hC?4y9{IgfQ8D{wyP~^lt+op)|QQJ{PSU#lQ|$+a6E& z4{+kBEqV}e2)VQ{JW0mWdX6N`k6kl~I0x16R3(}?D}!d^VCL>1Qb!hIWyN6($acs1 zTZ(chXs#2}J0vja;z6UzyX+|DPWp#D1yV_If4 zOM=q2B%zqa?{hY+;WJxER0p`y_@>{IZm;CyFL2!&*V7=G* zB7Tv#+RW72=FQd;L(bjp`OsZzJ}S+;hs$&ck>?T$|8b4l%}I?fW6^3qK6IfO9dyYo zan!!bSFZ{CLHEbI-|g*ZX1@%aP-XFAF`m-x)#AAq}-tG4I!E)MOF?fgIs#wCN!#*lP`dIXh}yLyAc2LX&U;(g}B4}$P@93|C! z0r~dB4@^tRx7F_ErV!vT%&27LwRi3lRM0^It(!liUM7b{8C{;Cz=oih)yCI$7xHI} zxlGz1j;eOeUs#dZ;GH1Uh}{c&i6K#W$t9dCs{LI%zj?#&cv65hX$9@!;pVr~K$kel zQXxBgMEDs$Knh*`iJx#iuVGEIoh8DLon`L%C>_bnm|BN`7U8D=SGy!m^6XP@bE&O#9Z{;HkWfh*(2H``$A27d0Y7Oh+FV;LeNrXL1!uh%($Husa2 z<@aGy=eC)3^c^=`XMS?uux@$t?N->gm)bZX13DoZo0LDdaTLM$%yD{^iCJvJ{!r6b zel&Y<4;W;WofZ~-Ltwea%*d$nI5BKq_ZpI$Y60f%QR$qZ_x>{;2yP0^i|A0p?A+so zm8q^UWVXUVCP{tU9Pxg7W<=G#_?TQJ%QC-(k^G9F=epP(;oSHC_@-4}4$=*i_O z^0(>2AUv|Pl}^Iaa(fG&WdtL}?Gv8dl6W=B!Fc#qEGG5$?(NWspW?NqZ}>5Afz};a zt_3wu{zSRwqD3n|FHWyB*441&Pq0^5GKUO|Dz5Kz6yO+PFRRBJ2eYnpM8U8gx7-Mu>3;Cj~ zJi*VnCvfsL_#)1=WybK(`ocO0ei&$Q@>G*ff{?f7{yrGg-L{^Cx=+)@hDAw9g0G$| zVG86mnIH|zC96Vb`em2H!Ip>DzolXe`qYaLQ>rxiz8p|vD7jWCSdYVSn(@)f(}UP# zOI*&9W?j9wgjr0(CBcx4ml3Cy z;gF<#%$+3Pc|c4F?zJ_@@ud7(f%3*!X3|WQe2LEA3Ef{;SL%YvXA&Pn? zSgX7liLZUfU$&SA3XT;YK?vKpxWyX8R9oQznaZ`Gb+(8=nbX_9v$( z*Hfz>HyFRfW)ZYhN=XURHI^;k3?vppaOQTLJ9x`Z9Ro#?iwFqI%5;dH2ZiMyfgYLv z4D`tI(0tr)Gr9j7^vLp%sr%b6^S=i@KJ?$vKPD`H6FoBjHSKu+2?7M={VfK5d|=v< z`TsHP$o89S2*s>--k>!Nl^$S_>&53POw_AAC+D;g>_xFBdEK@d0b@;n?LIA0s(^vY zkRoL!RAz9l+@~@zkws|Pd^4LqjDzZBe)`L}_EP6R-gIqrxxmA3U$d>c z07!&qJfv}z@Dy$zTJF`#;mY!tQf`P1hyj;Jjh1^-ER6x1bX}Wok6vyZ(vP!-c?E8& zA)h+}osMaAUe-ijYS$+l?Lq>Yhnro3BYCu&`TZm*U*@Kop6p0gz1#)>vCc$ z+NR?&_`Ay*_7+msU7H+=QH*KRiHMx!&?+gGGVM_FMg;O48TY+BgJY2`_nnSP>}vP3 zjx)qR`=st?9SezpPDd!-382#vM?@q@w;2}?p3bCv)s@7XgpThOu(=v*Qv80_(QXnk z$Oa3x=5egT=aGV`y@C>=e=n42N&0|h*BY=0^Xk#vT#g&nD<0}=tY#?*D8qDp&)D;5pePl71}zDRwJ z>8H&Xe6N|`)c>x+60I{IHD%@7%>C430SU@Tj{`3%T=w%3v&wBjoZ~n2UECVGRE6$O zuP;`A;Khim;98C!QY7E*_Z$@zIrIVBWmI&yqtX028BH;UBvaB+E4*TOk#VfyU)RmH zR8CZBVqgvELUwW?ac?u#*~gCeDz|knHMOPX%G4Wm5{8?6VS89@es0)JkZ) z!hbs!^lBeehRrNR3EG&I#z8cD<>cTh3|qaBm;K40*QtCyM?>z>qdRe62aa)Gh95Q# zdmChwMMs8)^>(EgnNh6GcfYmKc+AJ{P8O?5Fyq{|7lwWlnnc2Dy^D6E+k`KYmEegR z?i#=8&x5ziB--M<$$ciqKSDr)>1wX{)GpcogLGo@Tpy(=U7UKfa#;u1%9eNkF5*fb zT}7#_e4BQAR6O+LX$rSV!s6SwR;|p4pz!6AP!k1i07s@b38>}+`v?O>1#CgGizO}! zuU-O;MLt*+;O#P*f|tjLV)xr+@RV9P-96vd#8cZZlt&-|@^ojIsU;34t+pFu^oNg{ zh99tAraW5HoOKaHRQMd zHLFTE9oR0Dr}53$I=p6CwJupUsdZQuN+lE|&pKB`gyv48}I~IzLbu! zuxbxyYhaKu7`BxO<)f;E$QyiNb@E3r*Ul6DxFZQkvm03@KiE=O&N6S2kWsMHzchuX zhf*=CcZmEQPax5`b5K;J+&1AU$K#GcGzlfAHT3Uzn}`N;TYZsq0VrPd1uCFt}S3%0RA=2OZ(;Gc|_xp^p0~D#M~lSMRk{f&n)f1CFLw4x+a*w zE3ySrGfu{``-5M(xL#IhJ&Q17%u(NK6_S0|SP|Gs5l%E+9$X3|mhbD!mQn<^g4eXOSAZnp}t538l#&;pz+l=k#1dzraH&(KqMPM&uFf z)|g7^9dsx)Hepq#pj`~<#@jv94Z|MFNSjKmkY~xCTdgwJ${=H|-ccM6XD_CKKJdD> zz+n1NG~WN@Big!*-U|4Bi;vs6o z`QT-*Cw~8?06xylE zo4YI9FE6XC?&v&}$%X1VqHa)`BxcVZ5|S(rVUXYcqx|0zn_+qAZ}M-y%Kw_!49lNE zC|UjxLix~d^PduuEWb%8@4p|w!tpOcd4G$6pFcn-@2~j)p=A5bA;^EnX5z-Xkp`AZ zO6~zAXHO=kR z{HU-AV&S{X^Zh$knJnyv%afA^)thz#Z{tR_>(AQ!xJF#|o!;i344M<}%5Q5fPWvM5 z=WRc)#H1M=>!xi|XO$o(N3!$Tu@L2D=K9<7X7nvxq)Xss8TT!uo(_c(f78|?8HXiH zhLGN_-{ey&fk_&ZqfIk~>^55Yzy-`ecEWPu^H3v(xn=h-EWO<;-rS<}l;C-ix2aWJ zvuL_VF}53%OyX}TF>QQM^9uR$2NWN!Rx(N!=8R!$^h`M}s>;`WzCC8O6t%HWdOMIr zzzn4O@}(7i1{5#@Y51(tw?O$vNb~c}%cbyrNX;ei3?yJ--_JniHd~FS`$n|9b$?F; zj$9)vrXuv6o8lW#Aw7SgDf+tEK6n9oBWaZ7{WH<``hzh_GstD8GH$Vps0gg}`q+9ncFqUtaUZ-@)}?I|dF=^~AY z(u|-zUR}{5T_2ZR0d0>;)R77fc3L0(u zdQ4!|5LR+$arEkOf?3MisMof}BXs?SvhXjI%nHwO{7!}rLk3HtNzWOrB4~tudQrZj zwf($r>+*;us7pw+$_PWjxWPV(C)Snc;|uxdJ~uAh?~>&~G!)JUs?tF(;Mn+d6=zrC z8g7@<{RGyU@MSoVpY}>j!!x(EnGf`Nf*NGb-koSMG7W!?Mzas)T3sWd$n87uUXD|? zsjwKsHtEk@`iwo0K=YgjZf>wY4d&Bp${~->DMek)9xpW!8wX^)uY+Tq)l;f#Zix*a z@%Q=5P>iC*tDXpShq6V@;eQZ@wG(DJZHXzOl|IA#9X5S^Ct=jp{XB){xp+rP;Oh$t=`c&;s$O&& zC7k*+(`P|PcNUcIb_f@8`b^QuH!p9O)awQWXE;dTNm!K+biv5T(QYv_h$_GszZ-Zu zHuxpzhhomlAmot9er)g743YUYkk*;Q+b0kQ9?k)@LLU_stM%)zlcW60{mP#v3<>Uh zO*<7vw?J$=7_H*LC2JB>=6!Ke#mE-lnowAvD0OaLD2&_p$-cw$&_Ofe;AsRJ+_&Mr zTyuCK8U_3LJnb`yGVgar4Sbp51u?B(;_5mMlJ(4kpJ*AGOE-^;<|SKQH4dgRu^pbl zGO`&=)rZuf#EUQZ2i80bSExn5NSAvYWhdW)n`O#KORc1!+ke4RB5#jdq$m}vo@Y+2 zWbaWZ%-xrM0NC7xfy1jAa%{cl)&eH(Q3i5s?TQJ7wQz;Pm-JJWYi`vkLf07iyiuNJQ9T$> zV4=59Q5)pW#$eFQw8@zslE~zV;|rpBqW@_a-Z|OaXTHi@5nWwGiqQhYTp4!qh<@zVk$!BMF}Iyqdp5%N|xr3^X*O zwK2|1F}S6c!uX(UmMT6*m<1}+j)fwn_s*MATFr=IRlW*Tx1Vi#8kS26DkL8eie^kRLu_YX?RKY~fJ{25G=_0M3EtbYiTd`L0>V^Z=r znIy|!O!EE{1W3sHTMYd80Fz|-e=*75G`s&Ehcsmd@-$XJp5~!VGlF#FVLRqUCOh-G zt)C6WHO*a>XnDJbZSL%mZkI6`*VTdY9@W_!s}sJvn^Ujj3)_~os3@7RdL38j;n`Ab zz6A!7@bYvn1Aewirp4Yn+dI9(E{><`4J*1`FFE?wCfUanczLiG=d3)}jTw3OP#RhsPrwn~p1C z{>syQsjUL#ubfyEilj?fi+8|^fVm`UJ5-C2g*=B}*XrAD9Gn^hRy}qPbjt*(!2ZNb z7nh$3UbVezz2m9MC~LwjiCg&mH`Gr)vSK7!$FTmC#}<&TiT3qgU;L^uJQQHUFO=+a#3iC$ z%o3kS(>`uA_+~a^gzPznfVBjGlb%KK3!FvQxTXwG&_jrooA!jqcrPB(;kiY+r_k{{ z6MJHbVU^3=mx4=~^gXH8IuYfd?3CXAdJJ@#^)$hVI#SSqS*zPm&Q!<&$ku$zdll1n z7+-uAJ>D4ZdF^%--ad*2N8s2H3c7PHf8}(qCGRGZ9+S7b7~omQn1Ced1E&^Ngv-V6 z{2gk8%q%py^6mm!ThU)$;nzD4+id{h8ai;eCe4Dp$29TvR?8lzYtr*jTu^*jP=bu=I)4a@JDq*r>C zaOxyx=u)voBa5(y(kBne4f||kN*@{yh1!(8j@fX=M78x$=;ftuyd@fZQslwx{GI_c zUuE;P8jZ%CFZz%(qb^>2xNKwr3@;qRmY4(w(14XQ1BBkGG2%=!XC@gcImQA_uXx!o zXk*hI$8=kW9L&DgL$B8p*+hv{{W>9R@!9xkP1tDb3$stxa7IMx$tR6 znu5sH+fEghTNk?KbZ#~PpBAK$S)WQXKRP3CN*&R>ROer5wFpcl6?RBS<$_?#f!!BF zkE#KV=}Q_ZGoTAHWpz#DwEjFHF#b4VGbfqJY`*=)YnGA2fnQXzAVr>#ny*cQ ze-PJ3lKZj9Gn4QIzo(p>j&F?>27$NDIf&9)SzaVw9E=dNLo3^k=yF7aZs%9>LWj3Y0L zV5APzpPN#@uJH2h{F#CYZwqzZ52CaV&n%lx8ckhkwbD63E>p}ik@n5(iItkUtH?U2 zSC}~?ZZ&Zn4Gt-7ZI;=^nXYQv8>+)u>Um{H|s+>>$hL#e~-oe zKh@bko33H~O)`1^{Q#Daf04=iTMYdC0Wx`i%?HRN>u;xPR)oRJXE>9?pX%*6Dedjp!kfExfu*CEIXUOw?qPY%n!^!Gu z*PoRx7lK86cegiLYn#VVsY5bp9c?nhBwn)s5aMIN^F6~Y-OWz}R$ZXBU`zfp_V zRY#IsJjB9t!%puHBzlr}P>sMIo3iQvAD=dUuO(Z*yCrdXR#@Dch!~|Hj-q8qt{>~7 zsiS8ANr}!1C>t-?guKZ{WkAXX|w9YzexJnc%9}!BQTjF`>`MP z$M;+^UR_l(eRN#Uil%pFw5p=ZcL3M>h-Ta{{SS|ugE*fxkos60>1b5HZ%?n zyC4)`Z#Qb}Z&gYefbH#oHS`3`$M2j>RvrDvDNc7y{Z2J0gx3(4>_*cFgOVrU_wViP zH9paMds`T=w?#)ZNH9}=+1urSz0K48KkRLFcg{EW_I9Sq?e^_a#1Q(^lviMTJFWFy zW<(d*-ma#~&}w#-)*<~g=A2b0K%UL1Ky9PaM3tHGo~XPzbgE+q4u2^7`c52dZ@U}* zvbXJO61k6uTLF7pa(m}H*xsJ`PkX!df7;vKk7iw(GN&mZ`RnGbn3BlfP%~@T%6j&T z=&QXKHAyaAy?Obfwjj{AjUc3P?#Y1+mn<4sw)lfp`{Sam$;k z_FXE}bapn4fD(tEFD5#tT^Hb%^NpY@6MZJT79qR=A zq|3y_pRM06r~^sY1YT_(_a&KDPp6X8EGPC$L0Y9L0Q8yU(u6w}m98V4zEf4foyc1k0#B*+4`^b=y0UUFuKjn)XO|p>v6P;no=n`yMvn95+K|t;H4yJo& z$Pv25wv+Bnd`~&}u`@22s}T#cL25Oc6w`7Uor*4yRsFTwp|BnkAt8fG_c>-9`sY{{ z*;J;GZ{maPSTtPr9(KaDKi%VT)@1>%F6&|En!2@-T& z7E8wPt~6{41%Ngm4;Sw9hkb>?k~2qSIkKFG!BTIhti9Gy-=JJvWdBAuAtNkl1mtK0 zaT}xqWX9`y`_jFWMvC=62zl_RQ#3TaCuScBe`JU$#qkcFMODRLVoHjfdks1b6F=c& zkF7CU@)NhnyCTVmb9EzgY6W`_P-jgFxt%BEn}HHQKjt&_PK+atBJQcaLMc;RHKX^< zzt@jjQT1~LR#yzm6}~+N0x%voNO&>}%n$0vKLSUx{uwxu?a#oGY<~!jeCVV3PvJ<` z-^7uuf8ogcPY|FR?{6{i;{!PI{+jfbohOY_yW-pQ{n@oTe|G?^i=fNTK5+26v5iEz+_)dtg<-s5lM z+N|EWT>snJ&PW5Aj?xMeWQw6c^#l8};m!s5YT)F}s?EZWitxs%qc3ZR>m5;1+L|Qo z_tth_{az_Gj&I*4eWKJj#E)`Yxug6VBC7d z6DzFKE6|OABae1KcN@49G_Rp6*yKyqDwLa;ldTP~2ud1uz})hkAX zgw$Phwn1`Z3(cEctgu&6q%>1u|JV0CKnzkhm=oQl|+u$*y)?)=!3hsI8j@> z7$^ZRGW=gS^5-xZN0#*{yNhql3-fvMx(e%WBKk#e&kK#+v8fT&_f|^UZ{BT5{AF!- zvnWvDwC!+Q=*bo#(B<~=NNTL~Qr&n_($bby@adjER)0Jv1P_?og2o=lJ`lITVN2zq zUMNR>KMt6kDMW%2l`K17a%wxcbh9u-R&!D&DmXahOTZGwRCXJh2EB6=Ir=3bTi)DD zNUF8?H0Y#gdO=@Ni@e5}ovq4_GG;N(9Rd3gaj_`gFBM1Jugxn~PT%q*h4@?w)TE!V z3qqEYA6Bm?urNA4j#^geDS{WFprZ+l5RG4&2C8f2Qs zX1hyhs{t^Rz8-3qrB{6%aj0)ZD2CLY`!9fWvrK?8?V9c7sl-A0#aH>I@q^p-GFnt} zKoAG9HOX4t@WsawT$&OYuBJ;AxeOpFr=8?Q zs?c4{H3YMx=1;}72Gf^+E69;w1CoG(bZE-Vq=SOc-Y-c8M{!b$IVt&8$+ACXSc-HU zFJA2fQ5+CkfWFK2G*S2y9U>ZHjGyY9fG!gsRg47;STVA2qsiLkTo>*{;fqjVct86M zqgYn|_X#;%`^pSg#j4Fstn&*pog<=4ePVO^F8wyFz~G@B>x)IxT%c9-Ms0n76Q4mb zdIjAyHTu#pWHb9+fDRlE;xqHkJ?82SmnB^E1Q6AM(eg@vpP1>L% z=B{<4Pg!Dsm%`t-6M8hLidXawwwSBrTVzKsKuML?o~hmsMh;#3FJw$t-@)+GL9zTP{G(~O1>Mq{O7F)`kC3^3MF&ij`q+WQdLd5I466yor+dWSrq{FK8vBiBo5erO~?-Hzh?9Osq}1EHQT&aaP)^n1_IZz01aGbZAL0+2Q!LwSx0&mq$Y&|y%VgT^GWWKli)MFkMSNE+aN+&9F1Y8#B7s=6cau*JiMcPGtmJhPl+H4k(RIZ9fIqFaD zQR2IL=`m7-g_5n7^eCBqa9ttrE?Q01z+^%H{7n69P6@fnC_%v3#V(8-uN@zD0%n>x zc3f$6hvL*TYCt_(EHK6T5LT*^vqs)rYyu;z|FRe2k#65N15NTSE48%%iQ9C#1EBXO zR>aGo>_@~w=a8P5nG9hms0vg(ZM9w5lFcOk-J09pwPyo@{cF{cxxg^DkbQZJIsKt8 zyrVVmCfjR3LxzspB26#8`I{{*;(n(5e5Kc4=DM7js46W>(v<`Pv=E$Jow$_@iw8=!XQ%Me*H0#< zAH8!fC}KnGNa^JdFdv|{)2(~q!)BD^_Hr0A0PwRTTb#A`z?-l^Q=6}sMHZL{VH z?(TF`8TjY-I$29$jBWrK8wrL_sE#D{q0c6MZ^f2)+5-3BM7NE@vZXR5@asU&5T)(ZW4 z6`u5B>j-8f=pB=YLEZ8|T3jP1Mq!H0pz`8iMvfi~9pOO87q`-Ypr5qbX=S7S>dni5 zot>j6Tp5tV1tnsTu=73EyXM=XslZIwHSfEfHFNx>cy4+Xj4@pX`=KwYpHR7^8gnQn z#-s*#YFle4HKpK~tpb?P5tYd7Sw3vgDGpTXXPZBknfNZ-4$0}E&xfbf)_v6Z5uad- z!(xC*J6|u6T5;gHESq#7pA8!#eL#WU54tx}q~_B&7;KLlhP7KmT<~$ubWw>0GeAJp z<})i0waKs&$jCvkb)rt}oRFe~US#o{Z3o^~3455tPB!HYxW!YkRQ3@fljbo^y^uok zm6I?KqM7hzlFJJ0zaA>>@ZS^W8Ph=GGzLJ@o_~umr7}Y%#|9M7zt#fU`E8 z-&3Xo#izwJzdQ}i01mm+ulAXRe2R5$|4#9HMk>giBXe9BnxbU6`3@3vI2-w(qp+VnDa;)a)#|Mrqg%}Qr>b+ zbQxH;z?;suODy2fxSQm;ZuoiF5{BeoqYH!4Z05?bl20A5X!o|GP6FRs)0w`&;7B)D zGhHO7i;p}P!NP(B9=$2B(t?QDHsQea@W znY6HX7WD`f8uWRsmYVTvolkrk?A8{7FOCqs22BYUc!jY)pUEuEKd_3u2 zkx?%L!ELTlbB*_v+N62(_Rp7z!ilI-(A;$JiD!m-;mHl7Lejn=Xg!6BrVUH%$3=iA z(uv7luSuF3B`e1qVeb(x{G2Z4W9Roy?Wge^WL60;72#ba*ww~L30*?o{GpyAft>H}N0D7Uvk2?*E3$kYBk~Qct zIGD~A-g~D38zha?9>zSg3@>r{JVDk$IKK~?FaTOBUT%r-+*n(M;ncpoHz&(iZ0|Y% zCSIYR>I)1dsn(KX%(vdFs;LRHuoZ(u#+_FZJz`=}tN@gxXj`WueKw_A5&zETa`{W< z35Xv|B_~{orN$?HHzFR z=&7;<73`2R(ydHyEbt%cCqX7faFmJ_{^z2O`vxXz5r%t4Qopw1i z)(~K8)2WlmSWtHyOx}lW$d!31PO1)=hyL&bEFf$H^aGI_ z!@nkAu%9p1j?@6cHfA1{GM#<*P}0DK_JFxPIQx+K#i9`aCC^sW)+bz3#&>rb!rRwI zMA^G-TMjeQ8T#sK^o?^n{6a6R9i#$SR)%WD>6Si?u#H$ml$bdT9B$%o(%QEg971j2 z3nX#~f1}iCL(od+ixm2XCc##>hQEQoN@FyZw(S}L1hz-mB1-VICBJF0FJ3;zg9diw$`lOZo!&Lql09s=|VTm1{`sO?ZtbG%0)80m%2eSIWCoBaGAG5; zAYi3K=YGp$LQU@16*ML*CWG~T1anv1BG~a$wHJ5>?mBSIUKc4CO!}tR{RkI$V-^(d z-rw>~(5UQ48OCAiVf##cDegQA+7=Op7>!t{60MzaA4Mcky*Bb;p&3Bm{AQZ6Q6=2R zs=jtn8Ggz_bwG7~{iz@9YR8vN;|!;+*zKz30#lJ>M)bb%RIyTgw`VdJa|Qcd=gVQS zl={y^uD%kP&fz|!Ald&2D9Qe3KuPvL14^?08Bp@UdZT|zL9+iQl)V3b04v77pyd56 z27dkkl)S&@Lr{|G_Y`E$TQUytP^8-;-b-H~W7Ajx1sN;&7Scmv9qpy8v;hg8*3o&J zwkUQ%tOiRpdom+!VSVlRQK71b>Fc(e1-c8=d~dFAb!$MI&z^P8-Q|AiU0Rn6(!7V8 zhx+VIFM;=(XVt}}C!}8dYCj%yVOb=k%5C3GR|oNeL;7)~-&2jZi37z}pn8uw8eMa% zc{`SBd6^1-3tlZ?XHBmOo_ob=*1(N*m=3VB2B=;WW`s;nbe{0K&)6u_f_K&cdF{V< z)@)HDM*I|u(`p@?z28~GHbFKB;>cU}&G9LctbU~Lvslhnkk+zd$MGW!X_hJVelD_? zLeRL+1E?G?xU2b{jE#y1(juY-sV*M@&?i|nN(S^v(&qqulE~~cbQ8eN8l_)5Yo3{% zWgy=os>scu3^rxIMymmX5{GDk$5!hb%o^Xg2H$j5(& z)b^M;yGRQn)^H>ij|{S9MT7Z-@SIu0?M>{n?-bLbMu{v;vh-yP_6xKGiz^fL{f9DX zYhF%@i3OaGf$kqtRN-taaQBZ^(h<=8qfk99D1XlU^YG>eUPvAdGW(Vbmek$8q3aIy z81q2h-Q@qu*f1OfSU-xfM(@1=Ye*yEU^_rV27omro73_8-C-^NXbpBIht3z@xS|6n zA$TiMIwL3q;CQISQ@>+}IPG{uFdPwaUh5x)oML6{ZBAzkl1`6c5nyfWt*jZDDe%6K z;QvXLys^C?R>{?oZf9?bF=`Zz1}r{INt4Q$bK$5wlSV{a-PgLlE@2gB6h2c2nul z3`HyGw(RJ+Bqc^LVlsM3o%v|tj?)5IeMkkyl5Qs97j9~o$;0ac(|}t%2`Xow3sWP| zqpcXk66tCiVQ*Do6~Ijwl!>bXh7NNFY`?foS$9BH=N&fj;F|p_W-|?r*-R69SNp+I5k+<*xS6N|9N1rz5R68 zhybv+)0KH~7VoFw~8PNoBLlFDS&BoZtqe{zc$$4`|3a#913lQ`Fy zp};vk*C4LL&Di4TnzzST^pIZi^4R+sSwtgV?kBs9uOpt~opzh1QaCj?d`x$5 za)10PJ_wlHcA!|6s~09Vt7`9yOai`nY7G<@9Zk zck8~i)y!A&tO;Q%dEpfhbyRwzU05^Eq+|p0? zZF_Ih;gYxp6;7{SZ@^iU@c!)!8>Y^lq}bG03u31js5K37|bifXAzeSuP z3P$kl%M_b)m@jn@r?=M> zr_zt_ha}xv48cTFRNa$%Vf+vDqfIaZ|%Qv6wCFBf{mM(<6QC60XWm2I`=Bvl?jtB58Gt z;|>tXbaK!%zb9Ya2<~l)Ep6I9 z`S5nGVNh#JOd6%`{RE^b`?oLh>Re>Gp7H*8VYD}}LT8+&Dm!wSL63cu zOt^s_fw=cs{E|v8m9P+RQfZ3k-8AyoU#U0vk8xMV z7m{-iPZg(d0HN(Ccq4FWd78-m39YB^Rh|dF|A;;h3$&K!&4OKS9t?UnQK53t4>+&2 zR}0k~wOh%toyt3Rw1pupQpQEqJCs=@S)@aD-x9CFLTy9pDBl(x9yp3VhECzdNkDs> z4PJ^!5K*W!QCpCq)#56q^Je>GE{|RxI~1wI*9JBny@P101RiKC?{|71g5G;qob1q4 z;SoezAs#KvaQ-++-fT~!4#8oylAfK2DD#8*aG9j&JQztPQf-S1+7(WvEBL<=#75#b z8icmC9eX^Jm4*y)>G5qsH5RR)*K$JnGJ6NX@zfBGI`hSXS3R&u`%?*KUsB0>BhxaX z;ikTT7NUe8!mMek@ECF_$jqO;UsYolE2?V@US$M6`e9rLhu9^AMD1$9Y%*0}5#$L5@Xk(UL#)8FA1Di{Ju$ zEqerq2#197z0=hOMc||xslwlYlUn>xZBTP9|7Nbqwo*L{by7RV=KnsTgzHe=I!2Ar z1StMl9-V-qW@y0P!2i%Sypc*a%qD&iLv0)U5=INdIy1c}g?!|2QIPb2{RV7F~UxW(0kB%=S7Y=I2ELn zqj>|0f7O`=R1`%N*1{AD+Z(=PSd>r37nm0wXZ>L8!X}r~!dyux-9Bde1y19$%^vGO zb$Ub|*DiIb(*719ZE%G`8SC^(39`4>;U>n2fhq046IJ{B?L)TZQvqkar3x#{rVW||z(>$-CWNRh>Ecs;xz>?#uxE!%}5MA=i5)bJ}jz0oS za{L)!lH<<+lN^5tn0)A?`A>mKj^6~6_umg--S`)nyuZc3&mRDj_t$(#NB$<5l&~iM zWo^TxF{&>sUe3MxRY)GO#_tSI;`(w zuU8(bH%G3IAfCP_5c#~lHpn)nmAogOE-WJQdF5mO8>7rNR+Y93$%1g}u+!3kHkl$~ zBB=WA&tb}lAV6v=ai}@QmapT~bX=e z45YPQ^~jX=Xa1DIkoD-6AzC48Gz91CO`Cv^0`T(8ty3G*~ZKgK~`(m=0yrMs{qQIPMeH!mgzTp5{*Q<8)m=bfo!WO*}t z-bRVdrkQpPQS^OGuNTnE3I8H@>Lr~zBxR(b#~<+Z=cJD#lWDp)dj*izUgf_T^FS9) zi5j?$u4*z5NGQ)Gx;4nQOqjWO_jdF3;*ukm$Xs2>2n(-kmV3Zn8&dB{_ZP05gr;EM z*){)GW%~JXH5V!o9RjV@cf8qRT&V3eluqg%%j@;Q^hlFD0=9B|Nj8*e=|@~e&u^)w zO^>qFz8?U1HQ_H*(1U1U5eW_=*I%Z7eBt#sSe>_I*lCv=78mDPVg81f9S{`}C zvy<-UBLvH^DMS^)nY|P242X|h+jYwNKhEXm*DAdC2HR|qW zF5GPHhKz=F*f|7HM{M9P3_L<5b0TPYZl*aIiu>iy7wHM*BbHy>(EOfB*KqOE*Zj zsFZYK4o)hFUF=jxE#SGqKa_=HWq@iYNUBr} z@^gy@VXDO_Z8TUWn$zfz4m~%e(doQQLfzCUP54#P!CpN{qocf%yw=Iy|6;}Dup1d- zg|GJ&Ung4xoeGuPml(P1Rb7$&5PKUtk8^)r?es}4YOj5u6^+isC&IEZ?~{!mvn}%Z5!30 zIdMNJkRHl3M4+1LVYSb*i-AdVOC;wI}m8~ShY)6 z*>TFb`SsSIC?cNVr9Up4HCd0yWFHO~o)i4qOM+YqJdfr>Vj1k@KpeR|tVsdDBYnl? zJt%OBZ=25^FWDcKKPV&r3LMG#ci>2_zXL~d{Utc^q0c`5HW~ScIFj=p9C?2Q0rK&F ziQU~kfFn8ohaHmae;E4nFC1x(ErB1%#c*&vLw?_D^IJxS-S^roge|J3B@YU+q!@}> z$wQSeimLBWU{~3R@UxPf1aCAwZ8)#Hygv86Uy9ts!X+Mb>k7GbraOvdUEF;=IPti zYtx38+9!u6tG&V0|LwT>p)L~m-otXTs*ez&$MK|iZDUyCBU_|cdXaFp&*&_}Hht~X zsWY+9kayI}>J%kO3dLTWsJ*BpvX9n7-#6?9zQgf+?09U76}=y0K+A&9LUeR=czSi? zDAM!PQnos;#Z!ZBZNm0wv)<`o_Q`u@KuHz{Sm2<-6lxBjyE*=zZUagZBvr%nbYU1u z$E=TghReF{#r_1$cg_$&qrhXwu$pB_%rrVWxeJYs2TgHvC@YSP1m*zD)-kh6=G`*}zdk$*n zJXc32eXNAizng7RZp!#f+;OHgE zZ|sgxWjnYIx8BZU@#(WKFYjJxMT8yK7!OnxJYTBrete6o<9ftMH~i*Ndw?#NG7koM zfqR)dfm;essl$v6CK~d1S*nS%sQyf%JG;nt0aX*<02t|q5#W$qD@ARJZ%WLvaLwOOi<$*{ zU3IK~o?xdGzcs_#sEmlCPB*hL>)xwaQ`c~wTaCFD&O$C)k%~36C z=nEfW33t=Qkf1Vl|803ucnh*)7+tm$(>poNM+r)f``Vq)Np>t>x{_h>s#aE6CBLUc z->s=d=?KzzR;3)VLHv}QD4Grw$c^4S{h@wt;?qk|+sPuf5djcbRE^`g@p2BUpQYbT zhZnu&);6Dg^;72|a>;(bQ@V&jD0J4`tsk@FIsJ|jn_~;cv&D3>V8%PQ4UOb8AVIRB zlzfQSh{6I*etbrw1WKHj$G|%Bs;Dm=c6kwdUHe2_0ih$7=s- z3xXHgB3ltfi3qc@hk!QaMy>lbFOw$9j)&_ihsOd~Uf>9FLl=z z?n)H7O1hU{&h>Muwn-jRl3Wi_k3V*y{HJ(rxE^{_{^PU!kMY`Y{T)D(>n{P45B)X& zT}qPc4}s+U>%*OL{0B(hFR{D(4*<#gV?F>RIhg)zu>D{5ZS$BfTR}-H+TKvGb0T)I zj>VqlN)7p_qh&y`jWnMG>bAqT#V*DGjS_sxZ_Q?0zsQWBSC;65!ltR4?YvJed>qc} z*>8WHPu~u$1;esECQZk6YZdmNSt!Q?!pND*{ud&-(5nCI=m!!=4PuMm&XA%#9WMXM zi^hRim;VikxQRH;5owR-6#U*qRrE2N|qR4ylp)XN6pDD7=EBV1x*?;IeYh!xLFkjKA z*~s7~GORNm(ibp$tXSb99-c^l;&6MKzwa0`*8hd@V^1xhBfIlwS4JM^O~!~Yb>pWX zlwvo=xj%&%(l0HwM?z>z#GtNbc|~KhRG)MVk+-=-ry>(c54jG=MgZ}V1O*ZA(Oe~x zy$X?@^fo9&BaVFatv64T9>K?ng4%Q<)3T|ersvKXH(?ZA_>}$f`4gbwqNnMIW<*f@ zOrs%_Zp$Mblw`~-rBVDopts)oyE_8Q3!iRsu^QQ`s9`!Y|#hq`x<>DjMG`g=UgnCnqfBL>0 zP*$H+!&g`-FLN;vK_R5dphzR2{kU7`D{0q3J<)j@7`?I(`*4Hm;#6)U zpxYCx&GFnNi1Qli#bwO%i0c`rZOvwBnzIp)ckJ7kn^wo9WF^Yt*GaL5J{`&H}rGgmX>A_?qKBRQyH4{K)=-2vP2DwQx+mvrm+=E zp&LbUYEMpo;couGmgiIaY+aE?+e;-7Xnegbb&Gr1%_`JdDkHSFx^9>J@o#aoh0NmK zzbXeR5&zvpBc=`@grznw5pj2RlWD(=!0{F%}o5x!F0v#sop{4 zBBn%wuZE%19rH!bULQz+6nr>g>4)9|%{HqwzuuR3Rrxv6GNgOn?~@EEp~ub!?Ar(U zh#7CT&psipVGe$VvMFqUanSNbWH(VEMT)?V2!Wirf9X1EDPXP2-&ED(yR+kqdQt7b3Z~UnAQ zX$W!Tx5F0xM>UgQ2RhHj$v;OtOXFR74?? z_41X9otJDbrJ$guPWjs+|EKC97=?KRqvNB?1q!mH7HC3TCY#Icp_8KJswH`b?7_X3 zIvF|4UsfhW*yppFnR9xQMpcP2_!ctX69%b@Sq?)L_JzvMU+XCZ0cny=cH7nb&pCGb zyJ{bUNj7!{AJmh71)1dfJIEyW-$5q1{}M9!kZk_9>B&DNlU)Ch$@?n^(2@5`?C$mf zGRgHnk;y-7xB0IDw+2V2dC1yvQ$j)j47{zx$1!4wQTsWG3a6E&wf(w96M5OjCrJrY zq2rN@K40cl(|LZE+uT{V@5^l#um6=M30Sx9%5939(q9ARHg@U)3*}^G_tx$ID!2Ku zlkmITCO$>h$ts1Zzq0@`I@i2zYMqPL)WwhP&0QmZ$*^W!cUk)J*8RuYCn`Jy$94ot z$i%7bRepcSGE0r&1UZ_ZEn&h8^MqlS&ce&=!mQLmXV;&`he&UGfr}wRfnWu?$pz_)rET;5X zA^O(Iyv2_k3<(Z#9%0%N;Ry>|AQ!2_OMYJ0> z<>rZJ`{1D8^(3MzBs)Jxe(J9)A(Xh8ao270(X1x40Xo+yvSH3dO)KraaKcASM?CF! zu`&qW)ZyoQ^9#_3b4JS>CW7kHD8^Z0(x%}s#-s<5(@qN$*4sE(IEoyS;xsX-l97)7 zE=fD46QIYQ=_aARb9lGa#Z?mBm0@sW-CT)p)w*&N%iI>RsT_IIswPM&UG1VtTM?3@ z5*vjLp1s>4|JnNHTV;{V09(RMIll{;Y&d895v~QLs3Y_44V;@7?YIFpgj|(T+cbc> z{;X9&Ld!6>wbPQcfg~?%%Q1!W zpJtYnY9tYHNS3yZ!B@sF^UY(OdQ*}UKFVCC4PI{58$>($J{cOg%adefe4=X#ZOCKQ z_-Tk={>3i6U&jh*GP0_aN0XB$l^vClhcG3vam9zQ?lvzP9b1nWO>p!x#|3-ZJ^Nk# zuDhm0H?rtQ-(*fHK8I9nSI64UdzgZH-P1YNcg?veV>KWv_3G$}n*PnEGFv_qRE-@i~e-@ zMPE+Z2n%gxrl9h&MMI(^#HwTd%yQV=OoTEf*+7d%yiT?b4bu;_mfaI8Y#nBR>xNi_ z5i9QrLMio-d%4G~em4|aAmF+oka`v<50u*s8NuZ~QFF%0?mxKfX$+KOw}-it3rJlNy>;3pCG~q7hYolDsCu zHmH%?!RBy&duwcp=tF5vqIesH)pFLK+Qa2o%BfK;^pse0xm4Z(TeVGjTIi$!{*$;AoxvD(Q9{FKv}E2^vU6hGDAv zkwE$@_%`qES%u*OBN%8686zM5#1}-F+3W> zcI4c5C3ePHu0O6-qrKI-eB63m??VO4zme8@xJ0$i=F&RJ|8jzOQ=+%%DkR%-(f5&y z@5Y+VZMsf}J`ynJUQf+^nyucD-oO2opvV zfS-JYo-!}+>1rok;KpWOz&7LZ^=-w+YXZWq4cn&6BU}H8B3zY2Qkx05K!b_kCiIl0 zmhYepXlu7;7dsnyHa&K)eyOc-)p^0R5=9Ud%A7NOO?l- zvyV`y#w+nhXL>UREVJ3vDfv4M1Q#30a)UI+1222(!toV}s*eu$(684+#|#Z4n&hnB zjcT09yS1e)4HcXD8=NsSV`QmuSdtO{9uEy76YOIk(++q)nqSWVC^i>MRE9K-jEZ(z5 zUzkr;!;im`DfUcfWy4DF)*pu^g_RWbeWFv28nHbJ@_-((nnvx|-)G%OL5H=duL$j? zPzZLWqchDbWwOYh*2ct1eHUyiaL#MW<4@9xPj5u+7TDp+qGvLB%V(LE-2ZaDEl1uv z6I&N0SxtyMp5P>&w7^%+ZoJ?m+-(AD?39wG+(nY-+9=aPB;qDM+5Nq1BL6UZA>7BH zM})X2(nN&kf*(KFxW@^wJ42=H6_#lpw&Zg14viX!=xgi<(!}gMMg1(dFP`%`Efh1> zq{)k+j`LXgbhfHBv<0UGiG%Jkp2LqDl6Ibq9JiFP9Tn97dF8!h!f`Bn-*(5>;rZDZ z(zlZ@NvsnvnTx*sh!b66VkGk*S9~#*YFtZ{+I&vUjgdY6+(T4If}C55JAsQD6GuTk z_-V?zTJ(97v{XAr><{rTQq->auEbSyd(0hH{xn(cS{HUd2kMm_x4ITSQU}PXBB5)# z?iYrQ;hfu8>~?%e_{L62?v5T}g@V`}C?}M!*KOgd(_rGqZkFIGFv{k(F29o!y$40S zY(j-O{KY+`c~pgDp1~r9kYhw^evH;xQ503;qrIXiLVw_w$Pn$l9DHJ@{?7PyUD;fo z%O{rnor<}7dk1c+qg7DSV#3eSj1DfP=w8Iv#dMe-`XAucGROP~G^jD;CEa^g_`J3c zXVI!1Oddpwq2LGEpB03hm0F5W51Z{g0rRk9YIy=ZHdqK4__}!TOx`PFucfoomB-gR?m~iw4N%ZH_*-eHC^Ic)NN3jN2sxBbN!-|fO2fm!h)=`9 zSu@cXcs^o8;HoG*=GI!ogMeR&sr&iiK*0H#0txw)>)n2SzrO7jwApW+Qy4YD*vF+m zx*mG@G~sdUGc4JG-cabbEhec|xD_2Bg`y}Jn?Ude2`!4f2Yy?w9PHSH(e|tX$S=Xg z0F=;3vAIil0FR)pioeX>1|kg)Ra~k*wA}9y}&n6k9H$w)*iv_o=yp4>1IQ|6U z%|9&$Y7Q$*B!m-6MFt<*$cUle_R7Nq09zqJYJwmy=YG+y1bEPK%>W1lC(gHC6=mqp z-O?vdISR>*^aDvB;y^EdoqSp_bwS}(_y!a+NpttBCj3D*S;ow{OD9I4tCA9Ea1BGP z6`FaIGYx{^Op!1M4-Brre|P;()tLr~`Rrh(s?7L%m@Gf-HT;)-d%Xu0;$HzAx&I2_ z$j0>mG!mxnG z0`4`0nwI$+&uUNOLfALm+a?PlnqlF=>5r)qMs~6qa1W}giT-G&5lnpoOeJ2(LH6};_S5tPe zAvTc3<1Wc7kCjRkAY^iZPD?LduzirK~ADS3FDg`@H+)cC^=+0ESI?`^1k5XH4eckmVP16mL_s}GDnT~ z0@~A=K(>RL?;sh^qeP^Mib3Z#uUgJc7?$x&1*}4^!}bV8xyQu}Nc6#hX7VP9*IZmL zRDCI+-2F`V`UtT+P>aRx;4=X3rl zH6ggtFjT_TnI`gJ(Rebq=hQSr3S=_WloSRO&>7A~(T#B^Z)w$7mM@GUj@L+8a_IR~ z&!7=>r=CE^?j*%VTQw62(y8`Aq{*P!5KQTNrB|R3ylHV13L*QGDiHC`05I<(tc=Ae zv(e>`SYRi<>2+{Tl`Sg{!6OG6Qo;Hu8;=V_UwXm8EgJL+DD;d{!;Ysde5lLmsnDoQ zr1N2mmadqOyV#yoxP{;twTZruZsiojOP50UreO6*gZ312U4;PrxV9fbMSS@pTyTe6 z(z*8HG@wl<&gBB4_VKH%(A*1>Fm$r`BCj^hL$GG#{7t!9!#sA$o_^hsR_vomb)VH+ zzZw^%2h<`P)8D`o*_i$cp2)`ZSMWqOroV(IKJ*di-=r4VnEs3>{(gP9Q-{BK;_oGP zcmMz7iNBBekXrm>|MeONM$47Dc@(9^`#ZJxzqZw+bnw|gT!9d3eJR|&CwzB$(G>*f z#UEtcKwS;1zOi-NZIjsT3LDZU&or->&f>MrkihNr58snR3)rFj;NHo_a-cE$d}ngx zoE9Zp3u9R8i|h`}n=}1=fwG&6I(P_a#UgRL9(%nFt8U5ou`5EWs7Hi-pJ4+wJ#H|6 zQ`9tPlS$si+~1f=F0;+^T}^vion%ue2u08^Y<$&5hoN)U_1$#)zVR@cA73^RH62FV zEap+Q2|sE14V#yasgsGNY;jN}ur~>+|BAx7!`4HDq-cR|IMe zZJe9K^KRX$cwOT50>JC7s6-UV%;s8P5}+Bo{u|d70pHO}f^-Bp#gZLWs*>3CFE;|X z@oHbTr@stk*R8EhRQDeU<@HfE<{9Qbs}D<8K3zD~j3=}FlwaTL$KwNIpfeG}yE0l4 zWO@c7FS=>52cn`53wYhl&m*UFhHXcB9%Qb< zKe-HXo-mti4LVf&KQ*yY0pwz3@)(8bISUdGRgG%NT?AyqYU0xVnW7#IHc1f>0cm@2 z!JiY7Hk4H@CDE$C!Z4Eey^$+RFpz$Awf>LR`?)caMNA6p+!Bk z?1sWkBU1m>a66hN2hFQwKE_0|{$g)rszR@A)9R;g!hv*k%CI^Nsj81snTGL9ca@0f z#SMaZORAe`3)SH5@|8GWMtFSu^woqJDCMKUlp2fo{tR?uH`Vari9bX0Nv#!6p27_s zBU!Vs3%@v4@uW_!??AAJQkTk5g1QcS4z|!9<573E9B_ad$HP?8N(S;DF%4jJ;~yz> z_B?Y?A190qV}_FYncVIC1)nt>#F|we-Uby88P}>=R8VN;d4>^vc0}MuskKMvGr-F{ zCykRhVkr2sme6v?2`RWA8hfUy#c$jLO*;-AL9dusa2<>`0!=-QM8$_I4}mu@)(nCl zZPAIQq_sxxhGvphC0(XJ1kK^))>YeW4uRyB`=M1xGklrRGlG-*wzEGGEr%g2ElSno z4?{D(VHkim&kyK4BmauRlyN<5wzbdS3C;BEXFoJu8#F$m2-SXA?DRKqkKQHa0yhu3 zL0uNe91UMp;sAP~%W6|pDDLM?N?IR#91JxiH++<^!V#p993^VK4jK=QgXZFeH}Fb& zV{Reu!G;EjG9f@~yHM)G|J2n48dQpdevM2Ffu(4aTh-14;k(m9D-b|#x=|ovRI$*! zm|%nJsm;-q!t>jCM~3+u?TO1F6_a0`m2`K8&Z)c0$*+e>}1+~ln@X~R${ko~CTBhlhr;%XHF$Z~BzNCj^B5Jhmu zY%#|y;zR7>kB4~wA-)(krib2h|M)EbQ+zRO%zp<~Wd1v_BHKfM&3~Iv{4=b` z#`GI2{=R|$fq1{f?r#52tjNanKkQ><=K51#3=tMuNDKc=ayjRrsctW-=9e3G`ZiNk?$yJ*n-I-=uhIpuEd+*)#ZwIpzB z_1|-6*t@xN{pB_=ccy{w&<<;K&?DQrSlRE~I4{=*nS&RZ-h8sP)nWBPUaQCK9b11k z^Gd}uhh?$zb@|VuC;2RcxYNFDZmqUHEn&M)I~lZ|lS7Rhlr?=%MO0X$E>9r`7wz;= zIqWtkB5;l|8yC@$e}6mdk(9PEN7zd8S-_DMlf8NbM}iF5jlk|836(O2uc``g#&C+X ze9Xa$L8@MVX4C}CowZHZZss314RB<~g|P4Ql=2B1^$84tJ$(eq(@@{^_09+)C~c9Q z2!gsTTU!00(bUbuxXxl6-cpMxjCBqTwyCbBIuS`vx^~KbNc|~xpVdRW%r-l2zt8m( zMdIqTB-b{*!fUE^l|7q?!#ooa%#SX1NQG%t4$c-n*yB9dDc#^6y zp4&2F93Q)JegyHB>v94Pn3O@z$4KL*uT*gp1WCq?Uoo?mCQ171*-5H=^Wv?!`nbtF zw!L?;ZcZTfkrtcdbAxQrt=Sh|_BhlINN9Saa9<-no17ro-P{?lzX;i_&QvcL%WF&& zla<6$Y+pP^mZh~kt^YFkspk6Bp)8dBGaEsskDshgit~KTf0UZ_P9n8P4JSUkbbT&qfx|a^u-BZjxaBwV`b)d*bL8x|^!k#gG;XAWMJp+N zH!+j8_Ku6$-vm*Fdq!WuK6zzKy{@v9@mWcbgeX)c{^#fBSzRS04@N*Gs(Dq4v>K(4 z+rE1Qs6_DOM2GLZZc7S_$N=TA*b`$q#n+#!oJ4fP^BUZ8E0NvwqSc>2Ugsk(QzFO4 zn}Z=B!g*F*-C={P;pFOY8@*rFONZ{tJ&l zI+_9~20VsP1R#sYli9UcDD*3H{%@72LM0$H1kY9UW$(u4cNPz(lmn(`I^cfMb)d%+ z|Md7*ML|ST2|Y|U&f1ar;}DX<$TD+1WP~;YQapO;Wg&82zVkFpRIBLP(mM?Hu9$(>?@yiqh1EJ>3M8J(ZNzMH8 zMBvJhx9~b4XXBZmpfQ(B&|ci(7Q?DH2%1NYU!?d73j6LMVpl+68<0B(AI;=6b77Cl z$Pc5z8cQNXBP~%du*)KP+QGiZL#Xpqs>6XX5CUc2NkqfDv9qXkHwYLz!`XYFv~_X7 zj*YW!&oY665?q)-SlSdur-bFuOxmg_%j^aq+*kymRVzObz7H*w!XwDpECNJ~F&3T| z3uIuleX?~lK5~2IRp$Atp0dlZh~?LcPOtBdFdYCB1>gYE;C&D~gP)P|$_kA&%qn#0{SP5AeAbw-t&)_G6gOXUH)($~} zOC?3IkBaU|^dET#yIWm_hP^CfJ&!V4x2>W8s#XnzVt_*WY{=`}su)#C9WeSyE2WlF z*_Ri7_BPYRhU+1f$oyB}MCQK(Co=yXIFb49z=>=RiQ#{jN@V^+oOu8GaHk6Y!HM@v z?C$;pIPw0N58=c=R*AoHV!>zIaRV%1d!pil+Y|XD&;a{1N98W4%TP=jH~8ejleL+_fFL@Z2ebR$Twe(cb#9`vr9UR+bQ2H)4Agd<0tcEbMZ(K6$juM#CzNc+Rv`?BF$+D`OY7vy^<5 z&MENK(9SWtEb9a?JECO!}vx^D7Q-HR}|_XSM@|y!_Wb4LT-O zEY%yToeR*sxJMReT_^KwFJNJw^~{KF<&1t9!~$dQTpppFfyxeX!DrR(fKJTk?T}Sk zX0aS@?@_8>bS#HcXqAGqd}fU7$re$`Moerr2&oxqb*U)7Pi_>m!e82aZNx$s`1) z@P#uld%jm59Z8K9WZ^4ds^5q`dnhE7(a;wZ@;QbYBG0GmMux-^7e-;zbo3=7E4lqq{mlE zMmE*pI%%cLpdr)Jy>KK=>nx-Otp@X_T(45?dS`MeX#t+dQ&QbXdpCU+&1EHa`98Vt zp&m##bU%G&I%5W=&%NVkI)o8i7q(+Wk|p#g*)Mt~+VPKM3(pkT>;mDJvCBjSDWHDh zVS&f%vRulz(o1_`B$gz8`=p;j6rFWR1yPCKb$J7;NPP_)d&(EKUBHU_8e}T2?+(Fv z4a%)GZ_3Q{aUmt+<>o^doK##ZIf`9EO>piHHXpvaut+s7uxKB^!$yb$Q!AKUk4f%O zsHnn`iI%c};=o+|&>1?ksizve&~T736B0PVD{;x>l3YGq=r%f40!V!u$b2bsZn))x zK9oI@I$Q<|=sJu5#CIwqm%dvMY6&^q)CxIUAOMMvxe$Q%V(n+rx*5SJ=B+0LjZKV9 zpuzAK77#5HNW8-y?p(INm=)CiB;O1qT(#7d0sDSoQ2$+)QZ(qtrfkhDrvGKAav=mt z@7^Dc14d>wVj{?%zMuzHtC&E2g~Bor z3Mq@ZP@QBXAzypMOfa1vijE_GEZfl)qd z!Hm%~b+M^308gYNI1ZT$F!Fdv5_;qC^Wjt!_w&dIT6s;ILR@8g4WSZqX|U{ZWd!5b z77x##kJ};Xa{emeu#%%xX+_4mh25;SK6+3u{uNY_`R|~LEDv$0KZd9ODRve%mWPDY zAD`xbjGcw;PSX9i{Q9@rS=gBWkSa3&Lly6@AV4SHFR{DZ2dLuxG5`Ak|5uI7pHsyJ zVElYguCUWnwgOPae{EI-FBOpz;>|0g)EwpBwtNXAb~G!MO`R+QKYeR1`OW?->#vM% zxQZ?XT}N2V z&mA^B^Dj*OXN~1ctmDfDhThvTY;28`0eFXT6nKk>sy0=C^E#X_G*EqZjYFqm_3JB z49O7w@OYW^baSn8euz&#YS^H+oN|D=UpKQtv8TA;r!VD@va%*4O2MJJKD8#Ee;&?q zh)G^E1^josQ_Ap|H(%QN=PxO&yx0FL>04~iM}(elmqjN19M$9wET-siJC)&c4`IG! z`OfS8dZEiL8Hw{9N4~&tb0(*If2Ln>_o}x=M0pem;&9}FOapZ~GIlIQv)4!+&oAwo zv98uipN$&(Ir_^a6^0X-q%$e8f&Knd(N5DZ(FlX8^^+4lKibYX-NXH zEs%6pLJ}SZUo=A6clnAr`e9qI_r!1YK4XZNkdf!0__I_iLV+m%{!<{|tVC$aT8x*P-7u!bsxldd zP`$k{u~vaG?RX;~ECayJf;F1y5>094_%09;V0JP9vxDMcE0~&}KKTIZweNvqwZZbYdwD<{{yG5VF*3#-myg7^M{lzJN>c z+>p2}3#%WTh5%QQd3q-lsoNORciw=eE)--`gM?F&U@A({#n1&-d+#3N8xSo7G)0uj zyQ;_p;W|O#M`}CeYZEl95XEBT(Fo-7&->T%=%C%Is^QC4_DpqFLC;*H54TCB-!E_JhHo{)uWsCESg>Iau12gR z1&-Hu5l%X8!7e9GA0ASPEPn-6WcfR&BFo=F6p2t(j;5$_#t1k++MLMqm&jCHhEnob4R_)vP$-r-#S;KeLAeLF^I7jgo{JjkY>Uy~8mfjt(Ru zwsC>t*ICuNt3WPeUhx{B6G<%Cs~LguGnQMD_2Wd;tbsI*MY<0OO;46|#))DOtG8ne znyi@(>jrx}Cl7vha%j^kTg|Z#^K}>^rf)z5T9eF1(Aoo-IWU^B=LUE&1S{ho4=;m& z`szn__0@Me5yRFLTo(O}*qV-gp5Dz0=Ep6j-yFhh2Us$O5f#1{k(F%k#Ery;Ha8%4 z0~j6l)^mSNLBMC=M!$fva|?K0jsWKy{oWr7pR?YTZ2)keXY^tzGj zIQMqIm~1n&nrRc?XxH@B3RGV>0$UX04=LgXFvvDPZ5W!IyLe=+ut;*{EavLustSIX zpLgdJ*^c_@S_4d<39=DB=zrW&4T3U!iTP1^5mB$H8(}H?RPakib!+C=$ASQq zI3#p;*ZpEZBW~WeR7?M)S%1?K{6#f1U{$!DOr+J&`0O*F5vNjh=dJ}~xMOd%53s#9 zmmxrsH&=ODeLr%u!N~T4%rss=HVcb9!Z~`)(DhyRPGCe`lWI;D*F!5d^PJaJ} zu5{u=%>Lcgx7DUH{(g_*k>J@AfGJLoyXxQrjuzK3!jmeK$~>I4ZS(Me9u;`%h8Ml^UatPga*N0B$Xv={F4=p9o;`y|5xdE~6iAowHj(`0n9*AafSa0=;Qw7&y%Ma1a996G;f$0&Icpi9N;OLA5xz*Qjj3_Qd9d3oQ+h_*W?? z70e7zX2g4#IMM~4QTR#B)9j37pg#=oPAf0!Jeq8>;cn2(RB%@C?J6GBV0hU*@VwWE zk_eF3N55b|3YE@0&DjuUoe~tR-LJd5NETSMSZxL+Vi=`W(satXP+8M7caE6}Ww4Eg zq|xWLO*5!7G0k8Eb6N8_l+nCx6;WX1OaaC42H~^e!g;G&R3`Q7rB-8U!k7^wg|3iW z5R1QK#DnVauV9EQe+NTk{W};U>tDhUANol1Z&QbV$PiinVTkuv5TFY0m)PCy0}PSn zf7qGG`hRI*DOj`}CqwM~UlO~4L>vhq5l2@aNW|fj7#dysY-2bJe%mb-Pk{!AL;DM{ zAn_jGdJOb-2tp?6P-pMZ;^X0)%kzU z$xe1Da)7jvsT8p9w4Hy^ZEPG3m=rK`Ql&_FZ8XFQwfm1QFY3%%m;X zEdn~2nq4IpQ*39TcP3tQfaBSfln)+;1sFP;$1#;=g^;oDT&_s%gLPKuVRp?9Ujc7LOos zq$7>FzQXR44gp(8Y7I&eZDfv>yHV2?kjgLG?#-HVix9UaKFzLl4eS&rVyxb|P3COo}sZ&cG7RnuR zf;EGBCz>4ys!$&}M|ks_8&^bbM~0|A6(fq9T=9w-GM%nH%7oLG2#>My652r@?$GIW zRBoT<@@el%nme*VN;tNtjb8WA`)YPYdc)8_e4wu}3j6F0qI3q(^`ddt^#beE#9`xr zCQFD``??T9K$3~?YU-1E^drFN#m{AjLSg^6dw}oxO$O-lQSM0%zKy2=rOabvctKi~ z!RJ#LvHG~u!&d2ZG&AOnIZS;+5zp@i&tx#KQcXW$h7tr31UtF`gJ&s!b0Gm>@O-_J zqQb&cSHM7+xq1wH_4EbjeD^HwbPI|rc$31j7H#aS_l9KzV0#W!s0^tL-F>z%VK_9| zeL$Iy#7v<$ zEu29fkF~_2>P%7gLD|L-iR<_EeXoQ-y3V`7vth!SUt~a4+!0BFI5b*|_Gu5@6i(0z zj*%ymxM98JQ|vwMCkR}Dv?2-wZ}z)U{2cWzFhV2dJ+S>kBLbArrbkbV5%9&PDG;1n z52g>TUaRX_=4L_BKQ13)4MOrdQ$tk800(1Fvhjnzzv z5jm|8X&UG;xPtfCS65PK6%Z!}b(2BNWg71HS!#WLQfS2K#G~zD8BYPfGqC~ScP3`4 z3|5MFZt8sspIAu4eTe%RjP*iwy0QM`43uwA0Z+pXs6=8W?-A_5zORqp%8D)=)7Wpy zp)rM)Nuwp+x4hV)YgnxIn;m^`5kzBp)+mKmB8a9zarMdFT1hX47=NQx(oJp{<^5B( zOH*S;+rtk;DCur9xt$~l=-+U_O5Xs(a+|dFtMGt+n9t)8)ONI3Oe4Ps&m0`IAhd)3 z8a&U;Flky%y_SU}6|sQr{1EMx!s=8H|9kN4$&9{ChCo7|`WDXKVH+7^c|jAR%QsB{ zPPJJxEJC~=JYRA!cpN_V5x#pS5i6h&m$hh}feb}r!GzmYA2_zQWfmyg2<*wGa+v0k zc(nAOba;$tL8Fj3kU_?}5K{RfW-DN3!TxP#xj=!ui$>|{@brK(P>*vtyZzduHzc({ zOJa39BBOeKYgTzn#r^e6Kts_%(R}`fPy5R|uQW&$+zqn-nA?Mrk@X>J@y8>){}eL| z>qGCpe|(nzF=iIlzXK?;{(l3C?A#0-%uF1tWXv4w4D8%ozz#fSb`}O!P8JRp-8eGs4!880vJ1Hg~`o&gIPIa}D-{{D_K8KbI_^_Tyo!bS7Xf_^uCrK&xd{d>L7)IZCbf>%1Mz&1u(NaXaw4->gO8)oj z;IR4DH@A0woZ_#(&7+gO=ksCn`pzaYF7+QTw)Z>2tFzRe!>ko0#*U%gHeA^sT@{O4 zEt+FpHK9#U%9aGxd%Q+AZFuQ3o!P1_pg@rRwwDcbIr2$8(uSA4ud91RQ;TX9&UrroW)_fw!eqIcb^1_S{&)5ZccZV zpI*7?HnH1BMtPNpkHAi?4vh|DBR1qF@6mIg1j&yd+yg11_h?ARZx~FKw#6!#v(3rO zRu+(g;VCEkP9RrJ|LI$#|A;w4@XOMvxLTyP5sK2Y8=P~_CmlU(xdW%`Qw2t=-P$;B z*a1V%+sJsfW8!rJEIdusY)|gItoMtn(f2`+abwpL$Qvp1Z))@tyH}NzgHP$`DDyrr z6-@8Yhae62*3FLaHOb^xuO;}K(5;s#XfUp+s$C2CZxj{^mp0d3s5dEwGUOE(ILp$p zexu(i@D+M|h^EPWi8ppyrv}a-kGPf1w2+RtNlyM4Q%A%fUfTeF8T#lur87Bk#MQp6 zSpet4gy#)OdN<4m7~;p`Zm(q@zfR6Z#{Ktn){kgx0Y2 zh+oBsKp135OI)fH1N|lLOcyaIuQo4&W_O?_JCntJCU+s1cb$$$cTU@#)qOmE=Jja1 z>GMZKfvSKbC)yo6_AF%X)re5>V&a&mdfzLVQc(6w>;Tc|{MZxR{4mknLZclZ3{ok2 z8VG}Ae*PSC>bT9>y5F z(4yLPObxmjC|Vo%a)=>TtyX_v*wgPhULB4yIz=8;W(SRQ zN{Arc-7O%32uQay2nd3-G)N=TZ6GP#EukoU3(on@@x0f2?|CoB`i>QB0P-HZoSiv@jXYK39 z6Dd1IQwchpp%=j*&!yZ5}&HTXeZtWweqmmow*mKKzatTY|xQZNyZ_9hl`T9)6u z1Oim*@fDw4bTI@(?z{(xlp2a3wd}k(Sj6tEVId2lva}fKU0d6^CxRYLCL)1g!IJ68 zL-cVxg|%+*Q1uE4{@6!6UTBG%TO^_7!0S5{SrTypD0)cBRtVEBQzwl!ZC+oSqR;r1uSPHJUFD3TQ zEpBK@X!5!7+{dSO{s1i>u4(dVhET-_SLyVP;mtg`DjKIrRB6vR?*1&?Yt!=P$*lUJ zIfCDC?tRVIlb8`WbzTV}YotQ=x7FQ8kBE{HqL>idSiFe=Bg4uSs3k{%sxPa>@Rg7y zbCL==(5PeS>wn76N3x7s{~$4UdgnNd&_9FJ*({kPz|TPMy|=A^o+-0=-qsQ}EnRSQfkWrrpiMmfmeQa+XSH+D7Ig^@Iog@USLH!!|a^Y>ZQ&VxZB%Eim z`4X1kYRskM%=S}xEh%GG{iQ8^1x?ero@WxyMfjWxE_WpuHMb@;4-3j;VqVpbVKlh9 zR(@m?qoaUwOqF7j-;x}ThU|~j%lUcrI+8CKO5|JPC+U^W|+4@-PXL*Ylt>mDQx9ppmt zZ@+22RsM3N$`jJ@vFuBIBqIZZ*WCVSX3>+Fd0F8ew%e66LocsII@^YRsCM6Z-udiS z<$||GY+~WU1JfY&Po7aKRK~i~{oOb*H_)>W*A9El#1fycA3kJ{)ij8#Gi2BkElQzl z{ZYIbe5pt*6w1Q|J)aiG3x;rk`S=0X1quOk0d4r8;Gf`!nK&D{nz?XUIdK2-x9@$J zANXZIEG7Qaei@XHhl>|j$ag*_6wJ%T59NhIe!|-RjgR@mf|ozN7Csn17cW0A;4q*6 z4GMw)hT?a>1amF zt!QO$bN+^!nTac{4jiy9FYNq0K>4`%d4Tgk3j!<-13}N-0RKR*=u-DShe59NYE;84Dwa1Z>KPtBzw3cPUOM&bdszTdAJUidk`@%;aAYJNn2 ze|on8&I~_rg#ZaFU_KZZ511FYqkvNbI&78)F9t8*URz9)3<99!@i7X9s6a zOCx(zTVS`j*kFFJhx{lW@t5K5g=X{1*5l&f=4@i-0upizpN_^kBjRc z?BbS1Fe{CJ8q%@2SLl^Lsj57zNTK)TFi;k63^|c#QNDU|*pwrP0gc1G`P&IYXy_wf z2dU#7ZJuo#1L1p3wcpxPM9)sYJz1OWMJ{a;D&n^HoqLS;_S@Rr{I|fB4CgdYo4}GZ z3;*?OgT#se2=~QMRW#ZfE-)c_*|X zv<&!cvV&HtB!zI_cq#XCK5%D8U3jmYkZkQ;d$btMkK-u1T66p%!wNf!YGN;!Zhsjo zaL{jbdkcv*3ba_>S)-I|&VWCDC4VO?M39(|-d8M&+}5;YmSA@+mhvTsB7Jlgk?t|Z z^EbvH#v_`zJ;M4cr3dY$d0tGKH60l}@?Yj;x)W=!s_@Jvq%27zJVRwHx6xZB73;Vq zABI7vRa`s7#Ql}&=3H3^apy>7!OW`NBzQhz=#zH3GjZ7g)w_*`&=a+fU*b}IrwqOt zCQ&2kO}d7H$iC?mb|TLzvT7(wKTuNy61~M~Lh1*;==CYFINc%dF~lmAkhEt{Cb}o~ zQJNVm-$S!Y$i7JPRm4s2e!r-F`L#8#db|_nK$FcK)CH83D_>;wyN;F~cTTsF3OjHG zh)9c&{}OhkJ{K$ACI-+}F4MUUD=8PK)Dgni6l^SLKh8!En12p_-b^N_!L zuS6~*Kv_x|*JFXu%;|u0uAjZdAQ#vq2Rbgyfn^u8c^>B z+I?~BP|Xq0`UYP_f(cFONE@!xHs5tamD zn(fRvp*a@TI_>ix+MckOYN$xThJ(?Nb|r_=adBb@s449DMl~FZ^b9p!RXkx=^Ea?^ zzO3}=Plpssf-pOeUTVd&^%(?{sEkLYG`~~<%8`BK1tOR)zZxY4{aOxk)A+|pB?3BpTY1(!u_zo^31xw5SixZ^beis{)ItJ8Lc+VyY73-{vPwc$jy zCB5F~F%jjVdVrmxe`BmEqY{0UgYY0)>efnZ2at(W!sq;8PLD!E{?R}Y^*E2SPylRIL?9CSqY`Iy$!rE=EIs@tA9Ac@_EsS109-`u))A`zM% z&6)RFC(|pDqpXD(y_)@#3aCG?%y`I-#PGxi=KZ&q7 z$6NbyblyM$40jWBCHJak$dmM*v4=7bT`;6RNvblVg$_maRFh5hVyv~hgxjZMun=R} z7vJYs$7JM@4+uo;q!$~06?UJ?a_J+H-$d(n1v=h)sarWo;Ynlo^zLb<15vNcMa|ff zu{57ePJMIE!x=8C>mh^!!J+sECb^P9q?B@AJza}XSB7B z?0AT;knYKI>O0?BsaaIraNIh9zHb=cVnJ=|MCQToN!{m2B}>Kq=J~#1K<419hvd(b ziyy-guJs`u1hmPHb@P$!zM4~fh>guZYRD}0ko*?-y7g>EDhhZY;IIy-HQ$7pD9-0T zef)i%;;nX{z_g734hz|W367qw5x0;b!ceiv!t0rhb9x)q=|+qqOhLh1D*5OWEr$p2 zRg<-pI=u8ZCLcO5GOpC&-sCZl>Q0-3IpyJS*^h3%Mq|RhmwxIIm~Kc=CA%Eqy5U?* zRg#f7B)d)PPB8eMvelc+?8Doql+W43Se&)6-`6V=hPSn&+>EB6nLJx`^oPaU?dF$VPY6{@CoS;p}KAU9E4BKKjttWF$XnOUp|L-$~2 zJuK%SJzUZ{2}plAZ$PuaouxV}iTU;n?8aryQGSU+Mi=?^&~G2$65_ zIU6^V=I)R}mxl;EEbF@i;;}hm9MveFM6H#^kI!W5&)0t%&|lSSuzG~$cgJC=D;;SYgb#06#NT0Ad&ig+Ed3Gpm@XbiA^c-KkyVu8=dL!lyLWZ%re%0H z+?`2S8aR#w<5VeR87Nj5j@0gO%YT$sMdrVn^~50J1rZ+I0#V2Te1fA8xp4uWJ3GF8 zyP<=Oyg5@R*B^tuWNTnM41F5<3i;-BEQO3@QVqK1PBHotg`<`izAK!0SVsc)9^diC zI?CE|j~{vRRU@4+!^(`#$t6XSif*Mf&Wh3)S7_5zhlQp99rS9~Axc>qp}r*qO((1y z%kb<$2PWf{Fz!fG(V1xkt*{+D)iad#>#B^D1~beUOOFmCAI>9DDH*?UJ}EY~R24rm zWcbSOGU}7#|INU+vG~T1;sShs%pLh(G8GI4;^N^2!t}iS08;US0S6EU1#`jRke}il zn|PRU*#YfD%`Q;W)X3F{+tke5%HHZ++i~IM<%9n-w~z0S?$ZBqnGk*musYcHel7$K z=i-C&L;ovu^dI=Se3y#%KwuCq0DQi;D+CG$!U&+hnO!00!r$+S@&8M^g82c0;Rgef z-0uJb<_8D{0{Pn-7ILX1JTMRzf&i-ne|N_MYAP2P1l+ej;adLB?^wvCf;|8Taq&X< zfpz|FSr9(}sl1@SFPlOx6~h6+!Cdh3<$Y&bz^YsjIB~t3P@AYv*v6 zGqcuI?xTs0P3B>=;YmA^=1ES;ltuXdJB%s#AkzEU-l^pd8VAj^eVURp+pYULU%ehN z-5tnrT?p85l3?ezuiKi?Yp{8F$Y!9S`^n>t+k9$eY@_G-qzsvaA@v)3`s*vQsArgF~?MN;~lQUPYl zPm?c+_Qvg8$u+{5B&TkENQI|)E4b2$JYt+kIcz5&LAMj#XZvbErMTZ2JbO4dmv{Ww z&1Ig}@CLUv3lXb^gqDTp1EQ)K)_k;S-qnen%^Uf$i>i){W(c#%RIYmJ-lKY28et`Z z+Q?#`g}W)pWEN6ani+cN-q`u^^+-A-IZUXH6G!SD)+3)jzS`$;gV-pg<`D%;ym_0z zcpEO+^V*;+e@J*D+OW+^45MSOmtqKilBwp`yI?G;aou=^)rl9|J(i?mPb##?X>6gD{SIQGBO2kW1spcT_?d5} zOS%e(Z%d=IfMRR9^6ykHIZ;6I?};b2QiDpGBzx>=9pPS;udlJm(al8eSGNd!Dxn$W zA%k9x94>wh>L;Eo(iQ7N=m76Fyg5 z({7&W-1y+&>Kipm$w*WCp)t1@Xq;OJ*Br$LDj$_#w&t;g5PBoXEQ>R+nv0?NNgdCee*HY#_F(l_=$3>2YHhn#TRv+drQd251wkJs4eA`>nD7m&3+@9gJ z)6hjNkfdPO{>X!d#I#g^wG73Q4rH0o6pZN znQ00qPAR@#AF5)3gQB>2GUY|+t^(Lj(&EmY#px`Bk?uW}|qaVLUvxt7FV@0QY)xA>D^IQo*(y3kC z(#lVrshHR51LI>kZxN=5$twkA2$gmeYWoMD!QzRx76;>16E&NK3 z@wWAAvU4c8g$f2W#8;YC_cJ)(b#d_7XYit4rYKR+$^M>&fVzD@GROPQ?kD)68mG40 zDYK^5Iw#g&leg}-5-p_mJn3M*_+6r$r;4bNVqvoWqOqdA>3K_oBdpmTA5QMo1som< zr35`CR0v|5Fw^)XR9ah5`GJ8;k>zv%evR}ow6IdkT`sp@KM4xX%C^o85JVggA6itm z0zVbrzuACfCmmc+sg>KWl8^JOKO8&NaynyRaDXL{-45k(N#zGVJM#vNqDS7{Ptvuh zp%xgs4V`kSz*ijyzN*?IPE69$S1DS=U6D8MG4=;BKjtgUAs6Kw>GNt0sGbvqSM28L zDl4aUe1T9hN)N14P7kP}TC2UJjv%aPw%D_NES;J)+;(P>WZ$tP8Y};FSN`ekYn!r` ze9YcO!PgCk4{!6|Cg`{7=YX||h=u@PltG(uSS6pMvC5hetQKTUzLpdd9i-&ObM=&6 zC8=@tM|cIfRDk`roXy{z7%0FUyu8rAuY3BV0Q;X-6rcci@Bpj(&V_+OVE|A593AQs z-sz8gm_NNtK7c!5U_d4L&O7A;xC8k4`x^FA1pT`({d=U~XA0AouF*_}x7Vgi5%;KS>4r&n*kR6gh)I={bXK|JT-ub-B_ z`xmI4mx5?G3;;@Cb>CSQ$ff{n4dwkASpomKWq-6a{Z&8-`Axr7Gy7Mf?!}Y-929@e zS%zHXECa891x(2Kz5@LF#ocy({1q^P)B6wN?!{;R04$-fKLwULzk}si34SVdQ#bU+ zFydxb4Pw)6VRf!Izcd9CdBbH;ky51*a$Vty(Vca@m^6nB%KNdNsI$unk4W?2E(0&O zX6NU&9G;$i-Yz|R`A8XaMMPMLYwLbsGIk7SiWz@+U7*>%2W8{L1@-0nIL3yQTX#3y-sjxx|wziG+@I z_==91yCtwvjE7`frP&;T_#HQFayG5^+2*fAFyj>JkrYZkH8twG*<~&F%#WUs0x{b2 zebp=M*!6+M$H<(x5A@@dnMvAiag2BoZ@a!&F!8*KMkpdI$U+Vyhp=We`eTdTpiF4u zQZ6YgM|7r)Y28A;rT@`TIf1&p=YDGtWzn8`$9lzTN1dU5P|I7XC9|F@Y&Xkl0VQj1 zG>jo(MDb3NSV|gb428lpu%7{$*y35AcaeAw87#bMQ6OS4w}Vo9%hp%EJ7DP6fwN1a znB$Xb!^art^F7bYdQT&+Sby%}dD}Zf6LMRTopF67&!Q}pgLCJ03zI!YCXjB)ZpzxCwgIi9#dXZp#z(* zh|cwW$md}^Gm_1*7b{Jr5?a|}XDV;{w3k>OuHtahEyNNPTAyRN#Z^hMvB&9IS50-x zkONc8WTw&?%f6j970Rga2EhqpPO#J4=6>OQ zx1i=w3&Z(287$%5j&S5)x=*E;lTcyEv=Kf+WT3$a1CCsn*q8JT`^crNI74aWV|Vi2 z4&2A&BSF&Yuco|?RSx|vEZ;AwG009NcncmLvJ82wa#Udo*k~`qZX3s9XGUi!L07Px zY8cpwY-vJ!l9z3?-N_?QcpjJy`6s^JMPL2+?dxQdwq>{a75z;OhjrOPzt&immx2)_ z&ay9uU~$>ydV2^joAk4+gCdy*-SKRMOe))jjUXy9`tNU>+-vIEMvRp!Bkv{mVb-gc z;Xq1>#2&tSimp7q)l?HX%HHFZ&3n{^WI6t6ho#sUtvnr@JPVHBOLxzGQoB3NRW}2} zR~o?{NgKN!-*OZw#W9N*e<>O(1?%wySw~cc*mXbXscmoStm#^nFXU8_t+n>By}Mx7 zV(7Ty^%J8Z=9VYjE%;;(BOBF9m-7nQ7J*o!XvJVA!y3s~d zRNbQRt)`;IfMfEmUa|VBH9uG`cg@$`@KiBy#JYhW<21a5H%hb@d+07ji^!e+&Ctht z91QrdnT&7rl90o~7Y1FoD?V_W35{x`4b*h9v_yO>xB)w~N%^LBGiXrfWAsKMN=J^2 z>!wq=0n(6fch0|+UjoJ?#&1f|IxYh%K6zilfh|1n|nKjDnaF*8s!2L+bL_nm3MfG!LC{LPdr z=#SjdKOGwYl9jo@VAvl_%gf8d#RKH${tOxCuQBbVpcx=VE;z8f??p)v5F&v>e~wu9 zpM%DamibqK2C#ep1pd8pb@4o|?U>!d-#@EAZTRxdww+(pZW^jv@T~Y_pb{xiBe`y%DXRB0B*&s) z7-5h^pT3&6nytFtYA_X+F15=-f8h4QPAc_l^=#-ol$|;3gbOzmbDe8oR*LMIi49Au z(Y1*2mtzwp>;~zxB~Cr5@XW?9L;4$K*5!7h&xY4~a-YYN#FiFfzQ+{PRF%k*eQ~Wv zpo@^9{hM@MRE;9WuH#Wm&-I52)^bSdg286Goz?hxdSZg}m@mO1}O+QaPlWpc1_ural6*$4cp_@Q$ zql%CI$ig5Cnl)>Lh^rTV{8%9K5lz5>n||AxrCZsUs%_-%bv{Ls^i!0L5Z)%JKccrEY?VaEr>&P4Y>>0=Y^PES-8>S1>Gqh9Xwg6I1R+gsJb~%l+ZX^)b;B5NV6|gk%DBH)(=~ z5TNApNSqG4HRGGx%G#U3wRMXx2Ll5_l z5$qzlqHoHD?a2$6r>9$dF5jM4nrRJr=&Hx)LMhgPDp-_E1~GPM8IRWqU=nbHzC;=` z5zg24MqMVS_OKX#lyg6)sxRnilC}SF%qK$u?R%*r3`)gBg~h%^N_WvBFz;5nzXCPL zHW;kg&LXp+!iQ?H+5%ZA-AK9b6k~64VN%r&Js^(_#F?a_l1+HX7XJ`Bbi72YazB6z z%-S4NZ)>kqL}W3UY0}e_1QmbNR>`SI!TZ+snG*Sc>n5JvNkKAHem2nRp**+Z1bp;a z5zZUr(*)x|#Z-*N)L0CAxzaeR>qP0}R3ZGyqGnWjtao{*YPs9?+%DnAy+SLCaaNL*%O+KjR~r|M!a+~mw={v@!z`C zE9w}Z+M#*vx@XK~69K;^|5F=hgp0!KJu!nfgP(~K(Pu)P=U>_6B?Nhia95btq3P5R zaZ7Rpl7b_S12xySe*30@E)?_cI>~Tqh~nB=a02=I&Vr5CXz;I{2%8wjrA03?q~7>O zhx({|4y}niZN5IZMGI$`z_UwWKu;Q3@4-~7^7SS?>96L9%G}8bdNZ!Nec;(^ERj}X@IS$GYs2mAmhmr;hSjt?Csr+ zMIm8QS8jIA_~(R8DuPQz>rHpH(BP-BNRytkP)21*k@;z}XztyLf$n#Av(wf)IPP2{ z8CdZ$;LsHgxR(;xZhAaizszimjw9PAFDt&U$|(c*c$zZ#Vt}zms1Q#}4nA6w%UDqw-L#DCv58 zWdPDdm#}F0XR{%_4i$#NNNwKhW@D0w=rlO@Ge22kj?D9|iB4JaE&d3oV3&#l|E|aZ zof}|07ln}j4-`2NQ1JrdbhCFcGB@KqFTnd}d5^G51%UrvavTW6|4)~Bsmv)LkCO`q z{bQh;4=7}U{2ZP2-?*RPf3eI<1p@$&5Kv`+Vn|`*Y*nr?ascQLOXD9zFyIv|7zzgU!{J@%kV8Cy7|Ce*6M%g2ga-il;@Nk8yZ~$9_-i@k#inxp{;%K+`xTsF7fRh9f%)Py z{}Gs>eBeI`%r56;mg|~BRW`RHu;;&7#?@~s0x6#0b0uyoKhN@6B-ghiWVtJo$Tvc6 zrUZxbCkJPrS6TWP?t+Yn4}9&D&&p!)ZPJUWXE?V`N7lCU07Ryq;kGx`4Mth1s0=*4HLTw`qL3#&$~6p-%=sDu1d*PrRt>xI=2E1td1X7I6{u)-Mop} zWJ8YlCc~EM+ttR0O%G%acGl+-QA@el^LzQ2(}v5NCcfNqXJd}o4gDCivczZu>t7bJ zd>^Vq*IPZt)k7zsd(b)ko~CzXMdLL^nJH76jQ5*@^6snGtlzFRBH1`r7sT7hoFU}~ zg>=1ISZKp=(pE*Mrpf*ooXKL?MAKp^g4;@E#BMAWW`veC;g-!3k2j=Xle5D1%x_*& zAo3P%fUHGgSCM9w6PxD~x=Be@><_CS5(|e_F!p8*zwo{eArt|r=Y4Y{#pbuIdup#B zaeeDdVNPDEHtT8%QwvdOL{fl}PYG_+wTQ=f0WJ{r^|kf)XgNNjU^Ta=o^RvGB7OZ4 z9etjM*uE>pbi?P;CT|PeB>GxHRv(Ghzn7JM6CED9cNcfIAt;8xj_pl;7>JrcNrU4= zRXGa{M{2n8zCM!*%U=A(`*mX{OQ&XkFV`4$hEpHc=gMH54?e2WjY_L#!%mfRL6%QD z`QbDtv()ygge)1Fw%nn-n#W9<-@pcfUp`o)voV9NO8RFvv3ez8&SA~h1$a{i*{%9u3*q%R zn0OUE(G+fjsnrXtFC`!O1o(%e;7EMBmI>gxew{p>_L?TK)rBPoWlKFaf3oqmA@ zI9KgL@=v5WhR)2$tr4G%uz$qLD3E=x4;iG`rzm7BF|xd>_bjWwMnQ-v!mb3?ErQHp z=b+!3%D#b47xl8KEV-&Y{K@r^obeu=-1>145AqagLauKG zCsb0(e5OW^&9Rwwqe*L3=YO{+J1fzDs4*>0v(`3D$7QA>WFO@U)4*TXZ5oGs!U`b1 z%cemv))mPcjV_l2HN)Hmu@LF03W)MupK%4hS2mlmD5EVKNobRP(2>kIFix*c!Yn9T z@e-8j=qvu%xMg!)#jdGTRKNXI&#hzYcq)I@Y#)Ah??w-eZm(olhdr?_=Z{JK;(`tp z*UGhcqN_V1)7a<3D$KJ}?>(AlCWekG%SS#vX&+#2b76KBOMHj-PR@XSv3yj&z_oUD zvb3T;7$;H@E5U3m;1EUC(D_~XQRFj|L77Q1<9JiURICZCLGAoInvNetLLmqJkp~k# zPR~gOXq-sq5W6#`ae0(Do)ZrL za#?@Qoo|Me&lW%XLBv|cbtANd&}YIUS(iW8r|Bm1Hs4W$zXLaJF}v=E&*Sub#3>j) zvvb);S}4ZL4(1P2Md@nXoE_6%?l2jRBb2n=*;%$7^82FO&af^|YYX?diz7;=%vo;o zRQ}jU*PBaDG5r%8ix+f4x^@k$>fyS9Hgh#28ks1RaOu6~EfWNTD>82!ss@AG3q8m` zowE6pxG0NUJ@Seg$v(S@ibxb@^hsR0r253UT5kT44+``J*P?YCgz5$eqxgyp-#w_< ziPAoy#Jmxz@5-Vk1?Uku>TJ9P<(LdeGjVsxWmF@n$a=T_0W7^#hjKRfT`R`4E|XxP zYnb)dK3(jNm`|vl7H%)e`}&B}lM9pU{AHCB>h}Ebi-$qGrhT_>B$B??m0Lu6x{`G8 zJgKlv4eWBj$g4R5&km3xTFgl;T!<7~C1`(@}aO0>V@U4J;4?m?c>OXg|;FrUB&@aVa-}zTi9-z}CP&e~4;UaIK|e(+{44BwDYWN>0eN{m zf2{oixLji6d`|8AmRg}50}vSfxr|9*m3_r zx^SRnEU-WQy+HSeRjGd&_+2QO|6Uorc;W$IckxU(KVGC(0>@tg5dJFw!hcmxFKnas zKY;I#67O#{eSCket*lPJ{Y6b5>pLaePD@3nyG$THPsFp_U}G=BA;OjEjS#WeM}F1%E?Q~g8Tq%fspcoC zsmhqs_v-8PI7-`0ElXfwGo|z6z{sxJ_x%TtI%XU+()RbOwVdcCGUji@p^%>Oz4zrh zt!1J>?=q@_d_!u(Y~%LC*%)+t{&m52Zmngd!}P)thH4_v@XM}r;+ePC<0m7M z8K?rV?eQhPtxWI(zPnV3Yh#6y>)CacN(A}KhEr8Xq!GQ`Skt{h5MFL;v-&q)WYvu= z`}0A`mV;+x-Pq#G6LwF-zyPMA8sgr zGs%Z|bU@i|9~@cdkg)ZXY>c^rPo%3T&osf0{>xBw z|1J(~`>b*Mt?9dRKJ3d9FR9A>y-qn}_}1<7Tg!_ckp9?JQ$VBpea zzzk?MZfS#T7@U^q8cCElh+rR9Im{Fz*RFgP&gN!NN4V!d8*hx|#FGOIXrNM9Pmeq+ zw0C@T_>%UT(m+G2zPkvScf~}F#yqc8W0mrxu~MGsLLcQlQ{6#%<1q+SQv165ms_PD z9yaz^Gr|< z_<(ip7*0U^Ryr%1gl?JQ$(EUvo!#61?NASn!JG%;A;JPF&Ty7&o;aTctd}UeCwST| zC&TEw>%(;7Bj#4b=(LfIw@6LsB4y&dIJs-CTWca^`CwE{%V}9OCM`=I(Ocpapr;pvl8gmuHW{me#k!_BlO91&P*)umL~Le*4>C}WlVvxzX}@iFA- z7+1(?8IkoPAI2laW)0ApeKVnBL{=ka^$d{>i4Q_JLLx|osHqv((ldf3|wVS zgkoY5pLR;g=Ro>cLBzgxXZf-rpVFKd+0;h1Rbpa8KnOFURGR@>vMUZ7QyV+e-jx$|MN^R^*<)-?ZRD9NAq*7MR0ONF@O}=* zqH0&Js8IC1bbRfl*uwRR$s#tka#UhaEI8|4@Pp7$b@iNV`au+8&^Rx5WfB5Qd4G=+ z557tJt|>!OXQw1a4ja=R0SJFyZ^xSUlVFU!w1%U>Be^)%@zZ4Gh@xlQi6hOi6%nD4c=YoL$pCsb_3&o88 zau^HmQXep#JU8DP`UE*I{^#>+D`UCf-Odj1Ib z;#hB|5<3oN22S^P-uu3tdLLNSG(E*#;*g1$Zx0JIuqPdg+EYVXZc!IOi)L!9`&NED zKQAx;d1`NP?Xae!w8m5{TAXzdN0xi0T7E<$<(bchh?|>t2KQ=i!sF5uIoJ1(!lTW# z9@q*ttUq!sF4hTQ8ojT@ujfN~0G=9c>X3+Uqj`2BjT`0g8h2Rn8^(}ArD9Nd;}wkj zD<7EHFsE%|-VUS-l5b52I%;vyeoI{@)ngV7#xEzHG#uF9c<(D%Lr*5jnJuSZg&l0q zaFtxklkO?i*J;ioKDGSD)v6JWcy+vb6at_Ws2o=GTDq=?`^ob<*S4sL;_^f^sc{oo z$SCAGdQI9afk3*%q>fJi4AJx|p1eCf`s~38h zZ93}IAe~JGTz74rf3{`BcMr!aDn~HGznAMi+b?tls+XZRq*oLG7WwCIx4XN zqha~l=cV*v9m|4G3CG*s^-ydmW#^ZhvMSTo-6(WoLtz&WpMN{R8jo`I`V%*;dHlRs zIShX&V%jpK^3ARt+sIf0(rrzcSi7}Dl+uX|ozQRGeVr!__^szQwLAaZG{Ttxa2vG$gOW=0Jgz%D%?S%x>_^aKMM~RR_qw5=Z#2jMd#i|5Bk6z>_}m4*h0@Vi*wh7 z$N!*BHUcw)YratR?bF53?o8C%@i)c{Tgw!xw7*KW)1oG|hO#w1yJJ$7Yku{1iMvG$ z_O%yGK@ec*AZ^yv&cf6r1NOIY0a53YYYsY3{R_1A_HQ1ImWK_appQ-9c1*^1>@Tc$ zC++Fy6r__3^Cy>2IMKkY)zg<`Ded;YFlKY-DkD2TYVi?wLNe?+4kZC+kbon;!utEK zrZ~uPj6d{zsOk=adsoot6gpv7PN(Fh8Y{gNH3R0e@s{X7oHnirX45=9oO@oiVXEFi z8y__$_l+O5b}DszDRiCf8)kO*7(>PavT%Iy%XgdGkhf}X-A0Wch<)9>rEOo`-tc+V z?Zj}+8vB{NhLz5K{}-jlShosHPw!9%y0;L$85D}H8KSNAn2>RFCnQf7eB$V+nGg}U zb^p!ts=Whu$;~iYKHOU$8t3ia6?nF$=xOv|E>H0tg`bpQ7>!(CnxIu2ds?!``lKVC zV4e0plj_JeVji75gZmn@t!&~+bYq(u(a@AprW%GG?_(~xWBi*s)DnRVtPFB=a*nbY z0Srd$ve<6+K}5BAdD3KBkrEM>Q~@x27v55-2p$Du>jh4=>*LZ0t-xHklxwp{TyMJi z^6@vHI);{Y?&nC8-H1|%SRs>A-!pv^jKE1-?0^ZO$As)5oe^1^io6Ma!9``G*Xtk> zca40PK#+x?c+?lUy-$yRln5S*$QeSaI8(M-iXTTJHq^@q%g@^q0_dM!l$POch%Y?5!GCDTx&UWNGCRU2~JnjaAq5N^Lj zsPi|1`rSkMnFMtS59LzHOE4gW4f!7)3XBg74AuB4!o-Y0_0Zm0$BK+-wAluTs(j#^D`3CE^k%{&!xzi?>B<_-L8B;k)Zx#y8^1%Wp*X- zc@K=FpKu2HDMU~}$tFZK!0WubD zR;FgZj{R|Uu(RcKcj5eHkfE)EiOoMr1OH+F%)g4I_%B4Gf6r1EPr-9W`ZcTYV*5OQ z{R>uOp$x;dzS%)W@LvfF?nSypv#-MH!R>Gsx z0`od=B_2n5g_@_VjQG;*AUKlh23KD1m6wh~w~B2sezE;cHUyaMph-{JK+<#s>OV+X*L6r<$%aKq1A;;*zK!4AbkkM|WFsZMLXeRr1&iI=}l zEE>F>+9qwD&O*-svr_TXef5~qa=y1zFTDNbWi@}Z;v-_xO{%J*d&I0C%oy)_xP6#W z+w@G0ff81jQoc{)zoVXVS_FOu0R`7k>erCk_(ySS+X>s&nppBD zx<8_^nLMm!3D(hj75->Ftk-N&0L0GlN-xb9SD2-ys7RhIJ~&X{a5h|>dA8qiYOB39 z>?>U+ktW_lWIc33@@PbGv?)E|yc6le%~!3$xH^{aHaQ=>t{Ei#Mk{lTw=6Sf?98hX zQ36jKy!cRGC$D)iAZ)(}q<^*X2vY$W%0L{yQE@k}k~Q~^ozG2TG<9)>$TrU@O8c@g z^|I@?JW}tc*J?446nuJ*xb{iPOXEg5(sHx2s(<>%gXgs|U-a9KcEV_BtzCqaoF0!zqX*qMp)6;o=rAKb zp;I51a?2}HCFikXq5rt1&)DY@{(HE3;fnQfCo2A6in(jW2Sg(bj82Z5&Jtbs46O%y z-Wd%(tF&PByE;lip7sI$tQ||`xt@uF8r*x61&mkwg+QfkRD%iw=){sc5lfcOjpsta zVThoG)u&|Xg6HqT@ut&pR%EWX2qiQ!;`+)0iD!Ok1AdBb!9+*Y7`9_0IZWV9)ynEM z`_z&E#$?nJv|0r4JK3^pU6cvTcgYy0N2QHcn0fBXJZDqZ(eixD<#|h8l&dXx>I%x! zuYQC5T0-~+gVoPfZYgNaldvG);-!*lj?pSk5dtaft>I0Rw&f8uv^Zk1kdTw%HNENx zZ|_j-J+t%PMHted50N&R7Gu}J>Y3iCDZZ_LwOGd0i@-+cs|dMsSxkf1ZP^$3pB1E* z^u5;@1m72=NUjACn#bSE$t;H@^b>K)X=k;@tRFZhDlv{GKbP}^o)Qtx(6)CZd(tExPiC0e=RH(>OUNMEkAsAB(3 zT$En=Y@8*?0Og)|b$vNB>+ONj)z%PELa5yJNbFQeyGARV!AuUfdSNlftCf39$sg&b zY@TGJ`Mj2sfBiJTaFTWW?!ZbHITioY>qCrBkf`VsWOBtf3vBKPh>$ah?>JK`N+zeE zZwGkYQw+GX79MghA}QDzQZW+mRX*A-$r3b})D>bxFJKw3gGBL!iAkKtOIJ}+VIY22 zIVfahXfdhml$>z(Yk0_{gs6q$f-4U`)wH2go*YGtQffI|MTM!lBfZCA4wfgaphLCqhyx!aLP5hT=(+M|gY$T-Rv zz=J6bdw9nzBljPY(hsE>t96Zz=8ZVj!6_6uTbVJ&Hh<^*kj{g0q?cq{%L?sGMh-d> zW|?#qvzr7|Ugd~nSqfCU*eQtnM#^^XFO7=Kr=P-7qmaY#6mk<(RAcEDE4z`y4$?j- zyvxru#2pUQtcdp&)?#>q_^t zVb&9P#f+@ISd5luySOP##U$xXEJk#Yn<+xnUhH>YMQICY98Fx@XQtum{x zHa;CR2qrH?H6ccSLAT%;(vahK$oi@7N*60-EK3^&|Em;M(TD|;N8Pi}J`LX?0R~ziLli1HQ9Xh2FVcKDN zYeyjmxbL>2tZ1H3aNDiH`)Rqq|Bl9f6Nx!qkAn+-KvYah`sdk5+?!egK6t9=O zraevxfbExWEdp@6BE?EeNX0NrlIn;T`o&ysM9&x}SWr0T%jBvV40sR_wO7)WD4568 zU|NaXpOv}aCN9KIuDkm*FmE>uUz5;J#r%HAC)?g~XhR%v-dQnH>k7vMa|a&PIz0vR zoKKGn*LP44OOBy(tMDU27HrnJ9}qX>Vz$)pe!~A!!#hV&7%$LSlNJp0gyG{mACh;D zqCoifXC#gN(?$~@(E0c-VBn+cKcCwL;ki`e*g1v5fi@Ggd>|MXFYJ7d_&J3FKR;Q> z^YHNCbaZyG21XHb8aX=JTA3J~&#K@Ari{BeTe*62x|=y$ng8~#D=@vx$l3Ge8a<1(0gU$y-o)^VIp+K`3+H++O3InQ(erl1}_h-P=%pF*`gQE+ltAm5B%?}5X zLwGI~U*SC;QvpnQyqHu9g`F4Z@&dz4VLxfeqlJ|#r;CXlmx+TNH*kTwa072xS=c)` zoBiYLIS9|CA}Jsq0LacOzkqq@fJ_Sj1cVkS27{mX-u$mw@Z!2P;{=-7pHK93bT%?^ zwF1W6aXPtKnb>gtHujVA7k>M}Irx#h_ZJ}=gy$m9@82TYFWcrhdi|0I_{*(z{`wbW z`^8Rbe?YQde)sQN?f=aSgv0+7k}U!)8Gr4ZB1Taf6ErKqkeeOG5el{RW{(D#EWJ&* z_<_04YBTo%ZAVrR!F*TfxZ#T!vycU$Ch`H95ss%zGn`=G(6pFrmavW0{iQ8s#xt+e z`6nBzy+P&%8Ih?kQByz(!qm_iQTrsjTvpb2W6x(0R$?#>wW!1W6BSi?_8wR7+=8b2 zn=|TpdK#uQEt=|GTl%Oo%Lk7)?hjJ?e)xK9DQRSq9gmD}wi>oqY_kSqVVTu^itR-X z57bPlne&)|66n7aU7{$wI%8HdZrzn~R8lWPkhF}1ir3I&|B`!R`0&7B&7<{ONj}Bd zG*(Z31$%Us-TrXgW7d2d8;kAn2zpD$#Rp16*Al7N4uwPfJ5ksvHciVD zn2&FHHIm4BQHSIeDzj92hwYaZ*P^&45)aHhd_M*58ml7uW*Mb+qBt|1y0Q82WXZOA z;yrAr3Aq(pn1#k{@bKmniO11kGD0T1MSO&DE}_&dKV8&P7e#(1KGnL{g3Z$DL#(dI z_nZnIYMayOXKK*Nb>~YMdpwO|Dhk=fxg}_&KGz)-l?*0z~w_{_sli*g1wPmN!i4v?6g9H|Ti0 zTV4*BKN^A!T|*FxeDG-V)5Y3jv^#(!e=H@rbI(4Tu@(8p^vYlnU*C$^H zij)R6Vs(o2m5 zosHX_B1>YHT@}STZo9{(+4`W4BP25=#FQYs zGJn9l)s4>shvZ5ClyXnc+;a^nmstM*Q^do4RxI14ur_0K>4tA<3W9A-=^)}wv7-E| zO56JEiz}`Z6kRaalO3<{4i`>zu&r!=+Z@>2MU~{q=Xb~)O<|;;Vfe8nCe7HT$naE;^;hZ*QXiAMV~dD66$?{|DqIZa})EL%O>gY3WXBlm?}xyE~PZPLb{oX#}K^ zMk#5j--2g9JD$gPUccksGq1ltm^CoWJ?pyGy4O0c<8vM7sXR(mn6R|ot3bQFJ~wbA zV+7jB_8r-;WL6_Q%TEuFgzoLi`tTyi&^=~2O+?0Z&s(Dfww*J)rgcGM!YCAO3-3W6 zq;bg8lnq-fUDk>oXc${0`~V!vRX%f(`%ZxiT$Hf>en?(*q7>jJ(h*llo=0wc=k_pY zpzM=A2HcK%a+kI%3)fe1M5tBo##ND7-Di%?RAqQz>xw_*Q4e@l%0ng0Ixq2jEH{y= znygq=(8tzh?5)#;H3v^j97E-Z9}`X?xLU8tw|_AHl!4DWXz+~SWBVcxz6e+3*xsBa zw324Sv-{typx?c2rn|QXD)ATFkBL9-PbC8h_KA-dt+X!*3M! z0_XANV~R+ZUC2iim8Lv>!@1P;;;5bbKIBB`1{^Vwj?E~2k%jLN`-TU_B-xjgY#x0@ z)ifnPC(~?vN`Yj2QJ`pmP{o6YQg*30?(}u}X@|hmxdNnbyfzxfN%KjQ?dlem?{MG( zb`zdpl%xaw32b6fpGp&nUR;fBC?O#9Dm>HBaOOgi68ACjy9q|F9M_7 zKkI)0m)$Gyus*q=%LlB_Apt>H4Bh>B%7E6c@0n3dd`?`HRdLFU5!A5Qj&If#&MB=k zmNvA;H?9ejENY!BIIKiVz7|_4we`55m{QMsgs6@T&nRc56|>&cl|#LxM|gyTElYX$ zEJyq~MN4-W!IyKMTIVkmXo2vs^9}w{=lJ0$TADPXq<+a$8^l$UuMb*5$+xFuz;VjPATLLR0}qdY%j)EzM6e~gZ(gYE8R;L<%(XR%4sjDV%1QFHLDB2JxUiT4Gs zHugF;-9w{OLEwa(slI`FQVW^&y`>TJPvMQ<({Dh*L7-CqZKaHVF#Y!5E2BS~;QwAe zSUz#FdHz2YdSPe&Da>(Oik}6blEi*@+Gu^_R z+okVqqi;^2!QDS0rvIlA|1Ovr9c)dEEKFT)Rkg8+t%Av|G#b7a7SkT_hrM~BL!F{+U9h3@(qSoIj~q*yFd>0#LlWCNr-scu9ewFWv2652KQ!rOlNC-KK$+x)fX2uekkHGL3w_Ab`<67b&+PV!QljvNKMQZc0=7+q@K&HlDI5j zPn$;d@QLbE=BSI#!y+-JS8#AsCnq=r4brR+!xeNJ8!a|$r>jWRZYr-Tk* z^{`ra1Vf6euZONaK&P$+GA4p=+N3Vk1wQ8P(-d3oVwO4Q{QJp~ve`pr#N>+6a*hyv zye2Ue=RVJ&XRd&~ipNwzJUpvuPht=Z%~W9>8SK8uhKC_fWRtK_!n5ymIiz7Zx?i*q zSw)O7>CQAG7MJ1N+X*fuu#d>A%kRm@H;Hby5s43|beH(l<^wQ8{;XJ13M2_;yke8= z&%QUlSS*pgyg1OKLQ;u}l>_J)-T05AdoDd<$WnSkI?CPlWoSDXP#1h~^^Lnw2Yn9i0Xn{vvn+w zlb$KU#X-c{!F8@;lcKtQs7DMXezlkzZ;C|+MKWNi;pZLTWQ1DUNh;Yw5-Z&{!Hpd% zMEBeX)xdRL!*ATMQTtOColm5J=__Y`I;e;H;o{D6bUsQ6@OmOpFJ1#5v3YhPm?Eyw z%`$jQrvbf2M_c9hfanQo5Nax3=zfSMw5qge=uD<^Ih^pT!%Db(p~fz6v~W|j0q`bY zgibQlrDac-;=$II8-JbV!>`9aD^DI9!M4nY2ky+A%3BN`Kfb1hqyRwXDz?u~(^FlT z>SrcNhr(875VP=_Z+v%{9?{bw&|;);sN48gfpIhyai&)(MDSR=C>L5kqIDC4D4hpv z^7Sj0Dpn%Hp;{7A9#};TgS>)s*CD)G1o;{Cu)ujc*O3O@&{inr?13#;nXj05pdAa! z>&CAhyy!qqmc^mY5g3He5q1uzcvC>_$|~-sD$UBqBM2!2=_N}Ub7M^I8vhx7u+i6) zlhV|p&x6s?d6>`ay&OCr=K5=4_C1*=UiGL)%`f6PMVvd$gWd)wLz;_>uvxoiOwQD# z_*yzqWuXCx&#Lm9v~0deSoid~*B~}>1*b8BMjqt+tgzjeMNzpi$A?NV z(Pe0);tCJ7l+(%xg?wM%Uk!g=?C3AwOzp+jKHKD__kp;~88t&5icE-->DmL!z|Ra+w}FLRZkWzdx#{!AG}o4#SFppV;mdr#+Z(xJck!f%G>Luh;4d8 z)u7M*_4@UQ!)gUN0sB0kyozS_q#N!!VUzkh0qH9HMCXchji(6`UtN4>VioIi8!4WX z>N9Hb*lPts`vu07vEXy6Tt^$<<6)3WCm&Y&I%PrCy-eJPj@HcjY1)#x`3(=59s;va zFE0|K*U3EyZ_aL;@QkrKubSps*M`1l5N-8#9f?_PTxop9YU<6 z5H2vRK832kqT8LVH?gq2+UUL&(u z7Ko8k!G4fy&U=Z7(Qeifi^UyeG-we-ZF`O1OjT?f%K}<*eNmawuy6*2BR@D@)*TCK zj%T%!v7;~b((q&{Bu>8&krhr?LPrH{`af7y4T}>f=pXZJofq%oc+h=~?2ed;`dyv> zJ!SC2#kM&Bx0oC7hJpI{|JFf3(P=>ObNwURwtij*G5-_=0Gv%AKhJeb0e&AZuptE~ zoc7OD#QPh@`%^IBw(9{i2S85#7%nR-(DE5*p!W|r=6}Oze-03EaR5D!|J9-D-*+=J z(C?Xv`JZ7tKR@2@-OPWNss~ndKT<7@9a#DR{|Bh~+mpFH{ssY>g)TypC%uwl^0v5kK6dGM0(S}?sB&^r2&BHOTOuW8OsuYW!pi)!N zj>i&1QC<&OU3s6ny!o*keAxnf#HdF4cJkx)`O5Bre985FM$fJ;(|q zYJn@eJstNi6k(D+JTNh#6OFq5v~PDhJNp2FFcteoKV6%o;q;A_{>;>PU1Ud{c=VAW zrxH7T!%Y*J{@@iNxs>UI5ZD1ckF^{w(vO;C+ zYi6N*Vf}2wWiOD-*tXyp>dl;5GWO$DHGNWR_vqXqmWSNZ?6xZn)-PjsMTDN-u(C78 zpj<+!Ws)a?8Q{}`OH!LZUwR^ahLDGY6of^1Is?TMu+^AbTn_1 z7{QL|3Asjfb)?<9x4Lz$TQB8{M(T1HI`zZmF$ zKg>d33|*u!bn8f~?r<%Y&9S$9x3Q9_2d-0j-M@tU(A3 zXKDQv!FJtNP!_~6RytRPkKoPj9PY&;^*X*Q1II8axlJYuqK=C0aR8Pmou71QO;Ym? zuM`b@TUzyb@$;AVh?t(www(^3K8l!4HOkbXy~!LJwqu?&du_xQniJ#h+%6Jb+Dmdm zr8^zqYI#(Pdc)4!^p;t(^vl~-8NP9Wr0Xe}^Pr0k9o%GbN8=`MWmnk_DLlRRlhgY` zk0H3^QO{|p5w}1< zLI%`I!n!#=0eEAHq9PB6(Q0DALAfC+5aKk`Q7Xg_nO2ToG^+|hGAOkbC4zGvbzi;B z(r8c-g3ygrA*N^Pnpdgf+%Z)0PMr2=vNjaejRFUuK92@h(_m7uHK%YotLA2G^V*bP zs8pDRC`DzUnl@`>T-q_v*d%1t{hC0OO)( zcjxZB`mhu4b095FZbe8xenXd_OQ0fC*l^Z@~s;t&w?&E3>Q1QODbU&K2h zP3no-!Qs6f(U}MSZ=d@dc-8kpYsbS^RlKi?WSg3RPYIl8zL`{ND_2uQFcf%YA)rsQ zuNiA+HV!tHD)54`WiRkbawjP;u-6`t1O;61$Ze`#LVLF=b^6o?f#^BirTiW-9H2uR z7LZ~KMI&&KW8>)iK3lEDeCO4w-RZLv3aWTpw{qQKvm5HVaVh@oN@Y~*Q|im5mgR^U z#qX&e}1&zTgUuuQuhZ9?7OEWAaU;=Be%!j z4D7o*@Amiqj&-v$f8WSvWoG%YSodJWZ2{y9YK)Be@Ms37fSc{y-zD!h{hTr)+ig9p zel+Ts2VG!d-mg9y#rYpXI&5BYUrvT%)|OE^V$()zYR_)3b*!K3mt0?*4R36(jl&em zGxiJ~y5*x3%|AK(Z0-9p0n+r{BTd`^l$?f-9@Ce{)sS9+Cu0yjR>#JLHS_ZM4XBs- zGY7%0n6jMU&AgC9=cB!o7JdYS*_NVtqSQsF`xIzQiZtCwQCz8_ZXSCFmb7>%`!6mB z$=)0-@pIX|WEanG?}VIFx6;t2*yd@2F*o$RO48WFF#1rz5A)f7!#?5_6o%M9F%xq_ zddHk|0I0hz(+rWSG5Hd%QaQu3P_!|Pv0d|lYM$ncvhCdyIedXOY07@;$g2+PJ`Xp4 z4d_U5VTk4EuU72Nx+qwC%wKv2R+q0)4549a&pQa;P5Iw%K*0F z-Ma1rTH!E?!a;$`t5M!2c-3~9Xe*WW-hGy2RJBzUw}~m%bUX{)fy3&=(VIy#r@a}= z$7<9b;e1^&Fyl8a1^AgPVb5A8aHEd{lEzk;(yErbw8E|Md*LBo1@)@WLQgG=l!!k` zN(jKZ7D}y9-jsVfo=-QZGC-r2Z68bV;i0AqzcM& zw1x`Xa2QzwO+(&Yhv!t!<+QlYsHOs6^=%Ztf8C?#(Yv6iT*vzu!QKcCiUeu>ga&;t z9gg2@7sGJ^(f(!T(+BVLTH|JE4%?$uj@fu0>+<@E^i&*(G75gC*$i=I2Dh=8U`pE; zEXAO(_E`&C7077h?fLuArG-r!iHh5x8EbO%A}+eP=d>EPd6Em^$C%AtAoT?F3syFL zssNv-@_k?wcP>EZ{haDW6voA>UHhyhK3X{tcH3Yr^o3;JWp5M*-T;0ln;HHSsQsxd zf#)j%>P#u=j?j^!Q9VtKy(Z$3op&60U$M^h!;^EdW$u1~>>;E)%>PPqXxH`&+(vfzST_jEb?W5t1ew*4L!a8`9}6u6smZy?oNk4rJ0>Q zFjeu6Ypp_C+%JGKe59Q3g` zHf8gts#VVt%6@{T<3-npewI_mBOm4bW*?e5!BQtngTwfTFfQ?D(J9v+y^J_pjRF|1qAx48#+F zmNkDFFEbENV7V>a^nY@B_PxvdcWFG9JDc)<-=qL6@9u2OyKmO5rn|E-f#aP<{HvXL z_nF_ZGueNzxrN;Ao@T(#G>?AKB#al(VRKUXhqlAmwLo&5y0tUW#AA=BUQ}1o<%*&7 zCA?4WN#9Z?pAKsaOXh`RBzJsiaeNA%!Beo14pSnIV4U0O5sbh5d`NVoGOVvw z_3dk;KEFU6vgo^yB`@dBDoPaP^5Z|Ok8jr?11&D*@t^iPJFFk1HmvV^c&=TaK0O@R z-jFj4cQB0aldIR?H(MWGV8R?c=e3Dl)5{ODcCsPG+irFpQQZ@+*|2istLpJ^g5}X~ zm=3WO^$w^gkv?~148QdN?azi(pJ%z;^vfy(Kj6q>uo28~*KGb9q%eE~hmP#G?VR7)Xk zK5^p4*E;XGkUMIfPf~Eq}dK%wf{P4!tyNZ3f_AjhG6=sj;v6?`c(&x@NN z^f~lhuXCBLFTS6G-8j(ZO5`0OWUxc>UY0T!%|PEADTVRz=y%GRig%;G=?oQ0Ql}z{ z){UfY8W14+?42c05^M#Y)}J>Snm#C$tn?IGcR6D$=AJnZqJNRp;zb>)n&8jR^P!`Q zZ_US+!keh>AiSn*TysfgM-xj)G$)!^L7n8GH)|h9Oyl7>5gCs)ft+O31c zG#Zk}`#gwa@}9pqZ=7M&~rbV1edAScvp{!5Q=TSt!+Z}qZmEwo3FTlG4yzGAFaQAFjD_m8^td*qjw zEJE%PWV2_ctzCxtxZ7crkhd3RKD8NIG(G3u5)<**u#%a&eif?H+TMEnPN!4jrBM1e z#D`%P?wzROR2V4=EsO}5IOBxQ69HyrxjTBzGBU9A&(hSt!niU9yf0i;xaxpBGl2fpCmB8KdHZ1TtI$uTbOt^@sO{Fd?5BJ%8~!1`^6q zAO)IQhG$w!sh%x1Wo{6NI;E75 z0UN<@b|^Wf=3)a1vDMrV($Jl>!oXH*JP70?lSK{7ey;+e?caW$jwm##OG<5mhF2|( zAtb$Fn@=ay@&ns~akEs-P!P@%DORIPg^b(=rl;mI#+{k$l2#syIHK4GGTb=?- za!To$)Usj8lA{n{qUK72lAGQ^(dl3ZY?NUcYQ5UDl5U0_IQpuR> zrU(njr2@e%kYY5tWC}^i(ZyQs^0ZM8o%cdZ-BC|dx#Fmc(P~r`N z3*c3?N zh)$8|ZP80@YeQ`PZHcOQaktbAH4)4gXe0Zl9aao#H8Ugc+c5JfY4V2by& z>FI8aTLav~=ZaNf6b?f&_tRGlHe!h)MtF752lxX!oRUMqgx>YfzMvdB!mshVG&kcv z5u_AP^;%Vid1?Epby?k^%Y{KELg^s}VdJYVQp5WTgq3~9uOTz-kC+GUfBevMf7~hk zJ@+841P>jm0d#2lix-q%%pDO_NPXN1;#Hb+l0FdAPD9f&Osm@E#(dGXjq-Cv1=WXs^RrDp*YeS>60#Tbr<$b}y_cPCv9CA5DchY+XHH!IWCqi;U+2Bc&@dZ_nJT} zx?mRR)Gd?c2MXi zii~ZKV{U17F9-d*fjC6CjDcuGKYe(u=$dsKa$LCkvJSEY&qY{>A62QcXcQR}` z>2>+w%hkMO*QHa~)Hd%zfV6#70kC3@3NI#sSPiE7VwX;+H7DU^1Jp%2;&PRWj1oiP z9;BUgyU@fbaD-W*5~NCjfw+>lpd;&UdWkqS@xEH-(zZVoQZHifQBZ?y=It3}wt7+w zr#Xb4k@(zF?BAu4-ovMdh)G_#xT zQr#4EUvGZ?u1#!u>&? z6X;BM=X0|Dwq29;H=mRB&gUd%zq=&=5z1oy>t6AHhq73ie@yA7-fiCu*t^CASBD#s zFW(PL|8JO`d(#{zCPmJ!Rpea~k1d8WFd5RZ{9eZX%sCNz>Dps;w@Z4cnBMB($mQ@X zQO(oy{BZHp)@PWIGWop06-p{D#*>~w`3s~yEnEY&XAB5N8U=N3Z*LmUuXI5Wn6~43 z!c$Xw9mpSC)Tck`IwJUeO_#IRpH#2D$ezBbKR4OaSst!a(xT{Raa;>*wwP{(5@j>? zZG-hY16Mv@T(shIpKS?x#acXL_i#`3W3$J~PCnJ6jaqE)^neZx2%M7n> z&MaX*Iz2F^+P0izp%6##f1*%GGOwEAa$BfX@QpMv*4DR zbTUS<=20B8@CZY>Y*ZBGSUGWb-4(HHFJ6G?<_{hR8ekAmncX?2Ptg}7fXCFw0yJe%Y#ieu=~ zdNW^}eV+IrQeU;qc0M#K9|CsOY|0lYm(}cg_)#@IMvrwgL3k&BDky@{-&NaPsUj~# z$%eern4`C|WxYN(O{&wAG>z-g>5Eg^o{$tz7CVdkry(u`6A8xrlF9`si-ts?Bf~@4rz)V^JTQFV;0Ochlh06 z2*l1NyEM8d7rJAVnS`RoX{io~Qb?5rG9dJ0hL^dbiIQzu4n(-&96`a6s-*B?Eb{y- z?P#C!L|L#15>ie^#0Pf`uiPh(gjn*h{XlW|)O|sI2mS_atK|vap!OXfomtgZsP;re zghE7w2UfK{lD>LSSSY$C8W6ZxbEtGEr4X>xD}%0s)*!IpL-z^x!0`1C!Y??A|zg=-TF%*I{;`7tJAt0ZHy z&DgR>^9}~GkCr$?j;gMMqFmYt4xqYZ)C$j>-#*n7;!bmEE7|}_L!mz`zDY!YlbGs2 zh=X}Ezwi!9CxgxmAH@0A4stZBzjjH_&YR{PZz;SwuPzd{hx$`&&v{INJA@Hc%Hs(cnI^Qz?#lHgvOVfb!- z6Ilpc^f^?Dk?NPQb~{a`vcL&3w-xn3@4^k0SLu`yprb^T!lL7>%ElXFdiolWv!J96 zcSEnhsJ?-A5{7SgGz^v{sXuhRB9Lj%6X)Fe7JKa}=43PdJypy0Q_kM6Mzh&|%GvwX zXg1qV`Fg(|&1UOafecu)st zNx5S1YHKDa8CJy52X`#*6WAY-dxz9}A}`&41i{>$vVDHIy@y%FnK2fJlPiQTSUVf( zNpn7xD0p4)x~0_o_}Hbz)!qKzIJ^2coPD@m6Zt2co%r1T;y+pT&C>Au^rj~?DTk*E z6a#=2RX^_$Y?*(tEv)W=T+eSayOPPj+rT?={4TTvZVJQPyr`ZPTPk#fEIV4Y-(t+@ z=18DvX7-5VQg@f$r+wxq;o=&%^Xf&yZi*4e`PE&&K>e6%aiu zE_~tR=}P@*fj7Nb)^w{2J-2gBX@7Xm!nkKRGUvn`KL?IYcn(M&>yNos6AR`|>O@Y99n#}eL*m1e4vNYRgcgc`ug zXl${T#C@ECH%4MTCE3CBI4WP7yC+hE=mub-&!=8bC9x)-od%)b0qr#nqjT&=KFyck zNLB%$?OqU=DKE>h5Gx;i*h8$BLa&5U;#{vBXm0dDUZYBs$7DcV&2x43Qw{x92r7(Y z>vEz>`r{Q2B7+Hm0@xUEw7-u(z_ZU?9cZmR>cN)i@VlhqZl|a0S)<2Wh(P_|sTd}( zwb)4H$H$d(6q(tRJ ztnAoB`#rI zF5zsXwWlOBUobrVfLY>#q)#&tP7|sNm%~AlX@d@G@keWPku$0gKbrEe>4b}87n3>+5fl>An(#-Xi$|-)ec1kBWJS@(cC9du*hP*pj<|9{3Ce~0 z;fOU^9?X(j6vUP%+auejZlq#NZ21;&-Y*)`p+8rCJMjZ98;Z|2PZ2mnDW-uSF98pa?IG&hKi#pR)RXIhf7%Q&!)v2D90I%IN#`U^e^ryssZOHh(pk z4Q#&r2SwnWh4%v@@HdO^?wfTh0)Mmk?ykjuSbV^)mp`BI?-m~`$NwYDj^_Ai!1-O6 zT?fGIO7Vk^Yz>6z5MvZbF>#K-NLHKP<+tHTXDz%(w|SM%mWM|s4mUMwH||%TTh_N` zVNz`5hf^x=e>mYJJKo_kkmg8uu3 zLzYi)Y^DTuOBtnZ66a8x;(NYqar8iHx`}$j+YDx!5?6nGJG=T(#w(_tO5;&1_Xc<1 zF!Rj$Y6BVK{i#kz`Q`n@_u`;Pp?MCDZoXF{=Z{|xGfHrUNsYdd_)2|`=oJq4<P}%aPf6zK^&z zDAaxRelNcUMj+iUU5VM+3#R^beB*`X9n41j518#Xb*<4!38}rx8Rx>7=S*X$7=epH zMVgQv&}@N>5au9y8blQ!<{kEpg#M^CX8qPp&r~>%c zDL#;5LJtxXBmDe&+z=yGXx9B&2qmFVt6!Eml(y)rPZmkdGoOeO^sXltK==qmaAT?X2w}y-4wNnP0ao>i_9$pgEukc zq7mTFZkDPQJ@IwHY-)t;G1i#I80L;bFm89EcGi5=Y?#iJ?tn7rlTO(vrX*9|&XUY^9y_z>2;V&rA4ws;8*^^15BrXyh zMr+aD6JC(t6~c<6`n=2TKH3=*eXqyzQcnBIcxaI}<>7?7s25*Jz|cbs6j9Y&h(e`u z(p;~LZEc#~qP>T-AdIC#44p=$*6_oz3c17?6B;1ivPK1JABHaJl{w^80z<>T;eHdr zlZAo8KU0WNtV#_uS}8b)lNOdtKBNI@DikV3Y0T7ZtT^Thoi*X-(B-t?#zTQy`{JP5 z&t#?BHmlYZ!G4QSxq}hnHg7OcGzyhQ)N&1akT#N5n0nN~L79b05USJ~(MrS~$MkVs zAKdf2pmgGWLe;@J(57j6*G^ynt}B8s``)L=q8vlTL0Lpo?OhqTgaWrbTL$3S$2NC7o8>p2%~SF_&(^2?jc2z- z;LR-Bg>FoN?@RoJXYWk{gLf`cussm*hB1aQcJ0)CqX5LiBNUbdqs)ft#4pc;WQKB> z77teLWl3oJ`@92#v^3LMx+(kn{CsR*3pS{sz!usI_vcVy>&Q)kt9EwzmKUUfaCn+5 zEpgaz4rbWnXM`oKdjVm*sn&irZ!m#bQX5e#0cJ@b{WqSiqKc4F2%=R&2rFy*H_txy z37z_lXD1@uw;RgGy5rf(|Kiz~=x>Uc4n__<``&m@eoyp$x2^3DzbAh=oc-O-Q$IZ1 zUk+!p|CIIjr(OiV2+n5zDeLc-!`VO`*guP?|5vB;_dW%`2+sbVYyWo{o$NnoblyEL z0d0HtAh|vMW^~@&dAGmcY308fo_C-99mA8E>4&uLpK$hAH?xmzV8@;w7{ls*6XrC~ zk)X-nEySDRcH?FxRdCLuXYA$gzWTr!e$=w#N^_CAPqgR&rzH>9~gtWZQx?`|+aYES??TSG+{5&! zL8=QqUqtcP!AIRW=0M4uv^Z2^_Rf!W>r)MO-$U#+aiZZOR}-=Ikl zlk#qh&gqIwo-OCwk>$nG%?k_qPa>?LNphQ1e!e+J8ve1~ja3kK3sl07xkgfg(5huF zdBnO4+U#y))*ROn5hlDDoE8Szsut_z#fA~Ii{|zk$B8b=0uh!i2K`Pk(r*Rt3b~Rui8;F+G{H|>&=H~ zM*{h4(l*hY&86!K3buLzv!$ET?cS@xXXJ`6&cOjerdo)eIfSqBy<6mf^#+>|uWR@i zIsOnd!RkjvjL8;p2PNR2n=&)qNE$tsjYTB-l(%J>4xuokLvd z7$M7^j*-Fo9{r$--0%2SkCi$DpCM=ILoC!2{8+3N0?$`DK!S)rr`3~eIE-2O zZBre?BQUuulr4khMhsMzIPhsrF;H7AXV4#v51-~_Z12v+VW`+CfvJP&{Ey&RiLfNs zWXzwuLoUGY+9HeA{I(BhK2&RhV5hkW6-6d07H;9 z2qCBxOy>oKunUJpwVR~8_0jYL0NHC>Zy|deGzEU~%@i0w+4pWy_7#A#)qX?SngGgX zC|=Uj^tPWNn(`}qRoV?sF?#BB_@>riGatoQL+T#0*Lkhb1(L4RmA$9G5VtM6ju4JM z9JcKJXSg~U{$=Bq_8hLvI>21n3hUb5&J}q~(B(;$!JM);NWq|upbg3@)hSAC=~)0M z?$$MS)mTFQg!pRBb*KDxs>)l5&H95?FOhtrdxdNT@UX)0Cj2qyK(s;Q!S|CzjwDXj zQxl-SHSai1uwNp>4p{enSJD2IulK8=Z1$h>^?o&!{oNgHKP=yWJ(T@jw)?~5{pEt$ zK!>~k*0X<`!n<=P|92OY{kIK@ci${P(cRs1x5qn$_#evdugK(g7nA+R>P)8I72WaL zdkF?vt` zsI?8*iSw*5FS5u}ePqE)TG=oTirL+^hUi-DYr4GWl{&wN-stw>_{-z{O~QbuZ?&%) z4~(=kQxs^6275jb?LC#=s^^}FJ6M0e!l>$yaTVVnSTtx;q|X`5HWaK%fxUI@E6D13 z;!|KgBZ?r{MIVsniwePb_P9ATcV*Vw4 zAy3^cSudbvph-+&I!VvIEM2&`CKgER+FtLO!Sav?u8F~Y7U(<(c7LGLKZhNAZa(pr zJn3j3F38o3f*rcFB^Cv=&%pc)yRZ8Vj1KxkHku3i-5F~h8zn(bDUu>5#@~Y3-9RwA zJ?29oK(b@}j@e--*9k;sxTbIjiacADXY*zt#}g?kokHY4#=c&%HpwEZb}V)Nvhl!7 z6>mxZ^I$&HY*B5_zs%yz+I#X;Mp~*6w?2pB=HzNZnWv3P{EzQSu8>Vxn04 zU}D@457OItfn>IEn|b%{Gdj0e@_|BO$gB9O(vZ z0$Z??qA@kQr+Q0u#Z-D_)?Folva*WtX`sq(I=^_(H+pObt=CxiObQ2-^VyyN@zY=x zdvgyV!B$WUouEG}z_LfEwE&j=+A}(K_#`V{OoLr*XYf3bPC(+7Wd2^G)z(al@@sH4 zldT89vgrjg|HZNe49iI|z;a5r;cS*S{QLPx!vZq19`3OT_q8SkXg;qz$gF_F3e9Q@ zT2Q)U*?hZJ(}uZ86qmD6_7Et@3*PTcKEUMBs3fs1m>vZwA?c9I{SA1(G8Okb$m zGE8(12OrBi4B&ge-&q5)*;DP%NszI2P-17Y83vA8hfz>(bVE(oNF^Z+Wk^7P3beAW zwGOf)Ozg{*gv=_8g3^*~LyCqChTNhY~#Z!5}8v76DtwW7rM^vBqiBPv^AV`c9Xg(i633_q%S1zosgi)I zqI~d3LG8~MmGT%lLMcE=ZT=XIu1dtkpZ6gzAP3ulVQktAuO#e5>HU&8LZ&Q?ZJ4L^9 zZ1%@q)Bobwv3UK*A}Z6|*C!B)cN}{ufXmw+FO}(mH3*&f1WS5|dDtPQvOq!CeFkk6Uy?Q2rgPSXK{HmqXvMU9pR=Jl6MVqiHqe-z z)NOQRG0ZjhG=Qgt$B2_&{x0k_a@MBC(f4E^5Jdg&cgYXGI)6Eu{oPmR4-fZOquD?u z(4V-tzaGs7Li0Z{-d`@7{oTv^cj>@8RQ?0e?7IiZt?v8H;k!Gj+uy(A@cjpV|6K@JtelGUYiNI?+5LAk`{WRCgV-T1CmJVO<=p&N zRIAj@XBFAhtIr!|t}DKIeEt*7-UiC_nadr@9UBy$PI&5c@e5U}e`ub)j^u&7im4WH zR;R3H3UjIzAkaHiyz$r$n(S8|tCz78ve#8MXwRmefbL|lm=&|SfOz;qu{?~zZb$~4 zZe+8Oy%#aUt%E+^B8rKDfN1YQG7ZafZ5_eJ(@+{ijDoEx=(zG z4st-?yuwxucxhtks(673_rHON&gD}=!(;B z@45U}-wSQVpgA=R#^mWYR5ivS1D$!J{UG?u#FVAYZ){Lc!YcU0tKMq{CC*$d0m*Fd zu%2W=g-93y{oi1=>(O|gtGU(L4!f448|LsiHn&UFT{8Q=v75sccc?rx$AC@mp^R)*Hkn;75t$_eR0$^<6LAXTZVaOES4kb;YO?Q{b+XuwvY3Bl;*mmz zlDbquy(t8pbMc()C5%L<0Cv5!3^eKf$m7b}WcDD^)cN{ovf$TE(WksbpK&sfsf~DK zCKz0`V*HQIu(hKnlon03rn2=HNFr!;=U=EMlWGR1Bj$=TW|s*`zK;fQ5zm%4rp2B)V%N z4~JIfqsId@>*bo8uz9MUxQW*lW*1M5zeIFgy~vlf7jw<&LtJNzxkS@`yDuSy(`p}F z!mT1nBSRH!`|$DE%h>+y$}fD6R1L1UDB;~xuvQ7}?4K@sd>;Hzp6#+tOD069{%8sf zDJV1KDTFw?M%2?*kB1DHIq_#{s`tRQib&Ra>`UD)xF5S^cKB59L2bIL+*>yDQOn6a z$18yGxi^k)B=JfSDTwg7B2q%(1GvoO3FjvtmKfOdv{`CHMU{_yddGwrH6o`F{1!)r z`(+W+6c~X*-m;9uVe&cHh>xE=Xc9ULSD0C~Ju-C#>LYG~o{u8jze{H;yZ3qF6mEhP zj(k8{ps}gjboToiM4;F?W35ZmT{`>RbHEFNhp4GFefTz=JuJj{m(G4Mf!pM@sfgWV zP~du-&Yl-LjByn{?RcLu^wy#<|EclQ!Vu~3{t)oc&7 z?r^qy|EoMTA&6IzYD?loEQ5c-fB5$;&!C1Uk~n% zub(=xLjYRW2{fo_y(zD@M3%^qA;=k)=wxI542I`rHQt>0rPw^8-YF2yzQ@Fq!Fm_YejZT) zuj0Eb@ao3T^3lgrAe^0I$#EOb2Bh6Y(yqXWA&%lr+lBEMEm%ob#QAD=uKZ^Bt#Po1 z#GbEQ&c!y`k$~!Z1L|O#kS$WfqqwgQ&(bgb zgq4q+>)E*W?uEqb%>pa!cdmF!`?I;vgAoSl3_0quQ6j#MZG_yWv%7*0A0Y$j>>;tZ za;r~MBrJbUXE#7LN!`OMQMgTKJLsH0itQ*A98SHqGY%9_(8oDXQZvDMx-_cemeYl} z&Uc&67FF@NO=q9Y1L^E7k%J0~gnEwKbawWVZc_P5p?V$y+-tcryVz~Y()YVPg#yOI z`33Oq0`$H7hD>k;NvZ0|#y4VN4(o4(i%hEy$=;PKULgsrRrFWdk_Wn`lqlNUjW#sVpLS=xZAD|8aMgVO6br*QXX;(jZ;ZEg>x-AV>((-3UmR zv@|Fk($b9}(%pzit8_|AgEYKzEp(r~&*Sr)eJ=JF-cR#dUVBe(=3I07XZ-Fl2J?$? z?b2H*3V3LhM_C4dg=<>eXv{L=wb#ahj~y-cWu(n~#N@TrtSKkie8%3HYWYOYOf-smqN+ExLB80kmD}x zK?z8zS_1X>G;I5JEA^s`xa*L|mS*_(*=Oq$^7yfhs8N0g$W4f4 zz*9_BscABeN&#I94Ii@;zZDeSrU8#{Hn+}|l>AZ$6?~z9u~iGWQ1Rkeku#}y$%o2% z&^T%~58jGQERkg49wq7n>+u1VlHwh`;1x5i(cxzzC)UPbV(Wfw2l%qXu6)@6pk=hR zR^&}z-1b%RKv{|ts^@!h4`Do-taKVzHO~=Jb{wRCH_-C@4vGEke-m#S&E~n5u6NUD zHqY-SfWLijZywF&`Rm~D-)>jDX))vfHYZ*Exc}6E#{H0c-q2j7^igCrKS-j5C#Y3y|KIYj|j#o#y1kuq4GNa!eDu zp1sM@;(0KdR)1cqao%wBG?rj7S$@XN+}iN}s>zuavv>=B_flhhZpyvGNovZXrEI9xf{rM&o`BRvBttfHQV zy_%X?So>iyp?{&oe46DlO41cGI z?>Du|;*A}v4JCaiRmb?a(#BWz2=<35&uh*~VaBMz8H)4C^B{{KPSg5~BulLAG0P0M z{h7x{r+V%|qQe>=-{oK+W@nWzo63!pq#RfKY~D*d^2hM?Ygg{N%hs zL6m(1CH%wo_lAn83DwmR(cJfBvESx?y0a;Qgp}|E0e3dXrlFeQV|LuLb#km)3?AXt zOd&_UR_bOBusfST-jD9eovn1F=sob`yOr0H(mweQr2)~RH*h3et0Ai`!=YIA{P*IC z7T@bZ<28?&0S0YqEw-=4wl07{Tj8A@Ry|a3_O@^BHrSv|3mCMA7nSOvY*k#Knd|i= z>mdg1y*ZFtGcd-v=s*nGVJ5jfC=nvLZC3_uB%LdRw&DX9utB?CucRJg(3ae@tWQVR zMXqM!_{z^PLjFYQKAQET2k@;{YXH~wXo5nSwd{ss7sBEo`2Lv}*sKTU+O*!N5o*XB zc_>HV)k%$WJf^H7m&khM6`rO_}Ca%kE~*U%8G=>vk`@7B_%{$UvqE1P~v1a z@`k%dVni;Ajc#dH$BSzAYwqDm(G%xJ{Vy4 z4HMTX>{1d4W>*$LVMw^epkQr?E!n0e1&#F#8pKM9Lzf?H93_{6P29;xBAZ@e+ds*5 zKC~6f=2IR(XP&x~hA0(U>+M_P3&WEkt_FMJo=&dSNJppE`9euV6iW^PxnNk-$LTpA zz_jP#f-c|b`-)9aDf+&7^b!`SVgiarji;;>0|~fL)OlW5QkV~Y)g`G7t&gidHv}`1 zV|cn^9`RTN=p_7h7QB|)cjJ&Y@3qvvn})P`uch_fJfzKgEwS(BA?@FRiGOSugs6D` zd21sN_yqzCgODc+eEg~MLGH!BseC+tUGTq<_TSB51b5CrQhF+;EZ-t>UX{*l0!+I` zMUabrau|Nan&td3n^|#wAX5!QEP)&Z6-Sk{*gMC6=3;3GyR!wq@Zt+yJw~JJQF+~Y zZ(>u^#qqPfZ7YPns=%(P4O27Bq`LFX+&YpRC3L?kJjaE4k%66_sracaG7YGsi|qkl zhjZN8!nM+YnFo&5A?w14b-KX1^`Qw1n}+HaM`d4@llQ;M zKvv9Y3APm0@}ld!gAK80moAH2j2QUZ30hBwicD$?h#+t7HzrKH5nN4@$GMHmfd#}y}dFmJ@$|7gr* z`$a0|fJ!9V?J<&yQ%+76hC4-0?%%eKgPcg*9<(L($#K?wdx_|hFn_0R)H5ai$knLJ zqkHnbWT*cCuN`mgH)ga=2kLJ$c*eLGk!)|iVTIa_-+oP5jI$$?`eR{N`FnRrG(puN z(FC9L!f=J2YGCwU2=P{9&D6SOTBqQx^pA()to|qoISj1cA5gg4QH&;EJcV_@Xf)Aj zMk=YF?c0M{y${zdlxFdz2Zi9x`W%Si2V6sj=AP<2NXGXq)}Bbp97r~}a@V(b7bd%C z0FSi?rE_l$h3ZAw8yPgaJGU&L_9A^kLhqSrM>K;Xq3_HZbbIH!Qy8(06&pwRggkxo zW6^!zqT72=DN ziUN5+d8>Lpi5MuToy--HAb2fIJR2Amc$9<>_`aa%DGhkMglgmhsKO&p=*;X^-^y0s zOdd;jTERvEMqaD@44Aw;J+VA;(pvwp{>uBv1P!=AWsHIzv_EVLne7)OWZ?2ZgLa}_ zZ{1hxcy_BO?mpw8uxBWEIdoqc=-zgA#n`edvcMw;@UtQ#cS|?;!er#Yf=q zuOWqu(#DsO$z|_tvjnVKOtsS!n*w`L<%ow-qMhNh#sb9tUpI!g@NZw@quVtZji8XM#F^RNnru^@w4MfcyFR=z9~_jL$U>o16$3p zHLD@G`~Lm3PviSitS$>kJ!j5-%)Z&qP3P_PvuBS&!_<7^LX1GOoq67j5U) z`}#6)hs5D*v!|xzDAEEok6%~h6bco}p%Y2s7Sy|zU*7B{us1su;>`}|q&EMTH=ERv zOru}<%l#oK#D4drr2R|RINDpBE81^^kLhwx>tbjcUQ*}yWY*EG1+q+Sc#vsEqLJz2 z*uCB-NcQKAhl#pX2UJS(>ArZmJ#76XFw4Z_UhmXVH#WL|V}{4`?o+bmI4TydcR^#x zuQGVw%7h2=6873Z#au=sT!izE4yH2&`mcpJ9`SYg>uV5=AKku}d?!#RyX+-i&TDJ+ z4r0~D;VjLAW!HCLXLjW-XDWudO28X5)F|*YCTErcJl<^7#Z(@fJT1-1dw4*r!4} zCXD6zX_C?GGpdtk&S!3mdeXTIJ%q~e+{rryU%9t$%7_<4J zzY~q*xCO8HS%8h%gwONnf6!8cjoI7p5BZU0B`;v14bm#Cp2feqd-t*%2E`D6mxuiT zD8(+pdwMR{j3JuLujvlG$rG2~2CKNcAL=BWvP&hV;jnl*f5?1JL}-@)b%wJ(%(ZEU zka;03VZ#$4P_hK!*r5Q&-eGwAkghtMfMk};!Z*`-0o8rI;MHVltt6Ile5qcLS*km#WjJL*Zx7b})ikd1;wD`7iFp!oaM! z#lT!<3vhPI_Wf9DOi&^pWQ4NP=U1gCcN>wQuU5$xIbjtNy*pO#r!=55?acf|33*;I zL~x^9r#b;>?9r8CN^p2eSSE6!4X|tuH=r}8`B(X(yXa#0uC1s8 zGtj(K5Cl?a_q~mUg5&%#f8X+*1yHb~)$WVWigyLGOL2jYYAU>+Fk8c?JlPg!^5bV9 z=E!jn*;<8B;nC?r;`aODjtbvRDKEzwJ%T(sc=l*`-=K*~52el$4w zyayC*%}n)+W~a)r0NX-q(pl_8d(m{Uq{Tfw-s=e{-9kwZ0`XAenN0|YYWS3@GXdAD zY_=m5bV2@UK)vJ(3m#-iK+HH_SxA#88x|qrC(}^S0y=m__y6L}7T@=n+AUo_z9EXnR+!TgJ>Sk+wi&v5(|!@DUY1jAROw$VHy_YrwUtLOp82+ zWsnP2L~gg4w-!FjU(`*zJj!*uD1S2=zudMoHzE!{u*)xT?y4=FTG@p6zJb68tb&7J)eKvSICxg#(%c{H{pCNN%D!x0Q zws6yN^e}y5q2yekGA(cu-N9qSkg@eHh-kcEvs+?_a=+Wm2ry@ZcLYk6{@`vv^NN2S zn*Nr%;aj5@ylqoT_K!#_#EVi>c?V30JNwc6aj*f=eXu*b!;GVxx*Bk2OC3VJ_ zGNnjtu4^y$FuHx4$VM(^AaCQ)#jI|w{^7!8(ETT5I_z{*!Jt(lIkbX{u;5X7VbIIq z_TIi4M}tXynWR~w%!N%d8}sM+BxM&$6sPGfJ*i=E&WzY8+u0}`hQgl#nhojAu6Gvl zc>QrG^o~sMuy7b-R#|sRSJbp=f43WDN*7<*Lm+4TP~FtBnjvaTm~uhj0)G_MNywm= z__OXdkaxq4g5Z$X_0I7FXigS}tYW7afZ2+(q2HyiVD>;sYYbc;^=+x$zWz(%K?uyI z#eJR!f!XDvMi=k9n3rT}FJR}}g=(Cf>j0R2hNAN-F3l71IGTw>cTIlCR zZ+nt~QYS)|*87U94_t7+(qK(K2>G!|W+9$AvGYHI#@)jO?D;5Dd~x7>j8TZRWW^}rfFF~C=o!Q zPC5v05))io6MxU6O8qX7P|ospwyzCFUpo@xYtvv6Djqpd#)1dV7*7IjK{Wx>RmS*O zk=`Ugo@bvZ{>&IR6$ABYT6pbbQ~;?uP(Z5Ai{{ni3X$4#VuurkDmvz7;)IuY2#!!;=Xx zY&W4N0}p4*)4hS)MkmT*?GZ)Um4>NS9aTvy`@sXrc!Uka@S^f zdd>xZgJj$Zr!QsdT-)mM>sjN$0y#Unukiy0V=|8^}0@|t#akc7A7q@&ASwG6o2}S-FzyWm%L_1Nv~D&aUN2T_K*|)`wiHbuM#aBiS2y- z^zN@3Qo zjB)u^`FsK%5m>>K)yIMr+-E z8o|C>L2}z)aU95DhCE%(rKDWyJGP~=4P=gzUQrLU_1)GSF^mTavjuLu>%CZ;KlZx) ziT6U1J=^cl{V}*O`vaTJE%g_f5@{$q!rCZ3R1^ur+&t>b6OyJ&-RXzLa;f2Vs2@&a zXj0HDmIavGS`*)e7E4*UK6_WVKFGR?*%eh{Rwwf@qTWKc@5e@we5FjlfvxWH$di=4 zOMyD#<33`*k^KR1WM}WwqktXRWt{;?zZ}^tU`Mvbl_Q%6;>eB$9NDoy9odstj_h5) zk&SHhou%y@4{&5NxuruK+3q15YDWuHsCusr_|a7&KVZpFYXxIB&Los;F!8@oR8bZF zBn^|61FB(7PF8lAadUKBH%mRSK#b@b9mw{BG04ln5m7{bl7(ZV>+uj|e$Zf)4TxMZ zzJ;pD)wVkKDtDCXWV69l&_G!D>vUXm^9vanpV?-vuCI!wF))DJIL7xq1L(dP?cGQD zIDRUd&-U+)S+mSf5=XnxJ{K;b0*>2re!I z2axf2ZQA&jct7sM{%J{4x*jOTws&W)M8UOK7nStK+_g4JPz{kyYEyeGq0c>uzYe{}L4PbM#T}$)3aR8f}?OK}O zO#|56Y}eX-a?=dizqOzLWAp9bQ#h~QmrCSUFB0(aO5wcv=7B#$=H$OBoqYd`(#gjA zw+z|;nsdL>zPbel*ah)0zvkRLAbp5^pgsQLR0)eFa>T3{uJVZvX6SoMnV;!Hb@fn( zdy#ecjC}7ZD>{ak`xa(2&iB5RUWNdJE?uKg3U_!~`fUAIG9KYAp89oTZ}s9DrZD~N zrOm#Jy`}I&TqtEAduFao4A-00ULR{Y6P?U%s9FGm#eaD*FVa#yB{pO;DF1rZ%|LA+x0W&0p`)g2&kckRE)9QgeHubHIo#U7?FyBoT%*ii89bXWOY=hZGAdG zdj+tmX!C_wFd8nsnkp!5-@KNP9lB>TC&DDSG@nJq$}E=r#V7(BN&{Q8+38k^pRu2eQG&F?+JD@gxrfAGvct7kq|B5 z#D*iy1=aBH!&A`OpEG2xqy@Wvnq-0S>kK>yzg{b(M!sWLuskNV^15$hzD$nslS@HWzsW_t-vfFpRFoS3*E`y(JK-l$H2-`G!b`(I^F@T%j`OFbq&~rcs+I$W! z$^P);q!x^@>7nGV5Vo>9eYI+~NG*V{M+fT@l?G-S^OfGBy@-nSZC0``Oen>X`nG1O zAMK~30L;N!a`b>dJPSwm(NjX;e`3azbzpL1&-QKx{&NOK5E_rx-NjEk`ga`|v%Lv` zKZuC+MG#0fm9oluZrFY^3zRmQ+zZBdX;I0sdE4YZC|3 zldVlp?p^YL9`Iu`bTC|;HcJ_i^QIN!gz+n@(^aFqAxFIv*Nv0GU;ah+op{LB1PfW+ zt4r89p=SZVooBD5=-n`a&CPZ#Mel|YY;Lw|>3KJfU~{wmb#C}?_b1*oKlZ=boBvTi zHa8nYm;8_VB{$oZ|N8350?%`h4T-=JG9UhBuDd$tZ}dy9zqc{*PwC=j^GrkkN4mJ& zRl2x2kS@;D^V@WBd2qV8&{ev)?b$4;@LBPqaN6ZbsoP0;#%O%*`P$r|2Vp^<^}$|e zxRt-f{o*3-v?pHmrS#eBOA3!WlQ_d!jhtH?z4kWyE%qkXzQ|EV*c-(5WY=C*Wm^JO z*$AxB6d|?i7&{Wwl2a;&wQI2sVwD>^1Ehyj*efF&2K23HAfir&(kIkZzLJtu`7y)d zhL;;2ZdLKC#z(o658?b@uF@Qy5VpJVOK(sSon4-G%%Rg8Kzg!mgDBJB<2ju5Impo5 z;^3l5Nud=n28;rm51g?wpr&a|HYmrwjzG-V#!YS76LQOPYs<9sMh6$5XpShg2;#BV$Zi_huJ;LvJJ1x{sYuaj=!e+ornSn6d@! zNbyVWk9*t9>h>{vw=|d7JX&%lRn>8RtSDpPFJJX!C)^fxIlh+yYV1z!yKfQ1g#}l@ z;77eETkb=xDs*A!0`AFXBKY{#V&)-vT6EzX zd#6`k*#9hvDMi;pe;_#fW!0jg!P#JN{F6`|amLimk(LRyLu|Yag-2t%u?J+wmEf2g z13zdIwxgON`L^o5I|MJ~Pkav8do&N9vuQ+?i8h;B##>Lr}hRqa+qX&<#w7n(`y&MAdo;@bz4!sC!3I_eG(k;;r;0#|v2wDstq)>pm zgK8suv!h_F2^DjKm&~%rCuL#dhoCmB5t<&N4P;o@e=>ADLg zy+}sHF|A0Hz@z5KcPGO74nj&}yW9sPHdx68xS;J|-j>;loH@85h772Av~81QsIqJu z-&z}ATArA7|Gc-4&o+Pnb{iNC-WK1V;o@<=NSM!2Xj~3rM5N`IqAfQgW=B39v%zG) zd_I@6%6c*#bc^n3P}CC0%h@|D4~0gJfyU<6&yws$qmqY6fGR5kB(P%$>pTLi*4_Eg z)wt9m`{A94kBsI05CdrMqEQT3A4cnGtIVWgl2_u~SMa*yNB#)OgfKF!=KYMuA%(Tq z^bhGVj5D%iF7-rY% z-*#k!djl)~)R9f?|L2bE=f66#&x{YYe|2OZPar2g>t`(t1b1YICyn-p|4J2ybY!LVFccm1Hj!-w9z`4m~! zSJX3gO?$p{Rx~?NudPDt9_CbkbWbeOifHjNM|xEfPKDV?(EC`tH`(7I zzX2`vO+8_^OTw|>!RO}XciWE{I?)D1Fg#Bt(TmZV>Lo)xOXq1WvF?Qb$gm;JY4x$3 znVP}hk#5F2Ml+u7Wls%Ji!p=;g#>-eZG1M~2D30ZAV?V^q)49WDTOk{Y2tOO4o6A* z(Q^L>64IG(`C>Va_^}7JuS6_-a{=eht%%NV#t-hdE|3J=VZgO-o%uoSgIHzxT_Ifi z6&>=n!L|=tLHKf$Ht+D!?T#3%>AgCl@I_{>0H255M8wPnEDo37ea;9pq)3rkk}I=& zDkr(!+7RG9zFY3v#fT{gEitWHDey1b65@SMma~vh>U|!s?Gav`B}VkHHe-X4U2M1D z`TMU`p+X%DgrB>tEa*k%0f|$%hVuBF*#A>p@5j(cm6L>^7mWfnIt#B*0fgNmj`gmH z%Z%qvoaPn6uBzb207Au2xz!UO2-~Kr5#v$e`8}5P$Nim@M&Bjd&ROzgojBamk5QL+ zqt1x=%eU`H0ioirNceCh3%cneZE5M)XclYBu`u{8)}Cf zx#T@W;kt)?SCllM*_Clo(nCNfSSZ!3&Dp;7P-*V~qeqEB%V;QQlDCv}!XZB;R}CDO ztww$(I}lROM z>0@NX1#EiIi{V5`dIe7u9CVYNKEQ0Ff(*2Of3JCSj$P&A`exQ8s{mVM6bUa2`v{w7 z;liAr1KOvm08X_O%S^;XBxiZTwEzxSQXbp|r|VL3QinWd#iA_o9*M9hxm$$_jaq?B zdh7wcp?gNM9L>y`JGc(gS=lWBGC27jO;x=hXz$MfK*Fy2;`w& z5-+ph5HBPv+>xTN?K%(KnoJ8zHas?cxFt3n07!lU`@X+L*zDJm{B9h=X1|u^cjFK? z`?W;Bn}@L3uO<53IE2k{t^FrA4q^Xpd-Xpy;{HvE6Y{*a;)#PUX>%#vq>-^UqY?0`f5QP2HgYErqULEQv(&E_W&mT}IgQ)F0<`zEQwmYit zW!%0Lvhym7;(VG?oGSE;^z!ps8Y`qaaZ2RiV71!y3=VgBbo1@8Yt@_wE9^&$K4W84 z`^3}0spUSht*20V;6b;xrs?HXr1+sUHX^Q2Qjs>dbLIKF@$<@K$K^NM%RepHWP!gd z*pgriwh@AGMJ3`48h+V9fC^9PclDah9l5ueSY#K_z#~ z0s_Ui3|J7o5KvF|^xY9inkM9|xjZw7VAniZ(i>nUq3$jCWgvQw%@QPu+$Gp-JAM{q zg5%LI8juleB4!v>p+E@#=;hod33CA90htE5%FLfE*mz(Iwiwugt*s!G#YAXHErdoq z^*~4X$DH+6;MWk#BSce{c|opyG%&-aOGn}3XK`|@b(>ZH6#o2iS{=vJaCMLFX~oBU?qCl#8^M(adrT?eTXxsW@YZ2O9zG!KQ+qkEpQP0zBBUUPeCtz}{IN_7vTaZ6)Tc z9>GjLV|pBjkg-UJw?XkgJ=nzS!)%*-K!s6s$gDoKt5#nqP+$a+SeFZ%h2G3k7&v$X zS>msRk{`@!syZ%uj^2%;t8)j5xo{Q-3M-X9ifNhY0`|!grTge)av?2qit@Ww;`<-S zTjMH0Gjzcbu$VjrM#I`5&>;g}x?378F)5bRuR*L zTM^j@zTk1y0z9r#H0arB^g_l}tqGMC@QzFT5eZhanz^TxXl_Uizxr?Zhfw@VTOjq= z?{q|}!%IEUN7T zmT{kKI*_9xvWE4MMR(f5g2l=c8DP3sL{6szIcMQO`mtL~MuEMg)pVdz9eM?<1e>=P zGfWU*tU#3TG%OD z=gzNLam<=x8S`~FVp!Y?!{e0tYHxhu` zvG27UOG(grQ({j>%BEZG!I^I~n7jt|%NqHrvSJ@mK@!F5WJRE~!)5g%IKQUwltLMQv%ApB0kj zU?_?tID=T0HcK2Uv}0ad@Azv#NUfLiEV?8VduQU>&hUH_sDkGzQ5=`X9}b@G*cSfriu+BRM4pJv1DJ8r1z+107tJ3V@6BsTTLxpwXOz=rD-sq=>I z#FS4-shp)mb&iOb=4eWdlm_aH>`0Xl=0k>;``iuV6Z_m}+MCS2t>gP~rx%3n=T33s zFOXX<7gmDN=ieqH>Q4o_cxEI7L~tB-7_k$*WI|$@5{4QQ6rn=%Ih;`sqTS}UeTqHS z82~BBwm4-b9k=FvHpI)55iwe4iuysyK(toU@I`^Jp~1nhyr?1Nj-9)pF5K3zLdCfr9Lw?^_YJn~f58U!;Ts1=$Dq?jH_mB^n-Q$eRyNihaDakr1^*FDb85tjLN*%FtAgx3uaK2$N3JqZX2{g%1UKwR z<1uoM%ke!dd!VER&(%~VIq-C_OZH^0^%(j(%YiFNHm6zcVMs*3YXsFrBWyR-QK6S*RhU} zl>z#(vn%HU6K)GM5VKds+vkhwAY<#HCx>B^ciw>kWws>-;IM7Ta50*SB4g@aHB!Hy zE1>9fO{QI@1WBnvpm9kM4(|?D_MDp(^pXt)(7S?TQ-Y{)TWriV3Z{J!AjT}Xx0FBn z;@A`i-C{x?fmZUa0IIF4pC~mmQ+?oi=ZdT}(A4XN7-(yt7i{odqJ5TjD`VDIO$wI9 zEN8*RfP6CbQ%wCND;{`Z1i->5;lT?dKx7HdAs#^u0^7sk9Vy@ed$N-yw`;6BE%^e>=Efm2;9K^aOE%{ z*Oo4(@z3;W@q7U!ra%1#QnI6Dc8nC}V_j)V#wSE=z_GyWHBX1<>7s&N<#rrcJ)O+z zhO(bE0tcPn;vgXT%+)QTA%P=OkFSGDNZyEJq=0WUU?x^m9)!%_kw!(XjcX)=!ck3W zls?%>8y4`C0zRk-L{RUhm!3r%C(Z4w^LA_5-Nt9Av*G#hzOxsrA4<$!ap}D9A!-Pwa=#uiat(tK%{s)a91wxz=BRI@65v) zzDR_}Hmd^3yk&XM8jb|qLE5|~Y}ucY;yFW~YcXumMm`G&?-w`1Osr`3{B|0=mfCmY zfHudq)V`Yrv^lP&_1!$6&3P@c@8$vR-#xqk*f={Mn4)$&1+TBF9SCi+a~1%|frnvjg3|Ge_9IFU#?LZFhi3 z@ve=faN8Wy3FrQyqJyc^q3Pby#L|}s zGZD@jzS0MNDpfVTE8puH?W za{rjNzbl@K_yhpjRL2QFf%cPs0c}ebn5F3n_C(nwLQIASWEtNvwc953Pk!_y3@6+A z-D)l^6H4pMweyxft*bb&qCTEJZ@?EfXMD~2dJO2vHVNtdnA`IKM0ge-H@mX2gX$-g zvx_sxVM?KG@yyqh?ioA>sidcT1JRK?9^jU!h9+8Rkxv^hdp{Td#f*KCL1&lMcGrj% zd0C%vA-ii^+~45QQIZce=3E@l z^O473Lw5a&JGCg<-tjZxl-08Scx0v_z6YK5FP9%lnFFUr|#p&leLHIqxB-Feki5p(@>H$9+KJYS$szk{m|`g-#oV z)En}`>A69RgnmL?0Jo>u=`LHkbB$qiw)y;7Xr52& zUEJCh@$~qZBJouCh{9MEl&pO-QY@InXO(D=AEZQ}1mRi5qI_n+hZJQa)ubcIv)sYw zTK%Y8LtciHp12y~v&~16#pKXThzqzk#&BR;k7PqyR^BctqWa1E51CA4@;pWbm^Qmv zp}|k4y>JQ=S5;y6E+8n9VvlG<2AH-*qaMJtLs~`|;lWIs^%4ahZr~doyl3Fjp>&WN zbjUBJO$RR?TFC(aR0S2xw5_@OO9&iJN4K}_GDN>;uffx&WLQHDOThX!#yqK4fHlQI z1E4lG8sY+HFnGFrz@;E`8yO+=C=n0{L*T7&(SA%0T!d)W*PGZ(K8{6Amw{)DLOokb zvh{k8*Wul)33^e8kIF^PNj_Y>$pHe|#O>fgRv$%l@}uaR}6g|3nWTbrj`Aww9D7`IP4E`(0l|$`2a0 zN4$Fh#6nxUFlSB9lUFs_p@H&Arx+R@XS!}>6rA5ZQ%J4!XV!TTE|T}-opfq%f$_v;$ka?ylM^Yj7b>JB z`~Gq97Ln82W=ym({bp~>D)QS$8^c6%g%^~S({C-7Vka5DOg5Tr(h_-&0K|&7f@8&_ zTiCgL3V0^{_v~-?k)MEL#c}&Wz_H?NsL4dFQ+yixoNGcym7V+CCrHwF<`N`joexNF_D>p1(@>P*ToZ01oGrO5lFb8mE_ZQz!Mrp$Q zfCTk2m|SlH@e2jpBe_>7Z53P(X#|y#-SUwrn>#=cJrU2IF2Cz1fYCUW4-4gVjwD99Ri7&L@-%iHv z)cR!lkvZkE*c$H&7#&c!K9Hl?=4I~gd&7gs{<^R*EW?X(iO;?&U7hpmaf-&*yd5{$ z{L&~o;-36elf4mq@$oS>IZyMAJF%dKqEurF;8&OVDB=PP>HgPdz3G*s4_$JL1Kl*; zqsqFX44#RXQ{Oi7Ew$dFV?#O)hYJ$hw|rjbz?6SR^^gfQH=;3k=gh!wxuDFg@zzmG zu>HG^_*qZG*Y|`l4<0p{9j?ZZ63vHDP2qc4uYT!{XoH*WQX>nrO?$+)LZ$-e4BOM@ zrju3a>mpc(TSZ(7a~k9u=sn1MW+-j5Z%yn&rac;Ys`5oDRewnf#-vUdy24^ z#KPGIX5R2_!9!VsZ+?2So9qiQQ55)Sn{C)NnaSN^)LE)kYM@>kOp@jAfBWWZ{k|?k zE4{Vbs0P?J=sdFb4aOmW5L)^PD;>T96bmi5{5cARHurs)7WtV__j_%BEfKvQJJHwQ zd=qasQV*ra12gcOaxEy}v=lWWM_9yJVLa=1dqFs}O!xxNYeWdTvN~+KbaS=9s8(yX zDao`mA>Xoeykik2SO-22WugXb82@P3Qv3ll~$V0c*2_Qs=Iw7!$GWN)D0dD~v;Xc3cYS``u8%rdy^!*O zv0*<3yV%{qF7`#(jp$EfD@FT8yU;!~y$Hr}7#7w?Skjcc>xBplk>xH>>H^giJ0cTn z=<^}&ee=*D-cW>o9f55G`+!e&4Nf~?v-nOkx#@>sm9t>qNT5hkNK=5oneLsF4fePw z0R(F^%O3PSq=xx2@_g*z1fAd7Y4Er6?6riwn?|)cuO;l=G^)*YEm`m8`LemLWiq>Y z$>P8JGXGODCMQIm{LeBb=T9FtlCmJY^t zz|m6Q!C2hb@R^Y@vXBt6y@Q>xz7?`d^2VQ%#fRF}EB=%$-dt4>=!SBL11smg+Qdrp z7)Lt%^YlnmHrg%mavIyEZ#Gh|QoqA9tX)jL;3t4?CwN+r3mCJX3`}1cvj@Fws>m*s zcDMSyE;I!_)CbpkhdmFrS4aaa-f5m!>{w}LCMqx%_T`Rlky*&B*7A+S>@0m;VBP!( z|LJTq++uHiEndzbNi&0>m!!IBw!hJJIUr=|%){O#ls|(*V9+D@V_w~wj%o__RB9E( znBB#1<4_fP)skKK%9JGvuZ1cTjJ4;>p1Y;#Y*@P8zF>j$WZ&ye0rzC5=WJYJSbc5f zJ#(^!_bV#9BHMWxUjqifWV?(gj14IYFlXChGzY7|9C}q?qAhAuKE)sFto=#01xe=( zou{*QtfRz$aPa|pNVqtfBM>f5Q!EdQO!N>h&FRtS*WjvbUvO2n@GSl2<4y15huGr? z9l4uhQZ`jagV4-f3Ia|ZFW(iA%%-J>8RJeT|o zJAC5s$ntT^#Ttu!=Sd+Y;W_M3f7@kG;`FBnmNji>AUW5fa>cKi+JaiixmuW?sJDf9 z8uxxUj-$Aj2_{{!?GY7%s0hv;$td@|1+SM^Z2JXaU1`~OxhSS2G|J&Gsb3Njn2ryF zg0$^6tZP=)4EI>`1k^oiSr+AiuI&8QS?q_mOBW3(8!_gy|HQVDkwcvl!0zl(ihsGY zG0(I<=K}6*euDS%Yd(%?i&jS-I4;(VM1OT>>s&NS+BtaK`{mA7a;!my4>r-DoG}bX zSMJn}PiyTN#=&=cIpk*-x2%h^7@BEDbL$BjP?&PYayuura~ zGai4)IHZ`BYHtW&=EfcN^CFA#`(d{is&kOtdn*ox$zJHKsQ->QBCP#r{pVJyfTytj zo7rAkiQC+yX}(xWcLinCy6EPPaYJf0QXZo1K3Rmqwz=!zO^_Bug6i~?$fdcWaJ(oP zBp_0O*W}n}w#WZhoPPfx)W^m-muy zLtqY?(m`n3`=JCJ?mKS;Ek*;lP*_KJQgY@s7>qb%3`oW}SC==!T#w>h%RSOG7z|)N z0(mTf2(4CIvON>$U!iGdEw;h*SOBQW=Gwlh$u@z)z+?uIj(|ujYUYrsF?%LD)V6`v z?pbK&Z9UO#k!oK6X=|H)-iE@~nr$fr&Q>c!_SWm&YeE4LzfTCH;E3_tKx4Tphszbx z4jpSTe^HzMB0B??o-Z=4wmaMhywaxvRpX27PbeUV1%_7;L#qJlfhtv zR?S2R+6i81(W}aNg8=bpTkV+aLk%jeh-$BhM&JIRBBlJ5-t!r>t;z~C^S++wzDUhW zIRdnYJ_te6t>`*}{0d6gz0^tk_jpJ7$n1cc?9w@|^WfRrk+8;SibM6Y&Uio;yFS80 zV+3pQ;J5Jmbl=lmwKq1y&(g@ZjmB8uC{%{A;oSIy2CM^f;b))hL+yCob+NH{PU*xp zl5alX<1~>0x1MvlF$kTJo&MtFwkU$F3|nuI(MRQRz^7djI(~0O`^%azDax~|-;IM@ z*V6lL9M|Q&lRv!u{V5;jw8qHGJs8ohq*Ke4KD<<1Gt zi7K->%IU?AZ*3PR$)jF50V^7=zSqP@CFMOMBw_!A z9m~r8evkgi0|Hd**K?_Dv;FPj62v|==I*<$LVmj`QLn-oh))(?9LTe9U8cX6(!_U8F0g2}D1evY(G?2D~#N z3k!^#v3s_$aLlxm|1tvICVQqr9w-3`*+ z9n#(1-65UQT_OTf(%m5)f*>g&(jm=vZS*h2tZ`p3cZgejrFM_20oUm@M@pFAK!p zuD#5fexvW9f;(6jsrGe)JT`j5UyCvdfsXOHmxIP^za6$JBwvb63~e_;av3GJFD#_gpliJsH zR6A;eKvNao=@;LcS^^bR2fXhH@Ujdf^bh1{acy%{UItTgeMjt?y&9~E6ck|CP-!1=gQCzxHz`&RBUx4qbXMPb2Y(nk7pg!ZTYSg+rg9tuMX@u zx!!rZU_k8Gd<6QkEx-Aid6GHPbG~)^$ghb9>dVH|iNpi?vbjvDxIXrZ%#&~!ZJbSk zPbe2a$!)cVZTf|K*gLvEZ+)@!P}O^X{oF4cOjmwo{Gh#J7;B54RvZ$Gw;-v-jtKhV zrD6#5r0x3)#IfGEs9);7KNW((9^WysY%ZN|-ztP5b*qSW8M2DX8X6^S<*P7jp)&~jS=A@3S_!VlD;UER?&9q>65N(_llNm%CkGwjy zF5TC0^@LXo z=IjxT2k?$(mP~c+XDJP{Z+3gY=eTr{vg6a`l)!bzIfBXLPJ$b4Zze>TLR&y-?J(oS z9>Z|~Jxq3%z($AaP0>lO{h1dNf+vSw-%%Jd0u8VkSaxoYNHvLv@)4U)-i4Df609g~ z!3#xMp`0Mq-Ar~jwSb`G5_je{%?19Qx$XWflP7U4-^!|*cc;)9XEtBjq<)*gEkTSj zLdbPzb^lYrmzQuKsP!3pAwm$;3wvL3Y)wmAJlW`=3%3{GGa!auq#bv99HAJn+CfhP zZ*_&YGi%Ieqt6BfH#MYpSDZbz_HKagNW~9uw_gm>Mf`NPbvvGq7sG?VVsq{GocHKpBY6oADZm-g#UpVa?ZMCon!?a1)W1-Z-cx ztPT52*wwGuJV1V7qMy$69f8vVl8aYi5O+$aoZ>|JNe~LhT>n0=#Z>YfBsqQYN@NfsvBbsWN=F%P00cV_XNdrfvywL z20HIgvBeX#TKtKcu#$QRibbDMuGkFT1-FBM;I`R_g}?KmB^~VcV!d)Ugi;g? zz2=ZHlu$ThXMjf#6aXK;0pR0^hy%;>?t73 zuz3N>cNZdANX=tjByWSYxiWtOq!*05D?vLhd8+;^z89{^u$inN-HQ=_{)F!x(*s9vW#&U<2mbBab?B@t(0?RYX z5D+eUt)UR!>lre#hfWDCWhWydR4>jYPSSmU2AAMl;s>(amp~1bz7RVm=~ZJCTitD7 zIZp!u7y|-0**xt?kyI6{EEFO|G}ocDSTA%|E7M%7RdV}as>`$eSE`of zkH&lV&D>`Bqw(H-Gq+j(Xt;O(%x#vxtB3#V+Qs_@9cTZQru|Q;JeE6n3y6i2g4>n^sWDu4R4xsTSBm--xil|3m-q3^k4gQ4LwpdC5M;m{h8x$XUt8(>(WfQE@r1RG7X=#=pteg38II&WT zNV9QO##OD^SC)95G#XZRUC71UnRvOF_JuAyE2;0z@es6pD#9(%d*b(F^r~8yUX_`M z?M@A>p8b!LFW1{y1Kd8f>B>Q}G zy9rdhG#v`L|<&myK0zoQ*UD?kT2!M#^_b8khFXg zIA9)PQB`hj<84OG+tiXW&Ivb+7o#{gj#*C}7em`{5HAn+aO8@c58(N>FaQI>9}*FU(Rd$j8e=ltVGpN07ZjWMkJxHHs$D zr++YD$0S+6t*Gs&6TgswVpd3&hj`;VKR1g;wf?l&Rldwvp?OZVS&<{<`|@0D3W9K* z+7q1ihx^DOIttIVdz3la-}1hJ+C3%S>m7YZ?4CyeLnw4Ma+L&YHaLUTGI4* z*Y=TibBV@>hfuj+VbLBVOKXzz%GE|q0&DbS(dMhtosV$~V3KktbLhPx|!@vfWH}gpZeX6{@DM+t&E4~vyg%uqq81EqMK88w3 zT<$j6aUob-o+O&!EE`zRi`t(L?2|rN>sl)A`y9ge1UZ`L?Q5kjf1fO&j_aDG0f#YEXU#G)j0j1giG;uJX++7<_L{iOhzXG0i;B=h69??}o1l zn+-Us`Rvm9?1^BQ8e~=PuvRs~;5YNWs@ArG^KF4pY4+&Wk8qG~RLu9+i~Yu4x#e`v z=d|Z!9qB>#H0*;9AJBp8yu`xXOCH-r^C{&!Hl<>zQ#MCZNubzk%gn-l?6L5u*l$?1 zPyyl_d@kg=qq%NpKn9nu1wVxTRTV>k;3pKKfC_PG!N-=a*yj60gXOZ1p>-%3OmClc z5hexh`-VO48Lkfa!Ab=FSduM^RKL>qx&&9vQwORgdru<`_ zBQxu74*Ed8_MH^W|KV%foL2IU?dH^i*DF6~rkJ0A+_a{>{$5}ye>F-z4IV}OC=g8Y zmGt44eY`k#O9O}-yMUX13Bzg5Pu!lf3pb@xygESRjN94!fb~zEtGlO6%%L9^yuTkU zAP7@zV}|DKk(kn1m(3m4#+P^j%VZ@MV+rr9KL_ro#9$Uc(U^& zuU#{_dr2mw!_sPPEp?RX-mUxs$ZIQIH(pyzrfl|JQ3kp=sbB=3BJ^H%9w{o^P#_BF z40<^`Wo`R@a}|CGL-3)%nD}(IW_xW;F(xjUd@_OzZrFe}%i!%sJY5w1Lrs*0=b~*{ zl}Knj;7$u4+1Jf524oMLeCj)Lqz71=<789LFuOLFO&q%2=p>^Qo}x#M4fhb6?&jfD z^&7^5<=CGP4MxqfMBo)>@uWDUGDXo7opH=;bh_#|(^L3lylM#};|*+$_9x$#=#eyb zQhfEPvfBuK!f@SR>c&9Q_1K&nJSVcAN4R=OU94zs5DAMiwLPLYb5V`}-kT>J$WY8b zpgG1Y8rhkg-yd{%k2y`LeL)9v_>CNP!-z7y?{xRffPv@bN8;9;ArFpc3i3Y^+cj6r z3DS~xiESYz22xnVX`n(Isuwp?C`sVW$kvr+{pwaDw^LvBuILx@bdngA_K7#TNXQ92 zTLnx+$Oqb;&lAJym+7G5`4Tj=zbTJoM3KYo=N`O#WR5xFbGaY8tp z!|+&Be;UaY*+K84*+D>I_%20$6yf!n1D}Jo%EGI`-qE%(af0Bv39=}XBcj>?Ij|bf zsPFoEE3-v4V&+kMik9Ta8%|D;zZQ)H;8PH(?O+`3sm# z;p>!z$}o;^#uxq8H98w#e6VNh@KPGrY+Lau;}=L4#tR{t@Ws8OYShm>#FIzuqiQ%T zW0hjnh>s*v&+HN@S&h5lv1%TL??gOtOGjTLW@xZlKKPpUscZPOSO@)qTLX(bg*hLy zas`-@&1w{czTSv%| z{V+We7b%fW2!X7z<}vUO;t8yc((Wwwe5QA*ZfOaABYE{**B*RmAti^e1OlrNLjGbT zP^rzt%bxvE)qa1y-!GvpVq*KY9gN8F`C8jz@%iObp=NMSSgcSM$M-)W|f^n0RN(Vo@|*@FY5wrdmvDuy5B@Ke6z z+HFnWc+W6gaR|pfRxTqDTzLy|92$l2EBVLzM}xq7XK%Cq(IoKR+1sptGzz?b_BQJu zjRNnTz0LY}IrV>?eBQIvHv6w`RsSiq%leyx&%662Nag+HY}DQdk9nZV@P;@R%3#cWC z0e>3?^;fdv4kL10SsuY&Ekf-g-r3tz6GcDDw9m_L-xSf|yl&yfV~ZxpS!tTX zW98jr{b_H%jnI>E@Ts`0K3~;>f52ipk;%`tL9l{xVx}?sRm&bO5Vl;}S%=l+A1HF= z<&k2Lz1{uh>LXhuj+$<0uqFMbZ%iit`>!F5Ch&`=P!%Ws%3NjNUeuo+O2_0q!O0lc ze#p8JVq3LizlckO?pHy+nYhW^ZDquX;=uorYx5m}%PP+1*{ri|z&?r-lj%YvfZA-! z_8rz2kO%Ws-@pv#n}XY&KeyR8Uh^UVg4?Sf$Rhf)g9hkr&23#wOvj>Mdn}IxP+j!) z**=Lf>(Z>g-AHK^!WG|3>vVC$C^h+9lrs(|_814;i6G_XBDVdMd((|jzHQ{3ZCgM zO&4c?NIpw$it)rH`Sh#fO`H4*Vu?}`BV!|h=n0XBi1gD#Ai6D_ivev$&nBAUdMgy+ zu>OW$^aJ6>GjspEi*2U?t3AJ5w7;7R4zh-)m?@mxGa_1+Cw$OTin!NM2gR;Ue zCL=FBedRCniN(x2bILI4-}dR0TlbXqR<-fKv{pS5yLRb#ii!qA?GQA=)Q<9PQx$kZUO2M(S?WKH|^?~;)fJ4NY zr()&H!~Cv6>E&f9=d?GEfTL7l0?R5^gZ0kOMt?mX0uAb(UQf&je?7aP#8 zMhs&5Vi!xHowfkRkR3s| zP44!D5eDP>O)KT`xJY4TA-HGJ+bImjl%LX$^w;=upMh_5IMZ?fM-_xSPsI^)6CfuS z$yP3dka}(YeSK%CeN=K8%8otq9Be2AO5r^2#YgI1kaPuC4S)*V2c+xTJ3zXQmxt-b zWsHZnLkJ{+BLWek;fiHA($<=2xO@#j;+B9TX14`!`9pqn5rMGn&RoW1K^lGzmfes39o{CFO=5i->zh+`;mLCI_?I9GBN1 zO3as!A8u5owAb-##k6Y?27JuejG++HNLhzSdaM#|%{1rJdhIjY?cw?>Rm=8AQ@;CV zZ?pZ;l<&UT+iZU{-*iY>8p2eMyr{&~Q_?RNt9FYO>+lKHy--eQ1r>T?~t9q;G zkkdL|9>2T_Er3Y=hEGt-iMn3QJP;i#@~whQJbGj8_pOED!rJ95dmCg_m7=Qonh`>4 zHrGypw}zO0i^KRQ*{Fjrk)|`c0#LhI17Fp{#dn)CcaYW{??a0nJxEu3x_=stp6k~n zIX@@-zM>3lMhGTy&O0RJ>|+L-Srd+3-`8t6P9xF^Lal-dnW-#>F?TGv(PXuzZ|NG( zF7Se@Vagadt#81R>XPQcEa=dx5yO&p`+?xL)EKf(RF3Pn3+$4g!R_zEvIb;TW<4kc z{|IgqNV+FAlWfPDJx@pZG^yv~lEl(;(fC(zTVC2`gXI0Z-p-?}Lp7tkccP8%>>59U z+uAsbZkL=pk6J!vDiN^=VZ(r1Q9c$Qm8y&-RrS6q3XRebMbV&t1Jr64vmvXq;s~wl zXp}LSFdpn7KXdMHZv2#J5c#2X>5K09Rzpl{|M*P-elRP;tg9>!*)U*kySx|UuU^@b z!OM*_;@2BPn4r*TspKYIL~pg;QjMU`CPCmWx^Tp-b%V;g5a)TfEBrZlQPgkaeeQv~ z6P5LI%}4KFK6HuAZN9w39@}(h|0}m0=T!d~$Ze+rx$W{O!ydrgUY?&ob#V-v1ajNk zbg+lB^3`$BB|XL-ir!g~BZMe0M_jTRQCo|}Vvlq%>zaU8?IeP+=(|?!@-Yu&GFa(+ zP;MIpB~J)8*%-%{UCdX6%9!?6n(pKfFhHSZ6%IhjD5Ac=2agh(zkJtSs84z3!cSW5 z!q&Rg%;Un*LE2W?Bg*=kJ`-A5mlo8j{g$3WXj7#TPT(O{w3HuoG23$?IR+tDZ!3Lk zgAIj%CUmAY+~mjDggqv?ka-KKP&o8Ehb&YWe((U(n)Njtt7*-$0!fb>w=``Kd`uxM zYc?Pckyve4fY|nqF2vBXKfLyH)+J5kY*w=B!7j+qyuo%zO-ka|Y7beLULcdG;l4)s z_@G!G!_v0oqpyZYf|-bez2&HM2AqC?p&_6to3}()I?q4y)kS7dxHaprfQ|+SIGT|wwtBTv-320@vmkRvMZOg*IzggeU@vuiW zMPifB=BLglVm756-hdq6`IbEq-Jo6%w%%qq4+P3l*f4jdx#xf2$ceNgaR3~-wH$^u z2uD5-;K+M*CWHj=;K()F0UUV{c9XmL9gh6HqbdEd1IG}b*(y()*@Z@% zsy^fZc5c2~yAC-a%U1!wamTK^YuBDo4A@<%T*|g7co(21Bj~(;>S>$3@L2}Ft)>oa z{KoL3uBiu^IsJ68TehDw4v^X=yEw@KE|nkT2^%=PzW86MZI?J>p>&t8U%%c!#X6f( z{!$43>eJ-6KRoZ9yUq4T^S=A$ZnOQ-wD118+rPvX{`QOc{<+(~dNKc}lpq^unD`s1 zZML6tzPoo8ND2O&^W8lc|Ke`n?eiCNK4ymBaC=Jp=?b^8x<+xzpvHOSn) z0nF{IhJf|$)rs9*6u{iR2F&ei1VO5Qn%j1_Za>X!1RC3ktYug9Ypjb)@&=~H^Q!t= ztMA**1W+&SK#7N(d=c~S*GRd0sf*0D{|+NBx`UB#!*#lb9Ca?ArC0k5!;gJGj9FON zU?=3#QPk}y;h22f#nb2#KktD6z&?U9#|(Si29_Nnu04-GAVUUN=r?T8pE($V>b0%0 zalAnF+VLAlgUAR53e{V&oh=kgIkwf#>*2ojwayV_@#>I)17jiN zTp}||TvCfXSa;qw*xA$R4Qo&GXUWyA;u<=laRft)8vF@fPjBMX7g4{wm$FNlWmc~z z47iMmK^Vc1R22G(18z&f1C3fxohjyk{Yc~M)IaOBqn$4%WkB`XLg7TJ2XQ_x zV@)*V*%1|&g{oaP2;go>b;Hks8F#Hwt$}8um%c3)aJHi+h@vvjV-$@xeI>G1UrqXYE$NLhs)ImyY9y0tTM;R);BgLBr_7LkY1u?o$2Y0hyZh^7KVt9{L(! zyj-m$&RNJ(bCt&|EXd(%&9!n*A8nj(>wm)H@Ir+lWI=+Lqx5vJ=}eXeXE3&&BIMHZ zwbXmjhCFe2<8OeiJx_h5{euSS5o;i4PH zVOnXpHeIfVeVpY!F$0S!Di|wJ0#*c4;_xNHvy$T2>V!!?a-(Q5o&`GZi~`u`aBNqb z09U)fIivCiuyCJ=pXzY@D$x+4z1?P!o@Ekd*4K1QWmdPO(hn(BJTfT;K6r-q8IERA zW^pBd6d9y2lMX8qPenjN5P4m;C5W_b$>-P-V+kS_8bT}|AHg|>r!lR07AOu{<;wag&$VY%&iqb{&qKnXq7%n z19{rBd@l^c8YktR8A9X=YZwKT4nU4$kvVRBs2YTncD3i2%@%*IXcT}ejg8tdq>6xg z;r`-407FxbBl|(RGzTH4ju;21uW-QckV2kats4UYV1IL%me|`a1)r+UuY3s#I1p22 z^L>M3DaN+XW!rN-r2-tajWYb_Ci85t6tI+CmziR0B)*wE?6c^vDGt_Xt@5LBOcXRmsLAS*=+sft3?DrQPpc?WH zu(5N24iIY+8Nt)saDJAVswLHyPq(;(Un3|0g3Z$pWNatF0zKrMzLa>DVx06XgrX$1 zN0N_VZP5@vH@WI^gE8A{HagSy)Mq=!2&_b1j%?IhML4{@!j#2zzo2ElBDge(xcHUw z`z7<^w?8cJow5DP?B{Qv?!7a%e;I=K?bE$~#y0z}R{H(+`QAHY`JL3) zop=bh9u)rw_WVVy{FGEl{u1Dkv;31s{(&we%f;={4d844h;85b+Mw9>`G`-+zxmob ztW9ZmvF#teb`{`jU;ps6qq5Tu8qWm1=2YIhCjl!PJ51uACw=I9@1xYH!`AwZ8}$Yk z)g;B1HuzAGmnBozj|kho!xxMQkN^FC=LAzn?X|FFv+mT_#09FE&n+#kxOes}jVjeBGRqBpm}8)6pum}OGj ziO_n}+bomaCw8RGHnfXtlGT}RS-}!?gbbF@lU{}w1{+65uAv2eWaN5=E-6EsszRZ7 zl!WRP9+ztI;y8wZ0FNAxJMF_3smnHrEVy`grmN{u@ll&i5-bWvs(Kf7BZ(ryK|wDO zhuNs)RH(x;TyFY-02Lht0MC+Fp|;;iN_Lr=Dzfc5Jjy#47u~0S=r%tSuBozCuBvLcZHM;p8Ifx!F=rd^v`_?3 z#PfY0Ag-n?`pauRU;TtQo-?v$^H#V8E5cN@zS8#9F61 z$9G}F&(HF?iPLISxe;d^lJZn42VQ|$P+{}D8pvy>ptBC{J~9J<2-TAHEX60rmv=$2O5yIXu>p*1|YQl4x@eV6ALLtNm7@I1)4MRiptm z4QI9g)$FIGeW#{PAqxD=T3t$gS>#?ZMfs=Az6E2*qkY@nTnRZ~=A((y;?lrrF={jn zuO86F6vQGn_Biv*o5v#ix}_}NyS`OE`+;U8$kXn^mU>h3*dp7jfg=q!Ry%@)@Ez)O zHn1ZOR!^&~|ZV>s!;4FK(^w zp7v~lHM6DO^Jni%<)vRIPOVRTtwm%ha9pr7A8@VOIPm*awVJtYeCy?MaP!^#Xz=TX zw0<%OOJ3S|yY&6D%0@t#@vT->y^UXI$qwh;}B-7Z&5q1TWsR<|X)gb|(PCWt;_SRilP zD>Q@>)+UtJ0g4Q6#xzDe=J@PksK*1Dw@>PB^MXvN_fXUu`&g%0mQu-c z(ZajM6I5R8hsj`xQ;W@*zEwOip|lY=)v~;P~wZdBi@;2@2p* zPVkWPc*u(QH=cw=nQ{cL6mMIkEAKqGJywWl;^d7_88XI}Wqhg)BhcD``(*ZzZ2x@=!idDP6SICo~%fTcZRfsB+r&zGM zLV%olPLI=QP*o*tExNm0;{uK3@n+~!QY8;wkJab)*Io*UZ!bx0I`{J095lvUo9oeP z@yozJkv?*f7x6g1#O@zEv3;oB{Ki5Y^HKg+d$h+-K2%G1w^`#+M77fL2E`Xq&>lZ2 zfcZi_(n{WEB045P{1!WH=flk>OHar|v1Fie+n)MXMwrs{N8>gPZ+5wN@RJ_q&$+4~ zb6cS`4V}_Zs&QE!E7R-M>Dhr6r_-p}j;PV|bO1`;uCK@(x|vY9=>^UH#I9T~T)LZi zc`<}Er+NM=U)5{ZKCs}yV0tunc84pmt6#mjw#D*!M}e7ukEc=gC>Ny^k<1$+#kz36 zj=^nI2ShhomOhOG2&uO22jKdi#QyYirDjOr6J^d-_UO=HV+u$DT1WzEIAv1$>Ae$c zFQ5V1HWD}uv>rcn`%^l3>{kIu^zDy`n%n~0>WTTRq%1aGA|d4*@k4{W?c_%Se|g)` zU}o|df$x+8?;5xB+~5OkXSA9qdF#S^i`oGGHzMNnMkmBF{vDM35P*{F|Adn7{7+Ew znkBH6H*F9vmfHQ7{A?f9Pi{31zg@nAqyq%YK&M2&+^+f?lpJ^#y#IodSIxG+-&xS&>Vj-uT*H~f+LZlD4|4p`y1#p8Zgc$6!oT}wZgc$6#P9x@+Z?}2 zcl@^8zklZTuk`PKN)U2@mOuZ7AiTSQ00Qvtodw$7EpG(2znJyi?eiCc@Hfrv|4Q*m zvwR25)cM~;x2?q2M)TC*K8B$pfsqQc_9u0^h<&a2!6b+JCzHIE<<|3hyY=6gRI+x&h>-`(LtkD5yY8suxCJ%QUdPo4A@Ki^!vCjv7w#7_3&xWdwQOMWpx;ouNde=C@DH%*M~$V7=D z2INk>Ug1?*U~&yDdNFRiMSY?tv@cm!)OjZ7Oi$$#pVT5lwiwbH?oYWr&?6b&z%f`l zyOP?)oL2AK=VOi)txXWkx7eeUMeL5uy{5RMOn^n3+Kh$xy!FfHxyy6vn@JHdsHRcD zbe>uRhfX@WS$(wv~8zWBV?0tsfeq@P?izIUG)>W5ziGwz)vh&`ntgARdJ9zUFr zW2IZ>7uy0#+PY)N`Q9!T1>xaV@xIoAO`$E?s(}d^bYXV-SiLLq<$_(5uv}nWxt%aq zHMKA)112TZ1slIkDL=RsTMAs<+O10QxfACKHDP#Tn@*mc)FsHDXe1P!KM>{5>!wLT!ZT|FzCJQ9@Zb(_|F9&C4Z zy~d5E>ZbHcDwi~&-{SORW*(5;4$phi{uLQ4gtF3)1Sc41+d}7_7yVA^p(dj(a&WbsTn{MHt5YmM^?htpoI&377KKBdm zwqvUnqp&{3N+S2cM3}PWcvuLNHP@>-4vDqZYF&(oJWB!U%s#7UUIwggiu0W~TCxdB+K0|Dq9mrkQ|u(egiWiaLVCBIYzL?zA7{M+Ct z!_bKAU?u@jQeT+b1IDaBKmh-MR`X0&q8#!c5b$PXf9NOcXBS`-N0Fzw%Uzp@RYg%ONpyR>q8u=y+t%uC3`R)a5>AcI8tslj|G09Or8@2oO_ZIm> zydm?0;KIXIYi$hM^`NnBgJH*E*QLyY!HsaXz_&$85+Mp0QSDZRfQonpi!cX^aQZnE zhqUM$F0Z<7>YL36l$>hFoVIp?Q8MKl&)|Mu9^0`8=uc@g@Nl=&k@42z3}X&R+_!Kr z{KI63cHhkHf6ofOF!PKJ8%~h@IMT6hU_JrBd84T=j__f{9gm-77He~Wt z>R<=vI`emo%MqZ0C-H$CIGZ$FgLy0BV#0=&UbxE`4bmGgo4CtL^M4@8RfBko?z*<$ z911S7d;^)=m7UoT0`vZslQw(P*eyFcUBhrHky`yV_8-2asYHc&I!1{itJQouHD+4N zaSxJv7@V7}nhPXDg0?h=9xd;wgmk)MF7k(ru=c=rj7)w|*&aq8{R|cW&e;zm{PY1? zfB`wUGF=_q2Co%!z~&{cA^96q6*DO^8q{DvMZr2Q(eTf?yOA~;8A7FXyF8>!66}S@ zid#2H&yZ2{7@Nzr@k8ZP&zho93X_oQYo%udk$e>~&KsTwD;OrG(jT@&xF3@c2kN0A zMFO#H%KqX{1E#z?WUe@i`LfUIaR4N_OjuZN2oFN5){C6F(IH~83GV&%7*qH3w0NH8 zYHB;$s{!(7sHQ>>D?SOk<3TJZ*!^X1FU(;clbzbVQ~AI=NV#5jm_had=-bwS78p4l zq-oVXM^Z7uG+$~D^vFNL9%7G!Rzk1UHaj}Wr3zeR(-TPQLCccRA1e_A{B0id8jFqH zcQ=U#l>T}3yq2m9Z)5wf=}V&fnas^;ql+HZYaD|U$*g}>78&D3aUP!M*?fz&b|qG7 zH|g3e18Uq(7gHRmI+|1!o13*w^_&@ym4J5-YEJ&?aKGju^%@pxgsK_Q?&Pxan;cw; z$MT>o{uUWWodVA|R&HIJz$kv01^qN?ta;(O&_MhHZ{>Q&XyCDU#7;O%lTzl?smK7L zOgfi_r}Qq{tKy@F@)yV9&b%4pib9&6`IjrTG}qWz_Q`T*^>3p)UB%!ZUx=c$JBuB@ zYr`mhOQ>CL-A&V5(nciFZV)q8dQlYDH@3qLe(Rzvx~r;1^0IPJl|GPdwc(89WK)Ra z%Icf~O%S3wcZOVgjwCHRgZoo>#|2d_th?_316XkQ>=~#@+S|7L>SyP+@;SfNa>#Cc zT3di^s1!nn5OF{Mi8l{7pGh)u%+SH3Ww3%apf!iclgO3cY?^VO?@TM!q7l}WZ!>P0 zKV=z2|K*2@J=;y1`z_afi}1?9F#7ASrJJ3z|jdKzSM-@X6^x7h)c`ym3^hZm5z zro5}^kuu_RkO;S+WL-a}PVkS<6=)lJZjI4Demf2QLkL+k#j4k;n(kt3a zdLeJbhDX)QW}@JMBMN|jY+snJ)_qI;Be-4BUMHAR+^!`TK%agW+)n<=l@zE7H&&yy zc>5p>$v5s7x|WUpk4Aj=%;9FE|DzG#J#)C(=>KTIckdi-Hu}HohyTAj+`lv<{zE#C zjsA`)`M>JCANLOhK+pXcWd3-~fga!K#J@S*Klb^Hf#z>x$wB%K#G-^v?NLYl?{eFS zPZgO%@JpLt(tN@p4mFirv1LDs!+zcf2akBWON5&azMk&#VWM}|hiQ|J&w#_B$9K*P zI*H(h;bKwN=XR0XEAwFeXu|z;AJaP6xFYqsGStf>@0DG7T6gbk)}F@jdDDNvl7HEJ z-`JYky;rq}{_jk3MVGT2T>ouHtFt&PdY2E)R**;UZIZ6-CJ1IeQN6=6P1KOjq1vCE zvD7G*i)PMUN>Qfez_zRNh#Wy+&5LwZ775pV%@goN&lBvtu0M_4XZE|f!jl_z&I563 zZN>u6vzQGEIGeCCXdO-DvN6J{wee08q)rI2^~l`b#TR|{ZXxq8jNTU)`&AE-OU`+V zin?)Su(7XY@HigbJc_qZbsNo@_?SN@n_!*ygk4R7PTsA(6yivRV#j|w{X>XPwlcnQ zZB9>TY83y=ug@`Iu$(D*Rt8y7qdPSnluux8PUc3&4_>09bOa61h{hE^fBP+|-N=#K|bp$Rtln17$-!X&EPnYMBCk z1=AQVtER|Pn#@Pdi}*@JE>c|ZVYrk9q-K!MB}Z$MZxw}}eaq`ZkDzp3Q1~iLOr;V) zdA0qCq&dHk={{9XApT--u>IbfB>4f)%D%&!UNg;CC_@){?z$}~ZUi@&kJRS| z4o|*1&pZ2Is1d`IF$#-*pP|VaJNJgvZu%RQ{OO`%Z4~N1spP1CQOWauP{~VA%dRW> zMzo*CO}nVSw;XI0jFo7ChIT4ds;A?P-}8!MBBEX}*bsg}jw|k?hE7IN$lLe!F&&RZ z>-8BV9iF{<@7tm8GteW_q4TJ+GLJLEzIj2DA|Gsa#=Qtr+uw^5I~!g&G(5iexDy)Z zOAblk##i9^M3+C%{PPR6{tj^t0VYij0#Vb$A*CqaW`5ip3x|aLD}<*Vt6Ju87Yb_t za@%kdgxux=A-DJWKFZa&d7c+=m%jnGq^nVjX$XH-|XXhKglB8E{Lj-W!yrxvV zn>EPhq;i{&RyF?%Bpm|H+}`S7dsz7hVqkdyRCXiBgL=t#{c(K&psR15>_fo65=Sy9 zX|{N_3dNZ)sp7znP4Ladl>;6;j9;Mqn$(?i7YBGL801BbjUJjq z$+naTNjwH0K8G2HYgx3}!PjA{RvUq}SW$_>wQ z1{62_#FDq7=*LJ3xVBd#l~sHWL9D}#^ZNW50k8Fe-!qGr8u{HfZ<~$&k4Ap? z%-d$8|D%E5z4Nx&82)VH$I3>_!ORZuw3!)LXzAHG7?=qeSm|kj-Lf)jfkcsjjlH3f zJ)s8ZzoEbT8xg|0b$a}S+}yx70N?Ucei}HM*;xPh8%07oWd-pcUjttdlAAg@+B$I3 z(dpaRSkUTO8<^VI(^%?Ro6s8ASke7>tfTMfK<8j&;AC&+=tgVmXk|&F=i~@{Bk+*M z(O%Em!Pv;20@x=H4=nJ<$l4GjuwdC3{%EBN12Y>f3+QACnVINm*%>$(SO^)I>1i3+ z7+IPAKezyfHU)oBZp^>wZrH!qbwF#ZAy^V>zo|P5wHI0>xp^+t>o`Hdl zleMD*iH(c3k-dYdneD%y|1Vdr{KvHM-E0%M=5z{14mM8q21X8qjCa3m-K_w)o1;4r zYOvA&SoQhiRs+(+KWCqJFHYd`-E;K!87Le5-+iXPW}qC*^q~Jw#LUtWc-hg3Sn4?% z2^kpx*8}vdJ2=`K=~=JV@E5_M4@?Hb#ibuqUVx z(vDlLdxsT`OoKUH?3H&ln z$~JJhL2jo)^H!bv%K7B9y__W3>7i0Vam47n#0O_J0eHnhC%cWXr1=zP*N2nK%HBJO&nsgY;VNC?X+ zpRCTVpDs$-f@+q@=3VD&YCHJa<8i=V=u1XiKXnY{Lk<<9Rz-#D*MWA@2&@65Hlh3d zp)j2u1_h^T(+Z{mgz0akJ&_IZ-)7|YBMjthJ0J0N8f<$LHL#dqewu>NDEA+ zrna3iodp8ZLP>=mqY{oH>gkc_Hy}<0$6)EF zdb2s*o}>mN;7kXos;pvyaR+rN@}m-qrH)I&3G}Q4JjS6#rC72d5hHw=rh}WGnHI$k z-Di355*+RNd~ZqSn~#ZvK|-zPr`3wOppHa2l6R1TC8%%}6LE~@n3Wm&2Wtjx5-G9^ zYhOrcM@hDnFYV&##t3xeUw6UO9dhh;3#`nps52+6h9HHL#1;DD4b;|D;5ks&1?yC; zWJLBW7>UI-N~QAqOhrl%o?Yv@A9ibzOWHrHF!oQz%d;OZgo>|~GqO4fd~l80=aMgL z`X0)@T&}Eo?jU~g(0B)}p^#NX-MsKcB89~m*`;_*YV?u9gZGwS#nx5uwj^`y4AUG( zR^sGV&DS4`D|vc9AE zlsg4NWb{Z6Az?;HDeV2a&PxutCsznEx`KGR2+7DFI&d{99kLT>YS2d7aRW!)MAm&> zjr9;-GxwvEZ%jZAU^tI*u0E0#!?6X&jbzm&<3$FggUn1JzHH}|_2F-oj6p_F!&!|| zSM!HNHqctY6uB*m1IhO&;fps5xuKZ>~PTkU}3)74=Xtvz``h} zCVC*867z6|-Mdv3$E(LeBy3zfsOdDtFuMJjv?qt&K#1~e*$HYG)b+;&&k*k|)t%j) zsI?IcC9IA|8VaqH%+}n1?-ECfUVz&?zKW22HZokI8 zqcPNdq%L{LfpkBr_Ev>ne{bXQsoP)zJGa`AwD`r>=;Wf1(0%UOc2a!IC zpv2S>1e|S_@r{F1WD?2pII*hoP}@&t)e4RxNle!$gtMZ|#0aM&x+c#_z7Rl599-qk zxE5?kpw_i^IRvK%vF3bx#cpEqINsI$vYY~ZVmrUfWnvyrw9Pmo!0HSsL)-sZQ58&w za*)$%U%lvX+@+hD85t4xo2ZQixC zc_AxeZkNhSuYc+`?S>#y>uFFshT_2L&JCmHQ6@(3(ebRpN4+-Yd9Fn?Z!N(LJjxC7 znWsudFLYD`*i^)m`L`zx;WnYWFApy(H{cD(n9Hds%`aYw-58;fTfOpq;Vc8MUjY&1 zSm5N0-*f1Z1IAXfMf@84{MHljs_!8Js_0~nbcPAXhJmQK`sg=RswT_47&k}uXR8Qk41!GpWI1`<5DJHg#uLvV-SZb3qj;1DeDz|J{m?|V~q z_9@PO>t=tTx@P#$)&1}3Uccvg*6PrDr%APD?!I28@Y8kN@JL)XkB!2dS1$CPP6g)Q z{k|3PLhG)4cO~}L_!((2K1hXTV+WO_OrR;)|Ef(vv#{=4V`O9dHJ1NDItvpE3y8hDs$I3(q;!^-S6Eg_SnHbpt zAUgd^(ELC8`RnUiSln@{o}q)Yp`jJs4|cUDu>*a&gLQq^|9wJ!+IH~YLRH55nG*jV zRqr23cSw4lLkDf|?Hkbcw-^sQ;}4X*U%dZ;toQr)*Zu6D$jbKT-ZuLKS$Cexn^=fB zHZQS*kTsj%uJ;~U9YM$nevhod3uMOr9RU~vm5{_R&okq=s+gAthrI@b4VkVR6jl{q zkOgPbR?4M6uY2WwJ`(@_c7WGYt8aHFZ}H37o57g={o11CeN}3nSSbaUGK)AYK?z*m z1yAjp!^SAZR!&Xog5#O~T-J)%!&asMRg2rfecsZgWoTenu`eg+1X6$J}F#eSFRQ~5{KL0p$QN~Q91($6iJ>V4pT z=2@^7Ua*798GY}*o~Jxdwth4RfXhbm2pQ$#H2boJNI_T_NoXFKUSW$D z`pzv-ib*D1Lk}H?Bkr9hQo;ndOzq&h#BQFgZOrFL34%uQ^@_uc7|fhV7Jh$yO)e)Z zj?J%I{&`HI*q|w+JZjpuuy7jt{yRy?7nHiDsiO_+82IYIIYO2has}}3<#|RLV^3FG z6d;54N3{uY_pcIbWh|p|x!;zYS}TL~pYwV!t&V5pzAT}t(lk+WfV=I~t3vQstv1h7 zqEEmf+|O{OpNCf~VHK3LT+?|H&x++y^7bMH^LRt$y8^8L`i;jo8`smJI+Oh?t9&Qd z^~_wq5By9^2Bj8hYR9!!F{Q?r1g5u^-}p*6#7e+uoeXmASMB+p=vRNOAcQ=9Yqb0R zD{WK2RKptos7Eq1!SuIgG*dTSPm%8OHj)--YlEOwPhm7H{5pHP_}PRnm|r++&ej@_ zTA!hQ-%Y7#4zgHN=yJ?4tv7px$c)@IudBL}LzrcG(qELvHKKf}VzY(x&Q zkQ9Y~g%J?6-e7*DzxXZphD_i4BW+BL5g)RY`+@X$$vz4eYIMic34@ z3KTyhQ|}5F(vPN)1f45Gb)1%qOSJJd1|*j^oqb4Ns_>_efK%8?YHUc=*CA=KG3#w* z9G_6Qm2$9GUoh9d8I?><@wHW5Zy?}*LKShv641^21x!THh>0Nv7HvuhjqQ;zP$Ozb zK5G6Yc0{XnMVS(2j4Pi%Ygp8$GkWp^4?F&NBjQ3_{AgI;eFcM_w|x-uaX$4Mg^|HA zBN#p3#2E}F#a_Z@xTH1+j5VP6QN;jxtos7h0|)%-EyhMQ>*LtupJ=yWuSF@j5CO2( zP{XbQJ9A*Sr`(H%J2Y^#{IjSK!*kOptotZ0^;FMhF0nHAEp}(xcw-xmjP=Z9#AgA$ zItg>1m;DOx(O~K78EU|w;FYe36V!2C;4#?Rb0wTt*-0GuR{e%>HAzv-li8j^3YVY| zC7W>yvfr@zD<%(ynhtXe%;la&mzCqro7L^hQYyt=Ebz;d>0TSXeEd~Zn%%rF9Bq?T z@kKiOW~!X8`^82%9Rd3xRlSW=Gf{?iQhjb~_>`tp?f4C`>e(9fhi^&s)5KygChYbj z(RqPZB)j`T?-7xxN^9jYx=V^}UXXnFI@)msPATV2IZ@;{#vO<$%I*54IK%~w_nFy; z8(lq}%Cm9HV{~^qNWYhFmCC2*{NeO^3npRQEmuAyq;2iIbWq@Qwt~27%eo@^t|MJB z%@&bR%TKyFJ7X>y@4CzC-2QqXB5&ztmMI1v=c7ShX2w&62!A9p_(jjbg84BR?sUOu zf1(z!S8VNKUmF<3@UBrHqYqk1ZCiG{NNGuloZX?1o+j+-zrEIlcXsVkl@2^w_{PyN zy-wPjgzTXA25|e!`wFczfsDiHe!UjnY8s-avaGF*`Ni_^dbw z77A0ZPM9dEwDj`T$6leR=@;T5)4Vo(6)8a;TgJq28#6^#)I!7;LpaA{Z=ZQlbbhw3 zhUAQ~WzGppgMH0pmjZdF`e-dvdD$i`;zc6`w{ZSk7Q`f7@G01-`7u^Wd*EydhUfUL z)5o(i&RSz24R%`){Cc6%TwK-bEj!f}q1k;9_VT@{f&i_XF?9G1z1^|5yea%e z+H~J-R!D2U-?mP|Emrr*Rv|LmuEq7S;ibJ2lvjIeO5G9A4=eYT?&Y)8?U7WJIdePd zI))qgaX#2J*7sWUH8$!2OwF_%k2n2b$6LRB<1>{Dy8ao?GCjy^VFwuuOh6F3-Sfm>RF}-IV~Vl07NrPY`-gKL75s5&9M9xNB`GXv+PU{3KX(3 zF#s6ZKuX5%t_D^{CIFC`;jcI!f5Fx8AZ>>Q2n2wB5PzT>79bM<^!HaB{{N55;Xzst zi0%L^pv!@okeP`C00bq-SP7XyFVSPVJ4b&3?f*yD!~aG(cBThOJ4`?p00ZdA2w6aS z9vdsi9ollR0od=GhO?eMz}VEm#8D4mYEA#++aKskXJM*mr)%f>!;PlD zbEoMob@lD60rI~Yv-h6#&rZdIL>@+FW&k4-6X=KVuZ3r1Vg+z;u>9X#_y>tPjG#Ll zXx!tSsPoU2XJlXnu&{uHp1(rW{7aYqr*j4VYl6nThyL#cjr*bmBxu|}o$t2yLI`O4 zBd5yrL+H5w#oqn@htR=vFLeAdx61g(@XWsijz2e<>7Smwd^ug0B}m|iw;U&gjuNth z_MmY$QOwVSF=+=)nU619OkI`FHkgfr%*;2599T@WCg8dXMUJ%nzFczfOcs7qbG33r z2e5xzyP010>L%Xv*6Bl)b-FW_^D`H6VW;;k7kjsYC)OJ&Ky$xgyB?_N+wd!TtXIv{ zz^$FjtaZf&gF4rshW*Qm#c?ADr(=BCCwcZ|G3x3>xcXxDAt z;wy}9(jQx^GApe7tXMpskcLYUvNn4I#M)9&&@&+q84i}&xmvB#cmWWU5OfC`&jHekagT8MDvyT_LGH-&pQj zH%CBg4D#>{;nhMHJ5ck;x>cOiYQlk`HA!T zwDGonw=-hZ=}ibZtp^av`aHh`46Kt+uvtLb;Yzdq%sIJ&=0Zj`*DAub)d zOY(v{bONC&eVqCQzDt8-0E@sxn=|Vw>n*({aF5mHI2L6W`-4-ySS;~$!QzC3Qf!>+ zQr*JK4a?EoRP^@N)WR^RPfR`0r6}#xlP{qMc zZkcrW&Dps(!*KedA))vY2#jx*gNZNMTz zK_8N5h&^*&Q@Ca55i>BYLAE_ZM7DyjKq`=e+)MbmG>Ag z61&|~g0nV9%Q_u0R!I%gU(Ao&7-nA=JK{Edf8Rw3vI0jgcq2`k0i~JExWS%*>2o%l z0QYF?0gLOqTg@CaY8O#rr|b?*cNGE*nW62oIETfFk78!7!ien^M!VRL0{HX@%Z!Y5 zwi05_uD87eN3oQaoSt6^cBbxd6_&>3V9z(~>}1t)#Guoj?-b>9d>EImci^}fTYbTa zClnHgB=*JV$rl^S9d@JGtA*ut?eEfzz`<6pH{#9~qkEsjrOK|74NfSB?eq_YKXwW7 z_?Wo)T|p!~&z6nrAbuvlsT-F&YMw;osSlak)Y{!ep-|}a(aM2Ox@`|`c?heWU`if` zKV=CoK+|=&Ew#RG0&Fq{67FfP&+sG0$i?<@BVSnzFsKPbGw*2D*eD_z6NSQYH1lS{ z7O++auxARHC1{I0bKiwn`-9LGhN7+CmzgcUr@W5K8*UAatv^ZoL|efwea4%zwQGM` z?FmSy^25yAw)YG*0yfts`$epKLE0YKHfn}#ND_S9P?R7~T->NEw&^-{ZV2In$EY5D zuA~LnGu5LpaEo%U1z-^k6a$|7y@o?A=Q1(vrDz2oAG-BRKNDtPzou$b=u`}peWQS< zr<@rZ3CUJ|EeXw)og!l9G{^;(8^;@KnJ*EYZ9VYx+at!3Hvl=a&l6ZabqA(~a$>q8 zXW0vN=-lH)+LBLvQ7`fd0>Sjz_-j%8(HOgXKYTQ4oJ0k81lw8c{CtF-nh>0%+pHCt zt)4bq%MKHu<~AB6Q{Q$S;b)T)tv$!)S@pjuwMgz{EZ`|Ajt)*Z)p;3C?1|!$*EV=i%v!Oe+#%nK4m9&Q!GY7y zc+(>im8dvwyk<44lm`bG*fO|CEYCUd-wwS>6?`9IKO#Q-)YyDZWE~z@7hw+%e0+1w z-3J`Wu4?D7eYCJ3AH$rpSv)3jPumO-v&z-OY>kL6kWjMrL-q zC0bHuMYpI7$}c)axNG90az}jTE_nez6*vC)?EeqF%7698{S#k61swp$%KBH}+(YSw z`9VSs8>on72OZe&YFIW<4a>^N{+Hwu{?Zbbo%unc4hzVTWnl&W0bB2av`kEl|0n5% z`9Ycu6FVD#m6Z{s+5C&unAm^-W=7_}gj*kcnLkLPVPa(iFoKTk_pHXm0*WNCv;HMV z`xjs550Ym%?y}+Re}Hs$W>6FX_z|tQP@cUaW2s`iZ zGk4n`c*^_(PnqxW^p6;NzmNazv$Ow6pI!YQFFWg9v}hK^^|ub*s|AN+2{=NT~9y3tys(87o_r{rS zL`*$uRwbj0;Rlzua^|;}*FAi*1MyEsTAPcF&%-mSdec;^o~0*Q7YX2hS~8GJH+t_$ z$+7kJNYSPsNi}Yd{XloO;+n_(()DZ{4M(18(=sg#=k{%GtjxT0o8zokYI8B?au>Ub zP7A`P<6``g*gY;6C7X?R6Kb9$7GGDn-YH)-TDs2TP$u|{VeS}lhR&UtPCAG2`D$&J z>!jGc;fn~x4rVX$whvq{kv}Lw??cF?e>N&Xt`lTn^yX`puMA(`8-2|a_%S2#R+tPO zD*mlF38J&d)ylxv+Ha|w1~XHb7S^*z%}I|6n=2`|Zn6l;C#l}|pP^2&w-nlQI;LFUal(I7;> zU@bKp>{+6u3rsaLM1e=zgsZB^l6Wm{-Kd41lhO`#IcHYN`j@ocJ?eV2GM1=fnwyPM zsI>72ybLWwKV%{oj|FEWu`hIVUAaUnhD?zk!6tDqyi0O7$y^Whjq!GN1US_KV`0>TT~~nuKPnXIZBw<1t`Lh%y^v zzy$-uNED)3#s!9S8RtE_c-<2P_|>1*B6z%QvrKW?iI$`#gQQxVvtdgnI_>6w%p{W1l_~luftXs8n(ziHn2lw1!LL}b4N_4v1NPNpqTSwQn zEsLO0YW<193=IvrGd;j;aG|9bB$B_hy>e=f^?7=k+l9BovV%}pNjp(bxS^59%}`3M zBi+es2dt57{i#`7E14^TFVp!4D~BO=<3gZ5S;XEY)aM%XU=nsFq}7l>>0F52+?Oo< zvbjsQd0HD8s^(y!+OMc1@xk8D>ph-|uF`0frI@2*2B-Vxk^n0z7`v{QP35dwDXUs$ zfLwL9>42ceYFPQWFn-~S46Cp`d6|STJa4`R2!anwWTwwbe%FsEt{WB;37EI>$=8_4w=edYlSI7stV5%G0@Fuh@GKa` z%s@RlN>>eOu{(^MCI(I-*uAq?o5fHJ)`QSc3~%CNdrkJW8*9mF>_HGaNa#M28WXO3!r*5i#R4 zN9!n2lKukE?sDlcJc4BCvjMV~tKmwLTjC%Y(dSOhv*vA)8KOhWf)>;C#6p8K6^ua+z#S;RJ>7hlWVP84RBmCoei|W6S#76l9m!R1R#A?#bzG-jN z50bYq$>%pehqe`nRZ-fWc`DUY9Y@P<22-Y#Gowt!rV^Z5rD$<3Di)w4digdVp2VO* zRbBF`ysvg2-BGtwSxM`Keclz0mWEaWth?*bq3vF#1i9o&0l=aV-d#m2feH(@1n?dZ zg6yF8+-->^3O4pFbFAM}^8~o@q5|4tr?1MGY_Wcby~@&ty4SRZx@@~A_GrW3%F5u( z72E~M%VQx|(Ty&W(u6H=i(htVDCdjZJhD8X&NP;r&R-@&(IBWn8D> zIR`ekiYH2MtG(IV~Jgn*$pejE~FrR`eXyUVML}mq|_I z7_pBfpweGXic8f&HG6dcDY_x^HuJ3G6}Ur;{?5-3j`=}O#4m<$5Aq@YUI_P~oarxz za1YWcel>(+d5}`^_d+<92T2vb7Q+4PPX6CQIOhAv^S?*9`^U*0vi*oeGvA{h=<^S> zyT3L;|G!_C{}GkG-^Wi7j-B~#zyG$o7ld$k-Myfww5?v3c;!;6XQZV%By^IHJN1gj ztk9kyj|e}S*5%hG4?5#GlE|oMQMkkmR8dz6J?vFYI-;PY^wqm|GIq&z*GS{@bgb{R z$~OXr+QADz!^>x@$EP~Ow>KLjud1%f;1fMtmT61*{JN=|wCKGWEw85DxDml8FM4TT z-`2(`mKI7;3Dh~~?|(fU*niu4Nz!yno*SR_y5J0HuLWN;>B}wP+Y9zv z?^YJOYR{Ms=b&eJV**zf*?Z%NTdt2N!>a@nf z>ibaZXt-u;t0AjVcT^cm4)CbI6|&sIQ73*t+7RLt7?UDn*0{tYvzYfmI6MC6A)L(k zjo8KO)4LQda7lb5!%-l(Rse-_tO$^Zd%buRm-wi$F_?1el%h-8%mK`eH^DX4JFOm^ zbW5Ir$6?w;Rd$kl9lUH@jb3e_jv5dIS&MOCdFIrZDJhi^GMBN9W$_h5HNTleuDYS) zB1mEH9J@s6<)9#8i8tO0v<=}*r?lzG4Yy#jw)J-NnXkuRiw1h8i0I%P_afdpIq}Ja zw+9i^JJoZND~Rt)csnPSoO_{y>2sQ!`vtt7{>B=-QSbqWM2iZ4ishMCmqM9@Nw?-a zb;X8!1wDKi372s60+Cb}QGXi^@dA#JM3kJfvLL<|GXt;eV~x2Yv&F||@)l5l7PT4_ zoZ_(->N3~^w-2OU;`;pxS$&!_3)CI5ld~dRrBuuxP#j3KTo^A zT`D#8-zGP6E3Fs!7`)mK+XqJ)0B`D#qflPz&p%USQ5~rpx8&u+CR~WP?LNKfT_9d5 z>XIiRe*#PjOv+9qFiQ)b-J?O89SDIK6PRJ@#fNaVohy^$tccND5u7Uyv}n#4uZ{rY zHf;ekgpA^{P}DAkRLe%9W)1B@zKY7NU4W79H%oq}NqcDG{>CPu`|Bn6)Mv-V&Sy*t zI9s%m$z^{IU6n8{UGMS!1T)T$po?>8#T_&D7_Ef|xzGYqg+ z-?}jRi2=DTS85{6m>EOM zRJsv5&%mCCEa>tWR(_1R>3)S_d7gH>3(cy@?46wjet460=r3VFmb}BYfDy?PnfZ1r zKD>HEDJqPF-%k6*PKQ7w_?Q}_^XL=F76#F27qWKKE!QBR3JlEQkzgQD1zWe;9aT^E zihsGjBdB5DV-DG&jC>p1CsS24Jtcve{ByBu>N25+so(49MfAtWegf5%#%-O9mCefJ z07?`m+jagkWobNS75#V;XT+W=!N)raV7PvmiJnrsEkyDrU}AEs zNK!P;Tcrdl?s`@X2p=Yq*!EE*wrc&{^M~S-W5~Wb3l*>R|bh0NT ztOSssm>gUQSlL)1BhuZ3s6@kzcnV2e=Y~*h-!h{~&o=!wwNl&SJD|r`2Q#=TA4%W9 zwIC&isvT+m+ZO0kZc~-_f=WT{xxmeDu zkd44#wu5s+le~~haFIP1d1?KbzP$~YYkutEgUA=}zvqjBoe?b9(7=LV$`J1_f;N<+ zn@5XiUrQWO!U>6KMcFS!wwm%dLxs>kJ>?DVFiX6j=YXMZDHw{NctgD4oGrwNp{^YO z-aV<3f!>qQ8xEoFyR}+ESwCkp-}g!e(b2>vJeP6b(9(b^O88^IlX;{9^5=etTrtdQ zYDGd0eDIa1?NJus?Nkkv?N9JxPub2?rg!+1PV`%U#&IkU((QjOj$?U{F8{aUIF<)x zDt|SO1NF5&pgH)LN-TjmAlQz~Dv5GYaiERZQlel9?3SDG&ZM8^5O3i7d`SK~SbWSFhuygLv7=;8M*%uZC zuO0l6t-?QYLU+@WHt1HyWCux-DrjyQ-qa`S!4^nu#w>tPZl|Z|b3~xvB*(gl=Az7a zhsLJV`;JK}=l~XcH9VsW(!}J2Qa)?vtcYa(^!vWQhTYw<*#$0}9 zoM2ZgEl1ccvW!OnZHYf2WLbobIcO-nHjf^xirrA#1p~gtVSc0YvwVRHl=>4Rl_V-t z-!CezLEh8w-Hf8@N?|ym@q;m~%3}C2>eB6l5$|R@*4L zFQ$ird%YN}R5OegtVC)Ova7FmGDNY9i-?fVsFN+SgG%a_-?2uSz3Jxd#$&+vVaM@; z?6@kHaUqZ$*JR&CWSpn~vg5)KJObLZQqHcT`+u|JXzuJdZaM?75jW7h7Lt=kbde?O zBrW#Y*(Oz2ZRt4$bgYn(m3mkaZ-FV6*2qZX7y5i3aIO~|Yy)UxdO&vE+1``KAUkgB z-j3tEx8u&@zRXEDqn_*#rhTe@x3!$3XFk%hZ(!}#QC-($r@q(fir9BAdr(l3iXvG?CDeX8AlHhogHA|`0mieJz)m+^1>&z=aBz1)XQB^8DwdQGmslORH&e5?o>YeRn?Ga}fy1=Ut0^ zUW&VZjO`#FZl7x_XA|VZ3HLK+Z2C@1(_E2Gq}chiRRk#6FCy0Dd~Qw54nQES8U3<0 zkuoJ>DvGS2#eTgu(K5ivI!Gngy(9-k;cd6 zpVvRj-1|H=WHLWoS%DDxYJXF4A0=wKmlqv~Za5bK^5MdGKFV&=-TQFD!`iIwARms@ zU2I|YW4EK!w^K^*P(k>TR*|zMLdt6Ij&mFMoQ)>?=i!AsjO+=IR?Qwia~7Nfo|WsE z9d9T{N3)0U@*+Huj(B5p#maMbt*0PsqXY)jH!f- zCKLzqP*Z~KdDKv>L3}ak{Hx24tI?6S)L*(`)Y534=Xi3sYB+~AGU^pHSkZco3x%d> zEGED{_82iH8kc#B0VD3Y z{p^dKr3MQN04{E1LDE3?g-Cz51;=(g`NFZ>b5>OczO-+ADVh2dM=zz%=}=~xT_Z&u zzj8QDtZ4e7_Gog|qRA;TueOxi?_rO=EX9{1PcrWTsBsy|43Xm6LOXz>lw1AXY7~j6 zK15!2Ojh+{n(Sw+)1e@#3x-HH9Uio9+|!|l4OY9RU%K&}ePEA}t-dceGCrU7L$qw{dD z^4_$#yGW&Tkp$f*S!20$sKY+!-sDVBV4(MzfZ!K9>TvYf1%iE9=Ki*aj1mc2iHiilZ{4d9b~Z4 z83USIi+7N`J8U!^!zOeDy?ZU`!^w`|JA*$#Xz$yADZ5DyZ}<9pRJ34OMDM^+|Lc_V z@YgStCBl!J>yDT{aN9xJ^k=+lL#Mzs$d(2SAG_T#@R$rmLHJ< zOU7n$NmhGKteWp4x_n@R_9>6mw_GD+ikiWIXeCJiDLcrHRH15E#I@m>KCC>j3bpp? zy6Nbsz*an&gC>AQ;_)sAPl_(U8CMhEj*|48w5>s=B^|0QVp!4K=)*@&9pMUYwiiO# z@I*KJMmKp3J3Meh5$3pLQ|Q#Sh97hdu1wZ&4GLI8m<}Ld>q0U*KV})zW+0SqKjo8s zY<{f@Y=l=Xn*r10tdi^^H6h|s0U#f6e&Fa9x9k_lI!xKtgcku!&WYdeBM6=Z78WAe0GL!aqai>|D zBcF|5*t36Nx@^GFb5^4awMWf49slYa0d+bH{db%X6Bd_f^WC(=fdT* z^Y(-%OE+Dn0xfscKSOT=(tHfNlR%lup8cKacmK##cHLzvF`sLUK*G9MkShD^QYfLQ zDA}?IQYe+(nmT`bQKSMDy5vF~xd;BfNDux#Qz=I=w`f3IyZ*_G92-_8>MgjIs;WFi z5oARmoyT&lU@=`t<(Z`(77R(!wGNtpY(0h_<(o8a4-t{u4<;R?lnT|vTJ8N(6u9PPO%B5GF|eG zkDjVxH*(f44>L#bGmFI8*8ISOI zeUo3Pw*s9V^XE|QTTGEl*&=KoucsuVY}T-)hqD4*n?J7!*~>xBVq3lU9fVf2*9IIsc4J5|_l;on&2D_OZb+#8hXIChUm~g$$PhgdD!UQqN2gXSYLx1f}aG zK8T6XmdB2BACVgX!X_AULygAh>GS+6=310GW+p%r9F!PYLk_c8LZ0euZ_TA2KbfYV z>c40`dHH--r@P%jn(zr^p&Yq~Rwwg9_pKW)Cj)HZu{9?1y968AgaS3%v6p6;@Z?EJ zU177dMh<-h=C%;%nmRG|hASb^De@9I=m z{X)1X_qqV;J()S!D@mu}SAkiT)cSnY);I9V&rSD#N^w7vaR2lhWPdS=`&pgy=a2R8 z)ECG4$BOAcY=`{SD30wxQpK-EacmC~EB;;-2kL2ifDQX=QQXgd(*G@r1GNK#UiZ#(HnIfvD}C{s`Ice}N#1yT3N?w)b@RM>FnzA3rhU*noeE;xzsls&usI5^w%T zsPfBwsB-duhbj%#tbz!$#rO3ImWPME67!|~`Piv7?XrZ^uw2hhT+hy>Rh}tt=Jcj2 zge2FP`F=mM$b;?o$j9TvZ&5>n4NtR8n45dfLEK@T|M5dJC~x`$ZV!1 z`+SFSBX3U}b`YbA3mN*((CwWLwG=eG#ih!e%W!8l$q*kmWdvMSv4maXciQS@sY&yl(s(B4hlQa(yW zOQ}J&n^ucKYZn@ZYau5t>n{qlTUw$qQp|#^Jzg3tg4*gtBm@S$-Y#zvtgns7a@a5>Hg`U4g`6CDQOl1f@U`auIz$+e%+4 z;9rUxTb3NiA8@`GGI!n83#9=CDr=eV0+rT%V<8o_3VIzGde71EM4ev9*uAB#@u!5K z5452{Ad}$bQG|7LkQuq)z_TzZt8}cBf1?L!vprZCI{GqpU)fd6dm5IUO4LjV2}fqL zeN*+RQ{fa~j**BEU?XlMJF4+?{V_n%yDOS91|QnotyYl(z88xjVh zBGcD;6`fgon!Yy-w=;<4f@MYIUg<$&j>DPNx0g3*MQs5dg476wMVLTM&3CUCZDcgI z!(Mx#bsk4yot!i&+dJo_Ial8YDr>u{kGv#0_l%`Kv&4$B3-NU0SrhK2m72(H7mK;) zC0fs-IT2MW4St}QjmzvpsK|QDQ3`O*0UA!A!Kf3JCIOwyclwr+q!ble_UxV5A&J&MoOZ~LV_oJS=tTy9rO;zt@c!k0}AsFFcUvv~2 z9EYBrUo-m=seIb2%S5NZ=J%Y$f$8)p-6_6Dy#$5DZLfjf3GBKwj_W>B=?RKda)Kh2 z=K+Z?NtM+Ak1P_^1n`T~ByhDO*z-Oi)RCq%RtAJ^UIkX?zkj-r(Wu$Y25n|zFwCH) zBB6H^*hHL3F=l_bdlXdbA<=FNCOiyp?#V&QM94`qh14iefaRZ$Qzp!@oe~$LUer)UmS&BO69I_eo+edL|s z!n(*MyHCq)LTIgH{oo~i5yJ4gwS)cia|`$EUUu7X*gL@p#U2?Y6ma6CE08ON^5fJk z4reZ)kd_5{a;WD=nhr^d8Uk73@rPcR;J=Qcg`snwYR0EH@M*@kSEs<8X5E^81I7kJ z$8_aC<1X_~9x^Pg4L?rRDqIV{(5bj#i2>@lMnXLa>aYy_xn}Z6Pf`kxw!=ZnnYjQD!(xg4S6yF|9q$qkIC2Q}%ZxQH)Q2E{P48jTpj}cw%8J!)yy7x1p=#I#bo(VbLIg?RmSQ z8}bhAJqX~SGaO2_3pjs^Q_4;1*0|?=DKFr(;LqJq#wXXw;T-gn=Bryxd6m6Zepc;% zxmHf9W~ewVSxeh*Sx!C__AWZOou&k}18iPGYXs*4XwA!SVRm+pv1N{e@maqMSF zj{3uKos}xaZNsM`u0`u9$Ar~zzK3t^?QarulPbR34<*p>`;uiZXb>H9_~a!q0w+US zq=ypXd69*n?-<$QXG+C?3*ta?jQ$kF-9Jz6Anm@B z4z&G|q-6U6cWgi4j_n@q{s?jR`}hgOvH!XEUTR3$gWe5)*BK{c(G`u|jVqiy#hhC3 zWUqj^RfT6_KR?eTHwbWZ4lRMa0R5aer#EWBj)_PFHQdvq39QvZ_(Mm!1_~etvzXRX zjrJG-GsV+D?3Nprt_FW(X8SL(;pTYR@vY3~PJ4mVtRn%rSRMGoteZZ5DvopGGq zEmQ=2LtgH6>nZew15r{KUn?75dDAbyGh%;_70x%}N&oc5&Q|krI^W5o7u{Fx7o+|4nmxlfi}Q7k^T2(W z_V?!6WD-*dMvzkHbr%e+1d@>dkrX+x3EKmhsH?-bVdE~PG zsE;Z@auIq8Zcws7-CuY`nRkcP^jrQK9`Gd^9)FEZ@y_Z z_V9<}ID+-~qUIRbl@aUyeTq@!)RDrrX?2quRv~2BfJ7y`x{>!qfM;1k#BeI{d>y-1 zDFjPQI+t{%varfV=d^9}Dbuce@ZLnJv5bQfay!?Uokue-Wg-E-aBq{~-;d=xQ?e+P zhDuscD)08c?&wAO*jd**W&(3>#l4na`#g>oCr>tg67ppH!=v*;b!Q(ObX;#KW7V9* zDA9b`*g6=O)R%br*^C?SKDzWtoBERHneAoLMnWih4_Is>+_lBMWAbCMK?S#slt+6! z`z{VsZsJ5!{>^KQ4uBXbO&^t}&Eho78^@22+hq--Ls=?LoZzcP6-yMB^AaGtiTg}8 ziv^2pCLQ16QPaQtU{#R2O=ySkBTSj6le4y%=C<^4>BQgEx(?J8=jGSA_cfu- zlzPMp$328&skhuseK~DXBK%C2c{xhVawG<$^8pEGd;Q6EQaA5cNk)lmuos<}G3@MbXzmJz5 z$rrJDil>&hh*AnhhwY0alsXTIVOub< zDMo!w4hmF`M#?o=r#E`^2ozSbB2?xUC9s1$C%1U`WpfrxVVz4 z<*7-j_EDJKKTd!qW%x|s+rAWopGMsHjpJCZ9?iOkz8eKYde%-C6K6eg$8nvS*4Vy9 zbOsA3z^$2fuacoHeHqy_hQO?v1#|Y-0!g#;nGkgJzXsLO?Q#?D3pfgo9^zFg;C@6_=q9g=8Ogz?np0re$QH z4UK6j$JHyx@`+AlPxX~Sfvv{4QRjN9Q2d3$G1+Xfu?Mdutk2 zNFwz8w7N|Py^%yrx<+3^my8u{37%^*3>-0cuEHR*z-c$7Mt@4#w-N=btsg{jCD|#C zQB){_Ygk+Bm&`Jb`ro%28F$FwiAZ-BxA`_uN4S&nWSXl$zm-umLu4+Y~xGKz%qCeTJ_*2=wrGRG) z)SuW?$z->5Mh-2Ye@1ca50dSFEsA4*kSzbV%2TpGC}H@kQ5^e&q>5jS;@BS~R{Xsv zj{QMu#VC70;_mnH z6N+Q|a}@WlK;=*etW(E1ei%ocX(^)|2IUHwET@IQJy~ezAs$Au3pZ4?s|4~XT&K#6W-()D8XpFGvdCR4*h1tedGKzI~_l{d&|gz zIXiB5_DSi^h-2KBxpVL4Wj+9PV&Y#*O)eO^euvS~j)_03YP|W!lu8v>qa5h~r0*j3 z@k1?7{dbOTiN3vHZGEc)$aJB;W!mV9!y-to7PP;xLBYk;bil{4+_B|t3sBA1Q{kfu z-QSxp+{1JBmDw!U`WRf^jc-7bU?!{zF-#OyCitODk(4>1^{yrE1hsGQ5#OB`7qx8U z3~0)@^Wum%p2Iaa7%B!XexOkaL!Nrwvt*=@iPXhtD3f2%<-)Paypc`?g?h<2abW)Ib3~to7xF6wKd2wVQ#0r{tI{aHHaGwh0V|DkB!iiu(CTJ_>vKzYg%1dT_n0xN8?O{WrM zaj2m2g~`xSp==IGn5f#HL&)?6f)j%};xvQm-wDrjW*pCG zpxAaQ*JzzBuC`YLhm{^`XjrVLuHpwUxDvi1`7p~$t=u0~gyPeQry7{4p$^J>X7AQUrqUbd07taW{<#Gp4hBy$J+0l`RTmy?0JRKsmTF$ zd94LCA})W#gtQC&t}@OemITR;%%I${a{V}eH6^Y>5a|Y`Q$o5s z1VJS9TN{1q9N+gm|ABtvea;v4f3N^?cW~l zKaJfWS1M8bcd;AfN;Qgq7`y#w-hUdqT`Fk**+$9vU18(=ZlAoo&;YDk<8|BUyL)Pa;ip~1=t?ns?ymWoNfRp|?>@oY)2{0$**FF2>`N9-wrQ%? zYt3f>A535liffBRG2y;@;d-YBaU{j2Sr72l&pYusgR7Rb1)VWUH z%ZJnr&fRv^__5u0 z1&+)e$s}93Pk5gvrr$&M`(8M-a4hONg3`-46JReK!TX1>IP^M$oYT`n=aoR5N$8L! zLI5<*1RQs{7mjt{?BIa86H{@mm#$`JZ7wG6*;8Rc?1FBxy~N2G2w%N1|0iHG9BYmY zkWA?q=OKXfhXQv8s=z&kDsU(XC~1p%w`kc6ORS^SmGUNH5dxnRX9U|uWRIa6%_Csi zAOV}<3h@}yLx9b2BsovmcU7u(;n-<8VB-3Vq*$q*%BRrp{W^GK`u_pmq&b^0dH)1& z$Nvs*xqpVY4{G_VHqZF>%r4_hk{mSMn}imRU1jFkVoacMCPcPI>U_nv18Z5AHp;Gw zSI{_<`6veIA!wY57?E1so8e^MO*#xsUnf48gOZknH zY%vFG>LkmW!oJK3fD_9Dw)m4;^VFY;T`{5SaxHJ(!_R@!*>F{b`_0Ggg{M?Hqp zJC{kvxH18)s#|ws9E>AUxbXuOY+evT<+lVbcM%C4@-um5d5V#cXw;tay)Vve(&@?) ziqjPIK>vAeU>{r!_o81oZi&`!`{0g$-v{TcMawvsT*s|!9SqngZ>Zg#czrFhR~F^$ z`#!j=^~JXR<}=6*sErckDDBUU1^Rz$EWm%+SRgeTXe=P2@x8HtY<@#MNqBh{AFlC` z5VNJ@I&)%YH&@i~5MM}e)+J?xWkDMY3_gQ47LeE!jt%QDc~gqFwF~Bovj135o)4bL zL@MR}l>Vy6w+a#}Cu&5)Kn`ec(|Ket_t_1V`X-cFUAhxr?(mQh^Al_gWC#J;o1#1Y zPFu-Tt)X%dhLS9fK_BPL`1&w?yUfJ2W%z)tX&*PBz2O)r`2*V9H-0<6I}n4o?_Mf! zI3a)nC-l-RBVT?y+TUO-dh{iRX>-$&XpQn|A9q*ujp+TP3R}QONe=iZpT{3X`lDkW zE3O0cmM;-@U(~=>iE_0XW%OB~-Ps;)a83E!wwgmGObYlE^`2Bt=ZST0cU)0}{#E@c zU@sgY;G;Cipo2CTFukYLJsqg)Bn#1TBk@LmBXA)K%Df3T8~%YwciGVCM|{I_&U^B<;DZr-y9Ak->f zdeu-|rrs6%EuHc(=y71vYjSNVMsYRQKxUisC^GY`f-0iEK;g=$Xr zk3TIgtaaSKWu~{15CbORI}hCj)jj0I7(cq0+BP0JvG&NcZ5yl)5@yH5?h8FV$Y^A1 zd&gAss5pYU_Nxdg{uu#n#3M!3q<(n9nWd4O9ZW!qi!FO_^19C}lt*If)#A*9W-gIq zRoWBP5GzF1=v(WQ6*}Zelko59%j!iY(@(iy9~hb8n-TAFu-*F zCdNsl_b5GK7p+C7FR}u8N@dQb56aY3DH%wo8|dN^iMs?*Hwwq93P(Irlc;9*!xS&Q z^U{yL#zfCE9<8ccZKn3t=!=OP+8!13ebH<}M+NmF&07dd_!Px-;!iuJO{6H;xKt`b z%SDhSU_liLtRFcLKR@cm9&VO|Zx zq2G8IBg-+|K0L)VNGSR0o)<~o592A98W$rPdTGCjal-TXxfiEdU}+>cP+lK$m)LFY z`zQp>6=Pc=-8UMbj>ZmM1dfP!14(*w2e*Tg~@8%s&*=aJY6??gi zO0TnvM+)<;-j7jk6eI;*Ix1%sWiy>=210DT7PrW^-&CX;5FcXmpWRp)fc z>;rkI?Gn2yk~;5DgmZ$6Qpet0<{dwrFXk?rzVV=8lE4i(6UVJez7gsTzo^a=!a9 z#0ifH+APl8rf=%b)_B(bI<#4wmq0uC*4q}$an0YG#mVI$Up9-=$!YmQ1GQ7$^zD2B z*eSz(=VV`9-oDkt~*(45AQLaXCW};29#*M?etHzdkgX|g~V`VLbF4uWb zV~D#6?nDs|o~DKjjTHF_t$vBGKZTKd2?Nk1ZhL-Ee>-0tXc9LD65quSH|-DC&vTeX z1*_03v2OM$(?mSBcCDcObfe1>XcC9JY4k0ea;8VlgyCB_WseTKEi|0cRy=uZsP*@7 z%D&&jDQW&3PKgf(9(goh@$!i2a59LtFmo}@yk0V@=5#&AK4G-K+%bJ--6Wd z0b*RXf?-e!O6Th1mo<9ZkqCxofEecq9@Z6g2gEo>s+`JOQ&wC33U>f8E-uh{?xTF> zn(7^sRvR5hPrW*e#9&M}(5g#W>m1c$?W}nllivGX*SZ@ITlW!DC~g5bzJ$3>iI@V)hF9}i?62V z7kJFt8($P9O1Fu{f9JTk0N9(W!(~PpHEi3F+4^In(=Rd91eqiTn zzdzRhraf_7SMnGB(-gTMwnF~f6aP=+IIb&|EB?zk?n?EFe;CL8=$!sp9LEI}wf}~j z^74KHaNOm!7W(+zMR|D&LXW@m9oHq_{Z)~>e2pJ*+}{p1`L4+AP|KD5jfUS&{vA?P z?QeJ+2_n;Ipo(0|?}{9M-9VchiJOsskJ^Rz;ovsH!Zet!eHT5JUL0b{XJK1Gn~SRZZ)VD} zOEV?pyP5LA1Y=84bb))2Pwucrsbmi)egE@oV=eZrMx5XKeIx$f@B16UjiI+%vuGAJ zNBC26%B)7RDTGs6th%e|?7mSK+Dzu6dVO{d$a634C7uYWaAkD~4nKu97;tQAdBC;6$t@D^jpb!`V7=qR8-1bIQPvS;M8)NgQgTM9Uj{lAoG1V~ z#Zkx3+B_PQD8Sh~n_l*PDFII8DwLOZ;vx(NI>n(`poLEE-gTLT2Ag!38PDH_w^^#x zN>etVyVs2HN`rLLOgPt^4AyPfLqnbb2sR0~Y9NFLn}{XNAbz2gEzZXXihjoiTNB?l zRE4N7@KnI{8bixcLGYAu23x;m^q8&B1PikE#C<#1d(JcDf!!$TWjqDucW3SmmOgO{ zA9;MoC&ps;c;dHq-*mY#pYHys-FMKpaLRCA{eN%w4TMu>rUDGtnU^5^x+->5TfPp6;ARx;e&J9@8Oh^Z;C3GrW31X#!D3zT9yb_ zasq9F+zBHZs7k7IU?P_XCCsjur^z5p$hMe8r^qz?KiVl9B3XL}qn7LgVyx?oB|1tu zq+*VMm`{xb#0M%SB1Z39CR!;|BN>law~=X6C3-uQdc>y>81p+}Pt@Op*)O4sKf-?cqEYx(V?-u9E*FnNlA}rnIxWo|Tw{d;DFIE4x(WzCabZCF7o3 zFu{M`5J&XehPWu`hPX9JZD2!OJJ5&vazkA7`<}CfAnEsp3eXL49D!(=T}8>z4RM+A zdEHXPS!Z2&Qi~@g*O1KJHY!32_~m!-$+g0z5mb)waDy}|xKzetLCY)=5I1eDy=&_s ztP40FJC*reS`S!?sd}Cg!tE$Ca;SvLzB9-z!kucIx@j&}hK1suK60LZQB-UdKUfq@SSa@`%l zQr|&NnNYRPmHuXuR2!lZeatvbk2K%aqkVIP1etu3H^25>I>3?#Csjd?;` zzpz6yHPZnDE86V`Gy@qXy_39FJk|IQz+-#zGN>lmK%W5ye3^u^eZx|uHz<2;wks!U zEpLr09cx^|zQVw=n9uzX=dM)4=U{<=Ak09%7%L|P#KO+P!cNM;!UAIF;N*A!E#V5; zIv5!{kZM7T>2pW$uyk@&aD~e93o3$k55$*5=zYN~BCGijvD%ao3~jBMjEr53t!(YgZA_W$9BfS;^sTLdj~T6Pjf}0B^bHMd zoo$>P>3|=^&yNiJGqy2;t`(3WKgGn*J2*0Z8#kk)ktLIrzLT+|)Awg|q0iVk8(12z^i_g^LTs z!2!Je{{fTE!u%u4#ZTkAOPvk4xH2gkJK8!s7#cg0f|)Pj4f^EeU)hmVi<9e{4)^V% zt4IoAzT`sS@te~U!hGqp1dcDi^hmk&F3YW&rUE|lDTv`bZi#~v;t4_{+(=ELri_(6qe z+eMS*0+Srds`ggm*{#B_ss^6~*eH1=WU1$RbL8gF1(Jm7|RPZO|lqd z&%TmZf-754#=XvR+^Qdb=H@p)2x{D5@?|1czxidCP1 zuXWcjbN=PwH6x2!h-P>GK?1(GU-(KnmrT z+)?L;49ASS@0wDmEe3YZFrtPxa|fDo-|@ zd`mSiIY4zUoXvRGs%h(n5S|7yr%^2(4aHnmHkjbVda*Oh;6gdWAfSLd1PxX+->$%J zAlS8OV)YtQ@GR!rY0QW$YI*GsIns;N5A~VL#B8wUqMr!nv`x8&!lEW>WDaV}NMEBj zx@U*9P}L@)s3%AKgg5LX4>mv6{@VzXDnSITd3k0x<1gfDGrW^l5ibqWLzhM|+Tus{ z&s#)iojQtSXI+c>Lb+QoC5&Rn&+5aqdRshjKVJ*6zz{gE*Nbpzv?wQ)-3#O%pkzym zMMCF-%-%<=pfPFE5Z&>(Lkdesds3PFac7s-k+07Kf1kMILwe#u*OSBY>mXw@1U|Gh z8@vjC%L|9m)z1w?SP~?G2Y%X0r3Z^LCn^l-k0g6G1WA0b6a+W7IhZb1XWWMj0?y8k zagbeWb7idtdQ=3LLNIdW=q}7{)|v!dB5_iPz)ciL%_Kr$r2Uy4cNk1$GIF`+GXKo79k$V!%l|XbYV6Cp5@j=1(&C0eJga?DLNor^8Oy;PpUwZRBj=2I> zxshKy%d4Tbj(*eR@+c;%Xd>hmlG00x_b-!9iV7cZ1;eXtz+18p&KDL~sHhYcX!d_W zx<{m|Lgm^O@~M{*KKYS@RQrK;j8Zma$yd%SS5Xd0O@*s(BQKM-ls@-53~KVm7&+gU zq8KIm`GRE7BN3C&+4Q;HW~B(}ws8dxAs(J74h82WYLYRf(`)(3n2%IfDvNSfo5SoJ zr{`YNsK~vt>vjJsA2U*rth$1|@|r&PkUu;#*`g_1ncmaZ5p{*_0{oGsV}vD2^v34` z44WJQ>m6h{mI<*@JeKZ)WDjyKm8sMMO~U6Ya>Wi7F-kp?0%SqrkxDJLDL5~ltVVU^ zi!cnR$RQy0R;^FC&~wGusjQ49hjWJ<0N)JL{N7CpV_+>XPq|q|?g3nI?}2oTQi~lE z`m3YByyP?yIfOM=VZDx;!u%0PVZ7$p@JUKB99^n}^wC#>kGqA@n%SfD*{h$66*udj zElK1f5-oKG8`9-d#NSa6yZQX)FwH=laQQ}cc@A-xiq4bQA2c?Zjj#`fRW?3O4ClWL zF;5RD#VmB{E_Bk&R&rS7Z*a0Wv#(YK{^r~_S89-RRgn>gksUo2qU}`tN0P(1L-q^o zfL~g(Yz!uHX+RT_4Oh~-0X=ne3+yaf+*odS)hPQbjV}4xg;c4R?3gB6SWTVATvuwZ z){vly80s`Np*z0*1CD|KEe)=a8OX`X3<7g81G!*-EU-ACD{Xf0|7noAQn8$qnF|B~ z2KcAt6(@9^&BFG}#{5&4)PG%^{69Jy*;&~@?Ccx>QT#FE?9gR43*?uL{%2s+mC6O| zENmbaV1Vp@nsRpNDjPU`{s9YW2+NgBeyprOu>=eTc;b&KXJrMdB@nh>2a!Kv&RMQh zFaX}rAXZ?6f0}YuphN_mwqD6fAZ>2I(3?@B2<e>sX!Y2NU5BHDu-4Wic1-^N=b3G5eux@7aO&!ju0-|~`dw2IJ>b=^~x@U!R zvurSSBi?My_Da^WM>$QxGq2~h-c?O$t1)}s)x)Q+Js$c*JnMp0*0=X=hN&=ZH#sq0 z0V~^JT2OVsgtM1+3OC66Q(NIe{=CkXtjcx1BS?vw&3*A#4X^V&eM-5;*J5uIY)I<9 zPeif|ehMSYaFl3Pmu9wd0rp_wjT_bVxphGCA?U60U0oN6UT$pqw(30bn@wn}oihwr zgd-)HinEF>29XmA*YO`RoQZxw&8br;T||1}IK}PaxL-u{@L5u8oyM}!rYw61Hda(= z6qgZv*qLwi?E?;2>}QYig5E!oOP5`H%1rOTL8yk|)Q}EWkD+LY+MLN_kaonOJk4zV z5v-i$b^jKM?dS!>g--FY*Qb|n_gY1q*7Is?s2?pfA#vQ7yqQB#|B=65ZvXw8`lNht z3pH7@+t*KfJZ)a;w1!G_Q*#a7Je6-&xqTPMtxgm|$mq8-?h`sT7htf=T3uUoH|=r# z&{lA`8cvh!!qE}>k?t*FQN!P0J>`qjGfJbkcpV|Cml2-viHxwdT9}gHR3c{c zx~G8u#xBgsbj)bPbzP5;57VH*kv2CHOUOi%vGIL*7Q389*XDf*J}sdzxb%Ix8hhaXG%9k z&_arX9ZZ=#VsS}`EOSuv2N69#EVJEenQYJDHDj|o94{yafipbn_MMnS?|$l@ zobDa5+5P;{jClcMxtkopW*qY1>`)}^PRbF#Xon2M!h!5Q1|tGH4l&pBT{+pv*ofp< zQpdDMMmE>{m8?CscQVi};BS+=gwbt~za16cJL`aPAs{9dk6}uyFejkCaX)kw-cdYV zgw2#lUre6_;i%|Iq}e@{uF;rAiXapIiS4&WUHZ6Vbk_pRWirnKx!uPp>s+E|MXe>y zvtk9w6WtG^M`dC}j)}zr_^?U5)ypJU_t;b6Woc;CV#3T+A4~e;6G`{HOn;X((|gUx z7qJ*ZrlY5pXqBs)O9Wd?y5=RudFxdVmYt-EbgSW4rzVIdev5@dX0_8ITc(-59L;QH zNh-Pl==k-HWWEw?01}NZ_G%?_u0I#mF=OvWeb^Fnu29Wg^9LV!Fda8thcyzE^dFl= zx|ACB2u_bP&2twC`3)@@AUh)G8p-*Op%(W(DTRJFW3PGb84c{BOmBW!Ni=g-jwi<| zTV{{6u^jR9NrQ8uUUM;JeYqvO(PbeWeYsmO6Df3Jn{jQ)tJt7kfd52Tee!$rqsQ#; zVLI!}-EU2nvYyf1J6Z8r`TkoM71x3D(t^2E=IJ?TnmpIAksUSTl?>)ullyxhXpRM0 zF4-~7h8Vfte5RCgb&YEGQd}2QhfTjYJ$S>ZrXN6GMQ*Q_F7r$_f&OXl!TXdNe=uXT zdAbZ!JXi(9H%9sa4u2${o+*a;-3?UAHzSAHN|OGdr@{(RD6ak>J{VnCnK5QHuCke%QoZ-|~4rT*CkL!U2r72vWf_KJVQ#-+()MsFS>i0?1Hl?lNcpW?s)%5wu z!zft3aMxQR8+(vS4cdPd(A3W5)A9q}R(S84z zNxjLF>PKh{h=Nx@V-9uzlznzi`pzYy2^Q-xNl6$lp^KwPl|H3S+~Wn%VPhZn1K0?&4Bp1$Sz- zs&nzp7Nr4!F)<4=`c@TV>Ls2CdRHuM|5ERg-3bGOW!{KD0dGkJSxmz_kXw_EfX88YZA*WP+Yg4fivL7RQ+qUB<| zt|DTg?!#KKfQ`#IWF{p6Moq&_@yN9NG}Hau`NLtRa4R~c4CEtr;BfI7#cgg~IIAta z0g9~oF)Vmmx9URGr`EH}vgU|hC~2EobF4U1j>wqnBk0^l3|lNpfJs9=SfD zxpf-GeNB}mIPv{w|FwQPv3`{@TmzY!+j(?*ichtVyqZV|Q9o&{wz6;9^xj}ah-Rp4 z3hP}bQx}LXqJb zZ^FwB(k`{M%*$Ba#Fy88Nr-yZ4 z>;#ShjSMU7LwbBm*R_lCKoC_WIp1!Hjj1ULRV!xd`9nP7_}mckH`fEF4P_0@o<&k+ zkx$DLt$z*;daQ`2R?kfFfVeZq!N;c&!S3~v@m=GGnk8_UV%upjq_1snV)Qp295E0o zyvJ|#Cx-EULhU=&=b_3$%uID4{!DUSJjIQui|9=|hT>VS%>kOrp>?nvGgl>O%`|=_ zyN{QV%)hmKUD%}EO-iQbn(Iq=L`9VaEGrI+TmL>k0ZKYMB_a;;#PFh8W^-Oaup{>iD zXIr#XqS9<@*^fXrUZJDt7hkHXH*U}6^2qw&Q%_qzc1<$WTy3oN&wD8}_ZrVmxsJ54 zuW6t6K$wO1J*uxUAL#h;J%<~xyK7sr-FPN1U{&p2sNp#270|20inr|1aSiLYO6;#A zK7P-)e-Zy`>za0SVl^XLe}{v@5;2(WqnkP6?ZJ5;-D|}3nOSxpD=B)mc#kJ=1rou& zZClq?f>he8tj%}O#NdWE5&i6w;sh!X-}>G4tZWgV@an#(XHsihr9BKGe(&dC-z=P5 z8xy8EDvC>r>{1VZ#QX+J+umSQq^K^!ym9B&oWJjWG{4Rhu7_smC4&^B{z%Ubc%E(m;8NRG_|;+)3B2>PO_mt1GH$oVP~#X|J^wm6Ep)4^S@Z?qSbWntWt>+9c`Bj^ zUyA8BE1xdq<;e|FP6y1{g=b~t#F~2JvA_TH!mM`tmJSK=SOk?*6F%sehgeKJ+uI8( zCRI`JUF!-B4U5V}h z!()9qx)4<#i|)B#b;b8!epGdnQZ|)$Hyd)5lqOB@CbaR0y8Hk z3y2xa`scMWC$N^{gs}g*^7_wMH(jZ|%*oCSFd<;Q`%`_H6R5Pavi&;W=}%lXLBLn? zrLl9egTN4AU(6qP#LfW$v|^V3+f#m}G5|YJ27mw~{L_rH17!dX7S>-^2KcE{ex-T< zD<>DA7DM0gf6O^6Cm2wRfs_6JG9F#24#3LJ1<1vJaaywibpQykC+t^^`KM0#l?nnZ zfXy7t40WHff*~L-PG$geSh$#hkA98&)WFu(5~OcqXlCoc2srFbFCF&Zj&%*30ROqM zp|gXzll%WI|xxXS+`Tlu$J7%)%+N06zxlbN#t z$lUffkNx+}1dLYZ1`hfT?o8kQ3V`h%*l1v_Z|GnPlK-~d;D7jAuv{v2e^BMm#bWT^ z+gJ%W4WKe0DFpo8V0(GffgWGVkHF)1Tn2xa7s20g`Enxv1(Ppd^N#_2$7G;h!}_<3 zxLUeUBd*UtuKXBB{!qYzkD}I;-Zk9ce7M*5@(}?a?woh!mk8I~84~N;ZAGwLj378#<>8MCI(^`C#8_(m6l(<#y}Oaxx0sx9`(%@La9sFP$oM zacm3;wCkwcS5LUwYIUfoBq*4I(BUnqCJBcdYtc|Rsg$d zP$8mLsZtdd$vc*lhp2J9j08_>OUe{w18;dvgD9}QDL&9juWm-X!g;3X?uV~|fzp1= z@!W-_B!VV3i6Ycu=ys(lY<44!JCcH4FmXE83VL*$AR)V`Z9G$t_IsRTB*Y0S2eam$ zr_3E&8(2_hF)?4;CTrzkRrS-PD17W2|`PK@OAoF)v7N~Q9O=~XcrX5(k;_w|F-e7FQ_kCu(?*On~}^8QtN+M z5q&c;^%d7(!|P9N#x+ROQy-r9ZW5swBP2_OvL#r5X3^s@>sHA85JBQW!A4i`GPG9> zC*C~{BWF2QEO&1 z6ltNP^$}%TGPlTnS)^pkb?n{6bYdrYT*fkb5tjGt%LRmJ9MWv+RmC0dn?d?SBm1W< zayqJ$1+v3id3~$`33L%K6iii;R8n-6yYS50>YgX|t&}rm<3_k_Pm+s|USmgUY>`58 z#;kTGGY$>#Ng3JfG`bhyw=h?7Y@KBo=E05=rfwhf>Z~3~muTYNNh;jR9}=R+kzk~d zVWJ@{aDH*mCNC$&@)jmlCDO}BBO$5$!EZ^OUAjWq=$G}02$0&p^by3&iy$Ut@C~@a z0#UHh(ZiZ1Pdwj6M;k~F76xACx8kgKqxDEwdY3I^yxj0+43<;y%4Md-%O=Ezq|w? z|Ao8^p;?*qaG2^*vc~*$@aZ|NveZI?PzoFp^TF2`p?75379diH2{O*n2{*Ee^gzAP z08@XI5EXU`-6)W;NpQf-xQ(Td#|`hC?es~tUnc#ybyz07ADcdnZZuOqFW@@jo61{u zXd>w@zT9L!A(*4w+PCwbKOR%n^q-F1X@?p5-si|stTT(NVH_Ln@PSZ2_MTSaTqtwHfjATF2&$bx{}A z^)a7vHKqjV^>@jcBokd)*Rg5@t_$0keszh6TgM<8XI`jK^Loiz;ec2th+5FPc~O;<^0kOPZNaI5LdMIBq(#w)Z<;0x`iV)-4{Y$ty`t9Ce~(FR1oD zv9^py_>R>H=BY2BNx-=<0_8=geXWC93e>}=nzpQJSr>tAJV)t4*AWKQ1jT@ezGDL{ZC zzJ8#s0WpPCAYRDts520e6};?8m2CUcJIRl#(w}rR_m&$b?PXW4ra!h7PjALF8D$ic zq@t~Nu|!`P=q#t=BbE;Vq;xnD9i=F(g==?;zC1_bZIPM_AC0N+7IPau{*| z8}ZmUpmO2w3uO)nuy_Xl61niI>txm|m3#hV8~%N;ztA>(<-uO5%=0I^@b6Fnh~mG> zF8oWG0K$5un$MrS!@tk_uk;RIdE&2B?19oC7vK>73;O~z2<*E4C1UuMM|-8>4huUc z2q;|sm3@H>}PW=NFe=hs7Lgn`V94Z94yrBTBdwH>iK7ME5%aag# z{GEY;x;gOk{%V!Ie2qT_@S7wIOwiwB-QTRTMOzakgYkD7yV&v{!S$u{;p`W0rc3^2 zmCbgM1O@U$j)gEt?~uQ3Y^Q2+-`(%=<3#^5ePCx7!n#&($?u&wb7B7RG7R?fi7{ed z+_PsDb)N?9W_cM*1^9d2JbK_9JMG@7zk%f0eb_fYo_dV}qYm?WhM>2;=9R1`@`wES z4^|%tWL#sp`y+SBW_ym$gG@KXDn9S^wGC9H-GS4VYhDp!Zh6#M7seWL^x4EK;zO{I zWpVeAcK_`-(NOt&c<5{ED^#gqq_}?4h)w?XA^AoWgIN*lZU^O8r^xv{1t`h_BVJ|5 zfyie>OE7%cOfB+n3*0`muzk>eU*i8jlEYwgmdKY9%O8}n-RfD~&(vAK%X5c-SciE< zbi=x7Sr~VAnH{w_-~jaKnN*%PPH_Q4xx2CSkfqOyNjZsSh!9@-D|Re9P<$L&rxVkT za|o;yyw#kRg&F1wDVLx*HG`F4ND2bF5Ybao&NmVp35DJA9>gx(S|Jo_e2cZ2J9Jc7 zLbg&nTZcH0>&U?dQmgVb?(CgLe7KAWERlGK4~4~2pZHD=+kT{tv?&iCHHhFVIZW@4 zgX1!@jB*X-H*QxymH%AJ_~z4dnzLtU-miLvoLe_rKb~%Ey}Gsce7n%Q;Nt@6p)5ze z7{-msLc*OoSCH8Q*B7?s@4keK-7U7_9U*OdSBpv3fJNBTj3*{rAf2|YIy-)nZk3*; zO(Xf{c`5OzlONNFiI3^tqzf@z+V=r?)*KBo8m%Orv6LBAZtVPk7h3WGhlVF|BLq?&xce*q>8C?}^5GhERa56@M+??$5+8*o375eoHgCEXZXWjAGCTJtW^k*0 z(B8oa#OVMfWRLYC-|smuxG_WA@$3dw2Ci9}TOb?@&F~F((a+6lF@@lEG^^&}E~TvT z+wi;VueK)=72nFc->xL{@SiTajyOTVt+K032+4Vnr_q%isgp$p#~)acr&{9qO6Bb> zWu0{n-2_tFi^sE>O!oXOXG6Cw6b(wN+1Zg^oWqR*@u@|e!r~M3+Y21~nS6AkpXmL3 z`SBKm;p%A)mBVZ9O_+&}o2NVMTYPl5XY8kwj<#`X|7QKY(lL3n>L_XwT>&|sFxS)= zDN)V`*!wEWLTAzbn-H3Y%Cn;xtjuPq)vTq1Q93-h_4aDiq759BqMn@ODt?l1d$MB? zCPS3I*W}KFllTS{*)})on>1BiSYI8$=O|SLWxeXG{Y6I;UOR~hvo!>ny-suY?G>&s z&tr|7GeIJK6(#fFCU1=x*d`K7AE{S&>hZ?BJ+^Dw>cG`4b+I^dt&Oyq-B*m-`=rz& zp+*&qo8K05aF3BpgE)v>MmK;$(XSk4q&N-zRd+SRLU!OzdY4+<%9Oc`QvXAB&9ac< zg8DD=jhYcW36FYs;$OQhJ355$Xm{avHe@{5$cpD4x*t+p7Ml7p+5e*7J{Yo_aO1fH zwTQMIOiq?NF1eiMYO*^wMx09?F|;QMmmf-h(Q+u3J^lW?+%Q-d=L?lPMzWCxgVzL) zdZnW`3n;wVp+sAo6gvUl6%`b&UNF*=>fH9_e3GA6r7tzc^IePj)4mkyr0VF0%U#l0 zBq2m0@pmMR@Ov6@cFbmlBs+@0Yi+X%zPXJo@u!`sxwbNNB=MvjeP7e{e5 zag#J#Jdko!%Zf7cakiO-(9_|-{nZw@9y2p>kxo$mnR|g z@w>cvIdT7raDTNO{DE+PyHn%0-Hrgl6+}Q0j^l?2cifV)5MK0(yhpL_Mmdvxm%Aq` z&pG%xPL=>CnE3H?azFfnXK5y{eYnrY*95-g^Lr=UJ6c(4+dk$~R#g2|IQi@o>tw^q zJ@~b(d{1;tncC{FY-c-DR4@$pPFGQF6lP8eypVU4sHQ4%P3`(Lrd(oo@4SEbAdO_5 zq0j8)Nki>d_u~;SOf~SLRIXoSb5EUxsdCbxr{mxbmhhP7(vTukL4=B>C_<=+c0`<- zQ@32rE^0{pt}qYbe%%XP6-(Kt;y8t+!8KZrk2XwerFEXmzioWs;7eRE9;_dvwz2rc z{5|XO14fth$)Nm)t}sI~WLlNAcR#)2Xu`KVK;`A&&cLLm53ABWAiKMFKp4(>t#QlG z_Nn}NfrXO$;$drC!Rs&0A2+9&A_=`68oqomQng&Un|7kw=?2rw8R?o-D%{ z`X7{uDk9^OVh)?ZH}HuugU9_dx2d+a$mrRYC+$HtIZUzFfz4!Y7)LBWw)!VG zPZIaquj_+q_PF#|s#rPW_jOCX-Nc=AKPfqrpmEF@z0tya6rrFpIZ^M}GF6M=k=k(V zy2Z9_jOUM#Qo<2)BUBFPKOdC*KB45yX#BLX<<`~_QymS1g%h@1zQg86HHUz`{e#+* zmv=m$_>fIn_VZcMj2;OG8i@-;_0Csts7;WS(iLe63e4;EtnKD^%$B#2;kiwN#ksuh z;ix3Wx;@PuwWF#E$(`)~%&1Xhwc!<8)>GMxjkjfgU_5%>y~u%&Av58xm3<91ZgZ*l zt8bk?<^!xy4$Lv#!Ur28>+tK$>h3DONulelKC+SK==JYEz#^G*E;!e0vRkgJcAyyS zv47Efs;F#%KKzz3(Yy25MA5o2v+a}AlT3yzQWf%hFR775GF(#BlG=9grD?JJ#y9QL ze44oGt%-*-!RMB2vYua~c~%E+sELyo+7SgM25Z zTd45u?0zh~fm~McTT8TSx+)o)*gR#Tv0^0AI%^`;nd7B~TN2qyuXf&2uj4$@V8WLd zVau5|XS>lFpqyJS?d&oXj&wrQU!Y#oY+)TiQe8i2RSl-|wQt$$QDaLR9l zPfWzNtA=464SMX%58s;EeaB{mpHMPChm#I|yCy<5x%pwatXpsL+s@myGAIbmp+kjK zaTp#?5Dm5hi8H0MwnaUPYY3`F6lw9UrS1$}0vxBmL%L75ka2Pat+lt;r*_(XO?cug ze&Sg! zRNNQpZ?BCxY&UxMA@5Cx+1u1^iH#<>A_iu7(w#`igQv7$5-%emnh;{%DG;d%<=mD*Yg ztL(T1igtED=n1xH)cohVT)*h~>0zjd>R-S%g_x!EHmo%CXmKBKO|}!0I>@~>b3;$T z7SBDE%*S)VVATn!9N_{X&}7Qf$@Kd@mWDwWt20fXuf!v(&Q-FTnXOD;Y$V7IL`Lcr zYl0w{VqUw$R(goj8W&3onS8ANrqXiXXyDv{frz4~rra)A3Y)N%MIB<2-wArCih9Os zdd93wWgC!C@ZuDb>#;kXvY9(q)n<=a|4;U)}W9Idxq`Rj>k_D87@ zmEtB2oq`Flu&x_roe5M1C&)$x(tH(jO#Dbiu`Z&ER!?A1doY|L7!@BAv59u(N6oVO zbVWpcY!iLve!gUHL0|YAe(@;vcYIuTZjX{RR6Xf4cwk}=I@H$)qn4|04=;mk=NvP0 ze>vIFACu50f1A%^wTX6HKRur(Y&uQKHC}e*MG=(U42-zcbh>lkhVO;+o91Q*+?8$6 z-$@~`aI$I82gMxdMf2i?1V4A(L`~ub8icU+W(&Q6Z%+C!lBJ4&kH*4yUKXYG;h8~- ze!n@!$f?aHs^vM4bAW7$K97;6T#Eiad5ZoW&qej+1@1QP*qv%8y@roCm{=YK1B313 ztN};TgaWB}gddBICj8Y?^JT4kX|qKpD68|Oi^lafF?*;JYuk0orF(N1C#0M)9~gu& ztaW#OcEVwt|5|>i?L<^DI!bk%wu_lbKo_!Z)s4V{ENz%u%EMi>g1oKUXsq+2{)`Z| zD^=|OSpWxUg;&^-`cDJ6zb=OUUvrB7i0t|2YjA8=DpLI80PadfnjZ~9GxJ5wv# zYX9E=E>;`R;L69!i^Ts7a0@s61UPw#k{5fq_7d->G1+`&J1u4MIUn&n^?>agzkdtw zHOY&G`WjuGb2p!sy4MWMrl@L9ox`3W<9$kF@;-Bcg+ZC;NNwp&x;>SZ8 z;UjJq>;rloPi9%}xJJv461Lkc&US>3LrTL9k zWOdpGO=$PH7oso7u$vL4iDb^rU zs5DWTkkFENd)6EoEkL^`_)_TO!0oVdzr8^4@j=bQ0_inChU)=jxa)l0_eN_!I6Tdb zc48kb$erB&%&1db^Z`IP>3YFYK!rOnM!%41ouFHdoMwqf2 zf_tGNTuS*OEeg^Ne?Wu_CW@pjKD6+vCN@M$C#q27-96kJ4|MG!L-H?oeygH66F$;* zdo^WlelxjW#JOa#<~=o9Xoxkpba4Vs>ey!$j9RTt5{v>7#zEB&xCj8kNiO5~KQdJ* zf{JhvRGWYZM}WCIzp_114v27`w<~Ep{Po6A5b-gFqP3nPhMVJct2*TOgND&z)7mtY z@2aU=-#oY$gSYtQt|L4ZXx;i0a}BGWDn%g*bE-pJDGCM|??nL6Af-P*&`o*rVrM~| zf-d^xQiIzCTJVV<i8&qb}t#Q(KTCoSj9k&^ZpEZ0f9=oSJg675qz z`iL1L&F$Vw!{R&00KzE+TU`eb?oNxxD z#mxCwJc%j;qT%(B|eWGYpR1KNb-23~W~@{k4uN5YQAJVh7pB(na7Tsd_tzZDU~dk&JPK@$&gux%EcNIb3RCL=@zVNK|TAMfL3R z`$-Ac;R#%Vzwp!Zi{w3#WuSUry8gv@>^BLHe?bOR%0rLtG`vN8F+ujl2cD4RZ~UtX zs&yX9CnHSx{o2695ZI0O0)Si!50Tkd~`RC!$ z+j~)R>9WheYHneF!7R{cTRIU7&z$3fm`Xb=4yTmF-Zhqr4J0^RT~hhu3@~ntxZp^q zZG_~@&a{uu4EZv%abm9y$MuyUdC44s1P3>$>QQ}5r$>CO`?8EGgp8p*8ZVUg?Vg{)6Yn*)x#wwh7T1*w=F{BQD`I;;hc z2A|^E`kafePH*i*IBtmdeS-dWb47^B|0clwF>W;1u|XZ)Nx#H^Yfd22BUo&BHF;(^ z9;yugx?z2J3Ds!WMTyHJZT`+fsdf7`-}RE+XM1P-cx?|wK1B&3wEr~%%BNNXAAnwc z(OW$n`FiKCoEN)ufJcKqa~rURiVL%pFZ{pCA2`>3h0Ozq;ToCj13i?N*I`B`f>ks7 zA3H~4((!!jQxM~yz5{!r`bi)~=I!wKN8TPX=#rX2Av-{^x-4}FG&_n-fTrdWh1&Wo zBcy&~FB|re6YpS=u|(o)N<}R~J0UxtZNo+c&1LDn7oE1=d&N^BnUP9|D=j7~fb)C# z&AX7p>Cu?Der-@A%&}s!7A&(1=;M*i&nf63Z*R8D0LD8FS@ zd5!?(H%K->L{gKW1C;^hLY4v$*z#J6Nm`b1}m+p+$N)2scl z0u~y}0`0=1rwk6Qy$K=4p2I}csdM@4PH*-Q8v1&3!Q;Pz%fuQ-Z<;mdc|Z42;FJ)Q zv^vx^2;Yx+WswA)RjCXgL(99Ngj_92pFdCf0eTCu@+F4(!qnUe<7Z@*>ZtNtd5eKm zQ3$4{PXnQ#GxBU0w`L6Derw$UWq~kiP|x2hl!@>Qq0vUR#9vIAMrNslu7;G2o`_jm z5su_>aJm=cu=VkQ@?oujnGgmNhwP}A!aMO(5ya{#hQxc^-fSNbuoGuVPr|!kDAjeI z90a&*PSvv;h{~jdI@7TD-yrM849l7s`sX{e4)Qti*AVeZ6oAiSe#+z#4`vE!&Y?TV zyOa-@_F=AMy42rt2zkZfe8^rMgvt;*3$g1>gEYwg?h#QI{kmYbkKU|5;T!d$noy>f z?fKT|-2>o?W`5T^>;8syZ!mpuFi!H^eU70%c}o_G1P?8T7K%LbhmrOOr&G@Nz;7=2 zvgi24FA5df6^)N49cKI`R5QuP*w=}Kz|6{clgvlX^se;z417k?f#x^OI`+Y_C75L- z%$=^1l<&JEN6vH+&&Hi!Ck)tTdJF;Ow-})OcJp=MU+fkEWVak;*E@DgGSHAzOLY>e z_!qmGpV7GYee&PX;EV}CnM;YX24Ho7yD2CezQx)A%5Sxv63|xjVKSDD`*}e5t@0cw zzhQV26R?Hmc*DHqD)ge8h0ecgj9$& zj$&7*cs7U}{gH<4-C2C+m@fmCNz&8DXiL=U1GIKR6q3hexScL~38DrQS+zGCC44g%@U4$LuuYY7n@>;U1u-%VCWXJu@ve*$7TYshUWw}$i@uoWy zO$3l18tQq-8KCwM)p081_2Q{_0(LK|ES!s?x!zwCrB-0?sEJM5P@F^d!|30cCmFb6 zqIFbiON^f!ql;1+z5zTti$HcZNA;_aG3O4~6}@N&qp-Y1NYyp{xT!PRHjzRaECR_M zoxo+q{;ZUWmFxpq9^h3Ye_NJRn6uuCvA7y`;d8ldlyTjf)zPcZC}wW>@WPNoC~*Es z?Uj_-EV&{|$0-aUpsX(Yc}{*T<$CGUNLO9eE8;Foddbt%q%7@xddZlL+;3RuaVhyU zwQ$pu2!S+eDjJAA#uGH$!YFt1riT>hoxH?ORf|c0`grf1G$35VRqN_OuVAeSy7x|A zcwRHjpz(c((%5p5dt9aXtVG~9?_?OYZn#%3dPRkRxu5uPg#c{C7~#Ela=%o73XX#l z*EyzSk;(U?lxecURuQxOP0kf$H<#4k8#(JH3?VFO3*2&X~iD}HUbW7MytbRr-`#$hbjNy9uZ#h6G zX92h1m;~yPKg72OHS7Po@Qvj`t@{5md}H}hFaB?5(EU&08*qoy1Aykg4c~yf*B)@T z^uQrrz-*kqO#Go|W&sX<`Zb%vepa?BaDwYY&iaqIjPE&{zdSDEC(it#zt3Ly4n9A3 z_Z#!QCG!7mon-!9S-Zc_0txN@7Ib&~-75C$9vnUJ4iWyA ztq_0B0OVrkm^T%#WVX0DJsK}p=aOVqdd+qp9LKw3b7+EC3cNlZ{;DVhux zRUll!vDa)T@UvZ(1kf!6mNH9R$-XFKHw&p&V7Y=$Xkx^8b0hrv)AKOH%8^VQ`8V6( z^u!00Db1L9P5G^6UBgVtboTr3&`hhr)a(llo~1)&`AM9h2;uO(!SDVE z!;=Ya&|mF`McxcNmBU&(9*l3U^VFG96nTVG8vS850Sa@q3+kC((bO4B*P}eplYQJt zrUIb)hL5%!051&vj?d>69d;pRL=7PO3>AXC9JImtZ1$T$ z!t!IyPx{;};rlDJL$T~=W^vH-oF-uxl*|bcM~hvPOtqjcS8%UnpR5>QYaimJ6;1FL zncJq;7VGJE!gJ0gLd6YN47F1C%AGOIvYhG83_^RpMh^HQ8U@#Fn&gf|(Uz@T6Rm90 zTRz|q?!Dp>b{bksgR%*&T>Yk8C9_914;8PgHo+wd1UqzP(91&CWVsPjh3PFfFJ{z; zYbbW3+#&X~+Z!6$7*qpaWYQV$ymUD?qAg}mzab}4j~J@1!bK0|h@?Ky;6@kCGTL)F zs&~00f(Jt{zIl4MOaXHEGmUY^a?|%PS&9P3yHr@0wiEDO97k3F958Vlf%K{VvR&4J zJJ;+`3sDmA=W4v&?_3V>z;wlPQv066J|3BkgMP+g&l9JZPTVr=Z7sA|CAq+1yX-WL zjpMHQIN{V+CMak!Hd`<|j(q1l@3Z_n8a^VBXPt>gj7G{9ut$&MFlPA`i9u!6my8a< z2gwfR0i6&6!>^voq2y!I6i_kyYNx*8nJ)Np3%?x`wRV0u7U<26;R}W0EEGUt!T7jx zIbe9458~kMX;u#dpOrL>c?*t7Dv<$MmYIJzowxu=LqcA*1#AaHIEK4?G|UhS%DPQN zR`t!P&U`Q(#7H88~51DDMW;4wbmfY209=;cTbo$+Q-+HJ8;S)lBO5zsV1yt%BKD2O^Mos@-kTh#g}Lpc<@5x89XJsY0cd>=GIAQ}fwzk698cCuSS9sIb2MqTSwq(Ou8>GR|&&g)>ta ztfqHqC9+Vp=}W!UbSn3pfBwKsRczVp(_(sc8HTQ0PEcZ6Zx1@#f*6xvQ3!(>2O*Bc zx=21`qSK3Vr-b(SOFGv=1P*bJgxFz5-sr6|U>~6LJqN6_oLv$zDdA`TE~;je)NlF; zFMN*Zx(gPa3aAG8q;N65>|FlUbDY+QI0$gdL@lWnvg}0Lymz$A5ipi zyH-N0VU#oOkU<>WAXh#Tj65i%9oB!XgFzemzzus2&=U~Nae30gnJTP8=BKqoq+(T7kEALZxR%WrNj#bW_^87m&|h>C2{I z8q|>_TCPyhJNL#SPQ(O@x40L^A44M?hDIu3&s34ORp<@n#~URestmu;k@b9DP^ceB zmN1Yg+loVrwTz|n$jMm!W9L={)>WopG^_2(GurUr1`>{CrpMQ^;xPwouK}bGW3u77 zFZ#lk=esAeNu_-JP*-_)beB<->Igsy2tWis`$nOBlmBY!g`N>zWw%^_=%VwEXd{hE zjzauGeYPDh1|;lXQ%fNfpD> z&Y;?WO?XgDt`QcAyi}+}+R3MKf~qnPtB%ZlYdhOuX!be$i%&n|VfFlHdA1`PD z{57?OmA-*Ft&X0am4l_d9R;wqd+`Dq_+?!h3-`D(Cr>FePC1-t5bBKWr zh|SD*r1O1HE(0qI4I^+?CBr}XZO;0jF46b&l<#Z)%hOYS>Y_iWGsMOU%vELj%bK&@ z4G0I0)cFVB+Ufr-d*tW#3V<2Ae``|C{fFvZFW_Fq1s?Bv48Y^>J%szWBk<4fFVMT= zeGlQUJ%jt_`rh>T*LKUl8!o9XX0;0J8C)rmPcJx!OJKH&)GPo)R0KxVeCCVrl2G?d z;OwXFdIrc^{NaRX!MJ4jzQUC+Z8e_-c1lSq^Dm4r+dX-XRZ&|rbhG(!NK5tRW_`pf z`Ks*stb5C1iRFvYfQk*rrpqnIZa!N6;EzfDJ<1&g_84{PN^NcXxTLG1@r^E%Gx}4q!yUXA9z3viV!Mr`nc89iOzu>HTh>3FTk!<9 zNBaVZmMk2EJB;}B`XlY$g28!4X%nLBQi*wn21`3ckONH`9VqOs+M+?ZD`IPjUpz2} z1y+Gxo-Puk{*xKh5(FlnfKS7tYmkFcA}T8`4mc*Vlu;;uk4OG#u!yh{nb2UgBTpfW zI`=-UtI;X5fcT^`=sLso_}-sJ9k^^&O6JMv9v_4j)9zfux zp&Jty3daD9_d~Jqjt*jym1I1^O&6Tx%wSr_PGKE~Je+Pc|B|gpWQEOev2e&XI|r$Rb&imy)X! z7_)L!6fP;xJ8ai=X77EmMb5`}U}y-=D1Kh84nZ6?&8_L9 z-a5G_T3^h+?k^b25@4+p%=z78;WrX+=|GfQw43ka-Lk%hH{@z>mcUwm!o z1<5Fqp^ZvCni9|7q%}z(Lg0MOe^_qij+^d0^eR}iIk;}|k?~iSRrviCg@h$0Gd9dq zf^Y4|()mYD^0$5toNxDhd6^(V(l%kl#Suxnaf|6bG(lfd$05Cy7J4^AAHXz(2-Uck zArn}(Xm5y=}t5EElxN@%(vXi zLU)J)$94g5ZQ56L{T`0Ok*?j!h0}TrvP>`53~uK*3|WV8AC6*2`7Fea-VSC`N8M)_ zi%Nb6R#6TDCQd@WT6CjSG%j{S;Yi|%TpC!T?%>F3EprD_tUX`+yGSYkZ_@Hwa$0UO zf+bi*2ZN3K1}c(5;W#I*gYrP}#1^c#+EyRLkS44{2!(p#I7wumpl8WM;d53T3}O`n z$t{@#xp!*kml2y~`@=B+0o0PgE%Kx>w9h3vmx&2-%h8RtN6+m$}KGpq)5JZ z#@>*Zl}MP24awJ)^y4MdmyFp0rOH;4DeMYn3FKc9A#raMG%v2+vN4wH$BG(Q=_{@_ z$(49+p*nmk|Y`}*T|d5eOR@rE?gOFX|z-CO03G$<9cqw z9+G<;SKOZ#&ZIDayu79~Ty2~8h7p*RlCo7DmcJ}sGdHPblHdY5EbqgSzbfwL=Efjz zgsuN9$@vW#0^1Xly)FmyIfda9;gmwdfbzJhvLwa3|66nlN+b5i+I10FP~XlwRqXN-I^Hm9fCihdO${Vs2NILE zyX6if`r^G_6^F~;Yr*Am8@7LIv@R}G5gYitTaq_%e-Jpf#Hte(IV(s2{*U$3(-xd>+iI9zh?iom-GI){*w+_=-K|37g$~5jt+ql zo8-c*Dtah}UnNe>MnU01K0&YjCMZA6XlgiFjE^QU4Z!ZEH02nkL3&w962h3`axDCU zBMPl6-3$xioiGv~Zc!jYaWZ%6&CcqxZ}JG~iqamg&gu*E1EK@lmQ|OBmL!4soIy(| zOm7hQe1mECUcB{mn|stgwX;~s?`UVR%7V}Z_VcW)~1pMwirk9hX1*AZzPM~K%>owtBu z3MTv}$Nll$$&*IW3TaziK!dRj0)_d_4UKgjjK$mMYF3M>hfv@P;VcBJ`*@g;!ZqkM z!S&_1uvR`Gxbm7j7D8*V%i}iEVaG2bPO*W zPaQ^xPpKCzvq#_GyC@YB4)oMdYTsfwWz*ls^~|;&(EFCegH%m2^{fz_nu4;L^gMl1 zp>Nwvyi&iY%n#D;<5&jVF#JXg2MdfhiFczEf!OO8viY?L?%e)6qy$S!@BzrCnS8if zTrm8=!89SJ360j|#;*|ZL`Ye7Wr*vXJDAyh8O5or=%9tW+$`O@NKz1+c_-@$AfEGS zY);Y`OOm$_3-b|amgbgxqIs4vAt=0gfyDC6CM7-FY&NAkgBTHuFm?m4ft-(WB8NQQZ=IkR(lLc?!DBb-w!rFn;c9W;2G2xk9Pvh$UQM2d zf_!NSy25GP6-EIO(HAr#>hRzX21b2+dg8)H68j1(@W~7NDyV^J-$uT7#n${EhB#-; zg^gya<9bYx11R!GFEd3xF{ylvnBG{Hp zl4!^{a4s**xRgj-KKxyUeeq;EE}(1^WQ^Z$PY?v5d~RA@D*F?{*R&01rD5a45A~dn z415f#d8l_4qv%1F_ zbLw1Ibr%&XP1Orn&>jyyQPKcXjPfPkakGfx-V4-%%|@4wwx3-rU4zzqGj_rpgw}?F<5mS ze%LgcSxD%-r*ytW5YGvfov+cbYWfNU1c!>f_z>r7M*yT_pCH?MNs|~y40#sT*rj%Rf7(aRAx}V0H?w8^Yw1IGWIWhC?6#A zOPdw9CY}=EC~v{jrZVJ(*oX8NEJN;x#!Et(1T@|#VKp8(P`@Rlbf^4gU(5gO8>nHc z9np^%lI=m==kMOzKgz3L7(emTs;dXN6aNrXzgN`1Tul9m#T6UdgSrMxK#F2z1PV%j z0%s;5MFD^QlPQYrM-}DYb|QZlQ@^kIFBemP>Y6{OZ@@^$2qfpf*asK@EI@GnXWIwZ z9@H-QuBLup^Ixu}{?s*pP~!lY<4D860{ro(_c=Y?UEVTKZ2VOW`4c=NY!B)e{Gq0P zU-MtCrvAh=rw3*P|2lAH`wNymP z#g$UP6xXt0SIuCIs*_9VyvXd?A(e-fI1eziP1zX8J`_RPuIed%B z&wFWOuab9qjEG3S^r11U+p;+%g^6*A2M&HoYhBbV{h@2e9hQ!u0*82ZG8>P!;;6QBCyr5BPr~gvzaHtJvUCE ztIA+cobNuA4-qlhu>Drs!n18jY8pP17T@IELvTe#@o3%by*-&%lT8%CdbpnKh0Hsv zeptkW%B(N!+p){s&f-Mev#@I*Lw*v`JPxeeXek+5HcD&A<9hqH{&@--1FwQb3W9sf zLI6yUdOQRNNG{_$p3$S^|&Xj@7xvzs3q zx@@G+Y;zNMQr)|u0MTuwe|G2tPOZBVHj_UH;Pg(_v!0Xw?9l2C^Ne(EA|sISumH45 zHm<7oTNcSt$I=OFcf7`C@^v`GzzN;wSeMjitQRpL8g2?4@7eP+ahrSy+#XvIhaD?l zNs4+^ha$K&A!9;|X6`TVMOXPf^^^RFu_ouo6&DIAQ=oU?A?fd~j)x8B(ItBN*fT-b zzU8S)bT50i8n(+iI;om2)by5Mvkx}uHz%}_)*_MOAR+Fk=75U2ml4li0>EZZ(^i0U zk@(4THCBYRm0S39=G%3RqI~#FNZ)2tn{)GW?+*;ta|Ac9@F>Ra^m}{YMRV?{&BxFj z31<^;?(D8R29xDP4JIZk*HP5C*R{B(gO0hZ6N>elIi@33oEdTk1V^&q>0*LkOIjZzI5)xW@aalx5*; zGJ~HRM8Z-coJS4;m^Sl>qr3Ttj|*cqR<`~qPYfT#(6g|)@Z<$DZ!L0u$}@kq@O7Lj z#n7rv2`GW*7VN=!CsYXs`qhPF(ZS@4^0U=rd2d(*ZcD1Sn!`Fj)h+d<969Z;L zh_28ZG6Ug;PIZ^WX&_SrPemi9^Liu;Ig2tBdK`FW%>!9`Amwm_Y!~jDFLF^!skV`Y zy%V)4LyKBM+C~lsvTQw3(LY)b$@6gQq>zP*lB=prh%n_wI3yrTz0AU1UqPY_DZ?>c zmwp}yeWM1LaKQ>(mJY`dKgNd_$b{EQkL0shexGM;hjaiZ+n&$T;G{-Z%p!G&eNuR@ z{-T%@+u3_u{C3j2GoyJdaeeIAb`Wp3i(I8qP2@Ul^zDzBu;TR?o)RLSn;-qLs z>IJ!|Jjp^~lKRUhSHgw{5-tW3&&^zwC+!3Hr*DT^nTu=)ZV_p1;5btPuFi^eD!)CF z!Y5$(5dZ@o1mjOX>I@DA_?#y=w}9|voiuu@K5RjGk~6k z9>@g0%yRY)sN`OFfe|x<<{tiI*Z^66A zzXK599)SMpBfWo){{S5Zpk)2`KxfGE&PTdQvE~@_w&H2PH`KX3h~M^}+7`PS*IG-N zWi+*(?23t?_7e!jed&sLj44p^M!@Fw1-#J<#i>#x{`JhN^!|V{(k!fw`Tl6EU(c+AUj|&&R4Qe&Cxl+j2PC3nVS{_Io zy}BY3e?aV2w9Tqe=i5g+GeJ)mR*hD%Js_nBEUuZ1P}U09%nwufsyB=jOS%`&_#? zg%9piSTwrO0H(YRf;o#w`#F9IoKr*8eu={^A$-07Q{TLAeQ!}(X zhlH}Q9ap>*5^NmOi^rO%i`tRnw4O6=EFoW#@KWH^bNPZ@jA|2_#&sZSEhvA`at{G6 z`h&_!2imr!cweN|iXs--*IdMGz4AR<`LLWK2(dtDV~UL8rDT8mx|zHHXCW&@eM>}P zT^RB&&g*gYq7Wx2R6f%QR<=a#6P_ol=8v9>grRFw_mqHuF^E|sE$8{%iFeKsYnctj z(w~Dm_yZ=gK?W+p<-vX9^B)%)_rwfAi^o~mzmvqGgSEp}=cel`CRMAEagDDrK__E= zg4{p&-aCH3G6rCKb*VrS`c`<%9Oh`ks$a%`p5my}v)a*^VXzKB+ zj}AXP8tC24X>nY5FR|rdbwCt$C_lKg;^R338n0eM#dWr5X=oHW+qm18ciV!E6I91v z$ZuJmnMvRtK}7)EaJ&+N*A~==?_k?4rq(jJk{T@ zv%!90F&8XYZOqWdkK%2{$Had*`W6BPFQ)x9`;zk`JMvv5X(ub{F(}fx3IV?oskS`3 zL=#m$X#X8^_{2x6^!V%0oZZNn!V3KxB<;-UtnUii-BC**8#Q@BGH(V`K&o`367b3E z31&aL6!i7t;i3D&RgdeDNqD#U51_saDZl%z`(jFMb>--laTZ}(>Dz^joFqUP%^^H#YZNhB1D8`qc0l=+)uniV4#7ee(V=n zSxG8*pdm8j6LK>t#(MmvJZXBim6NtOXc@ikLZVW8lu+#h%OPW)q_?wxy-P_~v9(w< z<%cEQ5NCmx24QlF9Tm+u^yGXTf$m+EAnBySJmCPoM_*aXDnyVf?acTFD2Ku*eYYsV zcO0NzmGtzqLd@_x5i}awVe`olmVh*0iZEs*bab+ZyCF(C@Yj3ON2>MWa`BEBWaoQ6 zE$}IuLdmwv`7$M~%ZN__b8xv6w9sqliWFzUxs@)L)b>=@5h=FJ4mI~?9D$=0^qls& zd?RxTX;mP(tKnIQvFb($8hhOM><(`tmk3Ez){VqXPC`r5WGd5<_IjDyLXk?2&XCJx z)X=;TCdD@shIK~>>nAQzgg%9E(J$O;FgdE8lkp7gikA5hIN5{u&rTGru^!uU#`T?fFDg`l@2Ggi?T;rqybsAuYhD}ymm&boWr~nLG-6B_ z1~WYvIt*$jSMtT_)h*puM-CovPOcLs^kBw48wAs?t*l(Rr1xMZum_z&zl?vj)W=^L zh{7}GYyI9DKNXducQuC&S}rzBr^|t(mt--)K~tg3-(9bk+T(<`k5y-WzsA++$l|k< z8}eSVisOMQ$FN*8+XZQEmC6!}7U@^eUZT+~Wz{Kw@dws6Oq9USN2-Zz-I!6RO!|Sk zD~K{JT4!&u&x}USbP8?v-g3sB!lnqSNxS&JWOqyvX?QFwC?%@f+csHXC>`&yGc)tn z-xMR(T_7KW-v4}UFERqxTwRQ+)D6TOS(WD!;;S26#)rr7j>`u*3(k8X1+$eKwdskt zI;&|>_Gd&VavrS-J4d^l1aBrR7r{0OykMSHjc{dm%Zi&C=+fhV<|y;>#wj%<^E=}S zto<^9H7Gm6=%dm#rjV{E<_LR>{8~v`KyEbzewY+cl7u`AcPnUTNX232y-VApOxV)2 zQR)<*a{B6&@rJonGM%aS1y&s17hf-Ru}(ONUf+Qy*E1H4EA2Do$BA^%z0bahC!kw+ z>8sbyKrb9`mH+mI!HLTvb7-uDW=lN{6)BfXS@tG*tTfD?nU$N9SwWON9qHJqvifsP zDiUL9mQhDX$Zf0(srd3SRt4~j4EVeAhz5gO=}7#jTyj(bOu1LgqX(-gNXbjeVWq*= z!DcMovaKIdu;PYsw68=`pjK-f)YEJw5^G-ClvCO{;$L8$dx1ej!u^n*A0#q-w;=zK zukkA_$iEma9;7^c_apzo7QfJs{J?S>K=&YjA`=jr*yw>(@OO@4VqgW@6M=(&{&^e) zpnFhgB;4|8hK$t$JA=m#IK9ce z*tI~eARp2=OYED660sAY3P+^cd`4CbjDXto+3{CHwksFp0{v^d$A_{{5gl;1x5qbU zcGHJ%PuE|26-j9sRRWQjx#oZV?Wmfy5V@*s$9t&I!$yYn>A|tu8^JPuEyRmLZBHPQ62sg+W zKq_4?Ld-ycO}Ywn$<;q4l@iHT1A&jBcutXm_$kHuQvs_-DBtnM@MsH;eAwUcI)DQnpywWC!X()y+4aZi_2o3Bn!_`&8f1n7|b zYe8;=`gzn9HT$&PQb>nl0>a%FR|3OJ2vT|UxuooiUgirFmrLGVE?sMAuaooBX0&=Lw-K`RsTv0(f}ufVMo@UpdStX zqvL@({EM`RFF6_*tGEjakI@lBteO@SUuMl-@&JqAfa6%TkH+(jmj7WvR=t?n5i4fcZ zLEL@%I6y)F5IosVX*jntJJYIi1_izy(8cT%mpO27aQo!*6D)C#hse3)cfl}QfT55Ag)5e!BdsT%KKmZ*W_nq}NmCcl z%VLkA$ElZw2#Ql7hd~EA>WDwv3hu0F*?CXL(Fppe_BM)HM&&BN=N6d}&Ld|FN0;pt zzG@gOf7~QSe3dke9SeJ9%g0iD+VN5-<8luTTpRtZGfZ{fycv@UjG7wV7sV0{__w6& zPpM4!gvl*Y_y=g>z%)wNtOYaohdmid08)--^9U`WwkXeKmk*dVnA=pC@Wkw%O>R8q zJ&K;rNBNA+-x_1mEh=aLs24CZv})Lre07| zg#tWEYPYa_)}WMl9HRhaUd^R_zd;Y#M(~G77*0zY`J%v1#Y3h!z=*HzX7qNYeRH(9 zMFk$&q9vv1$2>0lR3tS2_8|fLWo~!qnO^OQ!=T;MV_OAP!7;F5|6*ANbix{TXe9&F z+SoUT%C4-U!$^-T`Y$>TNWi(2mhyYqaDf-Hk=UlmZxLbUW zJltJFW+-O_I7pZ5*y7vVsmf1I!M65-s5jtMm9Hd1)0GaCULS5^(O-hoouO8YAHB;@+5| z5E6#+0CEhm=Go!<_hKfGhB>d27+*KFL(Bc8Pjd_D{iMy z72Ft$l99mnRj{d})lunL zeAnh)mGBtrJv?}}TXz5oI*P?i0lz(Wt|EQDIj2#9UUkSR*nr&_9}G_Nex-iA3RP&X zWVQnyCJRPPzWg+}oZU1GOCaE}L{g$_XWplBB=jWL&c02#EjYVUbf4SKIt-$0OyIPq zFxv{#35cby>J!%ag^X{n^aFqcfsGR4d7YmvsXLPhek!Cj--dCM*GhQp9|4N6H*tX~ z_#s#d%h_&x`_Z<`Wyje~pxj};Hi_lh+&Q--oDmhNXs%4)XHVo*ZOS;ocQejZFuc>C zwy}8i;xN}RJArygKL9=e-Gd~Q|0Uo9&^<_B`7Z;$zZO^j*I`8eWx)5NQuuERXa8fs z_n@u@12ZEH6YKq++dtYGKm#ca10(Z467}gH)Yo8OWTc_HJF`EbJ_7@ApE&?Xfxn=! z@k>#kp8iKG|C4|aKzHv6{eJ@CZyz^z;P;zn6hLO1PUWqr?L8P%MB3pe>%WcIY(W{J8 zA6*vQ%~&_jw-DPlZS7huAwJ5beIP4sv}o%FKqWDHYF-UA+j9;M zB|C#A^0QuKDp8Xau+_2k&{neDX=7`j!G?e><48O{u&V%X0yGtOpN;uAyTb$R&&m2{ zL63b9(-#r2!5vkEorkI`bAm;QWvWKjH>^3jkYyXJt7^I8j2Swe=-99$`vvJ002|4? zu6<(+nF_Cq88zw|703toYjT}S+GynvNAKCK! zh!?Y|2N4J5hi^_2<9iN?YQFppin)}iO%GU_9*nQYvo%h4Stny*~QtvLx5*yKuf1a?~&^zMO+t3}S4x+jmgOAu>Wc##9t;tJN|-KFAnp?9<{vISWouqnGs4Sgx@%0-Z{ z4c@EhWdmo@2Lr7Vd6HExYwd;|u{bqtvznC=Vyrlxl89-X3mbI_g1F1^rd}Yh5H<;i zG1$*Ywoq&2Ixk6dHGEKr4phyFE#p(#iUyEqNh*D0`q*T6uG5us;v-0LGrC2omkL$?NcmD-C|=5gJ5r|<&;Bt@OGkx{WbpgCX(Ewqp7C}&!e8=Cm{w=pbD=>tVcoD1@pHCV- z3n*zBWyix%5>-P`N0lgX2yP0`q$|B4jt5}|Ye?w)SPP-U8tybr5ec&(#xk&)^3ufP zbkARA36*iUo!BYqB@Dsmm(}*oTMFdyE?SavDF{ND9*5#8 zyww1dU0a4~n6o1LL3WP8l8fmI&(t)6{oK06!PjOlZV>vovzf+o*`FP~Ms_CrMtWpLdo+SM)Qp<{ zEfx)U61NV`TfPl1Gn67aZxSo@Rj0qscXZuI%rAD`90p$zRdc*JH{y3&dxIL7b-N<5 z3|Gi~vZi@epv7FHx`~4764g>x80~`OA0&FkU*Sow0&+e{{wNqLO-4sS}_GfCl+$DI7$vq}l4co};nv{3SwPJBLAH_2((s{C+NA z@aeo>Z*mWV9*HaaarojvZ0_PUR>TK&=aI0kw%K_%+2rS;OZLKI~f>QQvW_1_Xm@30Y8jZ_}fIn%6vBw^1dzw z*5iyU0O0gRR$$r$BT#nv1!bv`iM_Fd?)~InJu6!sb82T7S6Vv*9rL>}z|=bS_BwiI zcC_}k1_rbiI(GI3w*Q(6Y)4B+tz)ZeVsEQs>q4z(ZStQpf$zTc|J>p9w_gcnHUJF^ zP?PzS^2p2v+`J0ZWPXKp`JpoF59gr#{gY(@jsOOp*`H_xD813p(b2Oo|AJ-zr8ENg z;m)?d{ZcRjfIC=$f-B>n7M_s}xP=vH-Tx;_&OfxX{_V5<&Y|B0_Fu`N55CMF)Nf&+ zXP{vQ682xHn~s@=5opr?@1t&pA9Wyp7IoAAy&ar@`_Eh;b>DyN+#P@0!3ns(AKg9v zoyPAk)4Rv_H2xPk7I6PuKcH{Azc>0wZOHa6OlOCpfV84m1a|e=%j6!$R1^5!LdI4F zu8FOJeB-=e8jmYJ;zxVF&x7-*RZIa`F;S3IXPce2hc48Vc()5d)`d0N4!b+Q$+45y z|B_>yfpRQY(+xQ#LDAL6FTGcZ!c{m%H8p%nrG~yc2kBQMRg0|}w!>{|*P098IIp(w zBnkjAV^Js_ug&(OS2?DJJW$$d=B^Z4Us;LckYRibFV14pX;QHx_kO>7!#-?bz}+ro zM~okVz#XDGPE%wlQd6*f;-gkB9ydx;w}-yYW9&ZA;A5+gSL@+B5y8IhM&Z=|h6;l4 znS-LfMp^mcF5grtMN?coj4gO?Pd=h<9S`_QeIVaVh39l+#(VNpW=2(L3y99x1bXy* zocgk4WC17)5Atl7K<)DL4=1{D?nxa4wdV+_VG>9*Y%eEMLHo1!FQCd&opj5cqfN-!%zkp*#>HBYEt;`Jj&VwFN4DeCi|+ey%|VF5qXIc3 zj~h9Yv-3Jdc(~a%%*}f~_9*&svccl+H3K(6T@aAI)M$`A!ThK7C+1dk7{8Koy9DAA zG>MnUxb~-2(y^ewa90SkS3zYe4ga8qLlc|RF!njE)uLzk@Fkl*e6N87D>z-`?J~_0 zc9t_GDrh3PBAv&Lw?t(ENyrFYJT0pb(=u3=s&(CwjT+0kk3TwaP)=-2fO(9(^w`y{0e1ze z&}<`i{@L+6L020 z=Ax|zY|Gn9DvHJHC+(vR9|7o+h96?5APrM>afq@U)_L;}rI#mxtY5eWggdzOIy;p? zbY%;iBcB17!><*5DUKKOr~*@R`vZ^rN$`&~?f+&wa|LruTS+ zo0Z)Bi9E}?8W3!H5d>t}-U|bF|8f}Vt6Qz+jPVZXFw2b|B=D`{AZyTYWII zx+S?hy$9rZIj9yZ|GXYLF$v3kOqd+5_&o1lYiz`^*|7Io>-Wt0%!%^~HXFLs z>66cDgSCJ(=`MuQh97oPl`HyJ)^-YMN|%#bg*VgkrJQU@U5qruHpm^u)2H{dE#C4# zh~zN5HpZc!-yrN|QC*U+!?bb8z#{99L2IEmL>*PIvJTia9Tu)MU8XB~7}db7jGAUL z&i5QL@-%-~q-cCdr^Df0=c1f;kGAe(tnj*;q4DCOalJYx65LA9Zg@R6(=ZOyq%R{PudS2MS`D zLMNMIrSKMaJJ;9)o4UisPYaE9hx?dOp-L;6k691#Z zqg_2xnsmLng~;|r^g{vhyG?cSOxb-w<Z-B$DI>VENIB84nbjGQAfvB8J}mx9<8n_=$}Zyx+xH1vI4 zY>q&z?!ZQ~9=@8lnC@aYAM9=GM%&E@CAg8ui2XG9NU-e-=kQDx6S=0AB_0KI_dmLc zz=@ZaOCQ#r-e@f8U-_!S!vs4ysqMD2kqNdydVh{Fl@(5ifAc`+PkgW+ml&iUDhs(4eNl2yYd|LsUnyI44o=WFo=6o4>*p??6oo74aF?Dk*d zO0Ww1*J>{KdIInw_=f=z zm?dTMySw-4kM7>UDzkM@WIoZrnf8qy*2>ECw#@mR51|1VrBHi3M{7IX8wa$e7Z)ch zZ$}quu}T}cOAKn$ok;}k-=>_~@uK9%FZ4X2v|HjrQEx{$)HHbe_K8*B2MZclnpS)J zg#yQ3R_$a?8OO@{53*AArdvU^PZixYb80rHU2XtjK=$9dH&#x`b04&z0zo=#4_9<1 z!(OsFhAp}pX;#a`O3G;}^K=`(_6W5yoiQCg5l$H45u@46Sb-9sGVcDE2y=5a0QQby z1OHHos~ia+JofbOW4h`;_W9C7c}M@4=g^m%%TSKvl?a)ToRm_ea8M;y?f#NQ7H^s| zDH4ZiwA++A%?sSyd0B?U?n4@OnV{fw1KlW$eR-bzYIssJx8ZH1kpzjRQsCH>2BG)v69UeNl@awi!>6+!8oFA zp+c-ET7hL&&=+;A!LSg7GLGkM8Jk-!3wuM?2It8jBe=s%WIn2IP%kUsAKRYW2z!1{76aHLY6wdo!f{cGDGoXwp{pkC zKmWoZ(u~XHkDDwJlpqPC|4DA{L4v)Pbx444the|=8kVIGX`Z;t<2b9MjlPP6`gbP9 z5%~Fa5ALN1K2k^Jv^%v6To6kVWz%}hMLvPQp(AJ%mC_6~evYPH)_3}7qJE-?NNS^S zcB?Q_fpX+9WB({pG>X2QRoap>PFAG-%`vANEy619tlL}9|$yFRUN*STZgiSr~qs25Gl>@ey{0C z2>a`SGYNHn5atnTNc%Z8DaF#ahQzd!SH_tiR-0;k`KTSjF#MFYMQAmmfx2W+<5tw7 ztQa}uq)aYUNA3&OF6ms2i)aVux&pN4!lm43pe@PiR`?9`qWEFk(>LLMP_MzX(HilDPynZNh}$MSzzfYM)MHo9?Mg^+Ktk! zj8-q2&q0u5A*xt9Q#gwX3}Xq76j;gPZMXH*BuRA7$Vqg^Iy=e}Fex?b^r*Pm$=N4v zt-cbMG$f$OaFMNO*^8Da;#ZtW7B=cnhiR|j?{aO^&E!D~YeJLs)m0Ue|1?1l+pgXd zR$NQR$%Bn6(qU6#mm-fuE{C6K6_Q{=fpf}>5yq~YSZ*_oFP4huEpnF&Eo>*>YQr9; zUHuFd&fki2p_x7u0;r!KT?pm6{FGh1e z-WvUf=G=c2%`yH=KKa`di(ic97_T+4_|<5R@me#Be;CdE?050sqB&rQ^>^Zq*umEm z5Vc)-aT&lA_<$Y!83eu#etUwBV9NWE=D^SKuj(KxEA!v-=05q2=0fr5bxIGpRU2gK3W1&=Ev)`(+8|U+GYc<9??(e7wdUk7v9qDVim`%j!YvYh#Mr$sc^o zOSqo)p14TdTPmrin3GoAw@+-Vky*zmTjwqC*EHbe6{LqE$Q|$#YZqf*2|fsQabFT` zY(IGHs@zGuZ@*NTQj<(>e@WL{mOd*4`kMlfH*oQjwO{W|@Zj9^Pu>nntxaO(r2T=iG}g3s?%V zcY9M9r^Z4DlqXHURY`kmfN<_$l4Jin&gFO76*P>U%$dD09zsFpws$F8Lf(1%0w=<1 zFT+U%q0v`nqh^L|+F8o0a10-tsPEwRm!gy2ns^dN_eYHqR+`PSJ>z!ck2I4mA{g0d zV9T0OvRmiLZ;m6j4x8sU2x?ffKH=?0Zte18fD?U>lc!{ae|^(F6x^PV^MP_SEPs8@HE!lmESvzK06vOj?ybS3LQ@F zqZ~>lo>0r{#ys@^?_Jhn{-B1IK(L@Pesk_fY^jP5Gg8*eZh66CQm7+;Fi zXuyZiL`G%xT0lOF%vBn>9}qJNe-p5K)|%gI_Q2kjHrRXs7(QuWW38n#tDH}a+sS1; ztqFYD9d7#}+GT3F%rSXB-16bLbw?oOX?Aqa7dJu--9BJEin3qk#kMRN(lbcMFj2@5 zmkhP0G*u zhRV*z;-WlHdxbZt8yZ0kbb@1SNCNG+ad9Y~otO+{{M~^s5|s`Vjo6pwSxX!o)o4tWhofTPx+^T* zIg?st3CbQEuUa|BymPg2Zn=wRu09^4c?dD_plV=^Qg55YiyxA0?a8_+Rl7lug=^2g z24KJTOm*c$eub-@Zn{@lPD&Pz&CWw;jN?r36>6aLShrgl(iiuoPQHZ6dCPpnuw&RW z9~|R0QpjQ^+bKNW95HB)$4T6lZQHu_=putkxvAPyQ1qgB0kKn8h zlPcDgU!T~i2}@MLpy<_pdSq}5ji5UpS)r}PX8Ks5Dh!agighi@E3~3j4H^KDAmb|AsDJcJb;t5Mgy$aqFOKs;f12-JtC*HM|7J4D- z9^gl>lb^4>@ok1~IYhs$OX?Z9y&EbX$(IqjwmiS`abrwdU?G#uXZkK{$fsT6GA$`8 zIDW0$hlnfgT;tqa4GX+x1*X+M6XqDNHOK$OP>%6hWBgwWH2HL&=Hq1?~(=l>SUF@ke){#uv=Ur#`&1{U6c+$E>7(bRm6}^w30{cuM(?v1vQvWfPlX%mZHYe!oGP9w z04S&U9p&08S+XpBen+{~KcJkW=#;%o!D4)0@NqrfLMc@cVw&^P3o72ldMm#bNpX?> z&)K56ouoq@RxArOjWgyO-%+l;cM0NzzMckhwrS_?m(HBM3k7(MM9nBtN=y|Ql~NBU ze>+XbQZ+J+$B{|6ma<1Xa0OjH27OTG>%yO%52oH055I_yH5fB@s}bWSW^-P`M98%@ zVMsOEu5KJ3d2jbDx{>&%f+6&i669|%U3czse8A8g^S1oRT8;I1>~)`o(!dBh`2bfw zb;({%*WUBj_td)|4Mr6v1#};N9eEU=co6~1W)UfXD zpgKtQpdmIMswlsV=4@OqiS%O}WO6__vyc2zL40<`6Exb0hHjxjI(2h*qL?B@kgM0<%&J?otMHrjr$oJWzgSq_&9D~@=2zq-CJ|+o z4%brsq8(gln-tU95U}#*iQYEGO}gw#20wNzqtp*x1Gwau!rZ#w6Vw3q$V*|aP*joL z0TAY}-5%TOk`;3m7%E0HY@T(u+Z$pW=Q-XHL}97!n8`|4J$) z;AZ~*A{hm(C?p0FB1Y@oJoi^E$HdelJt^|EP^aEcLqw&b(l!>Tr!S5bQzn&FE zi$lJpK9Im370P0lhz|1{1H89qcYD8Mtk83iM9!va^65v~p^+pP$jFK*f(ID3M>VN@ z6EX|4H;Zs@*<`qO@$08Vlbbi5AGKWZoPDM*qMeS~Z#*~3f5mfO&_O)+4f&GiTDm(C zX)k$h8}mn=voEb9|1-~3-T0B`ZvMt|G!DPD`!07@afDTKV!qMA zNw(swzM!#VT+k{nTj!KY>r{g2J=29OBpV;974eRT7zqcT)eqEsaLN^Qekub1KT`rm%76=Z^3ZNw#vnioCLNK)7PB0IcA^*F~dzuhQj)6X17_X!vifo3ex|u6Dmi60pB7{3)@m%nwbZezeZwGTi68Cr8M_NT1r=bcw&Uf;gyswX`G+9tqL|?XckDC3+qZy zu?D2MTo57|7oBIH0&zCO34y*1s5@jEj07pr&Uta=`T85G)VidY2BGMAeU)FAQjFq; z;v;=^_%H-pZ{BY!f-5(Jw^_q5o#EUMmI92|4Ai+E^d2!D^y_+yDv~|1v>#~4?4RI9 zVHJHDf=Rm}7=MO_IjvH{lRbXBEyo2fG@vqH-;6T*jUgBMntV6rh?WUfH))buTi7JS zvW~r3gYW3h;Ab}eINO|sl%PkECy3O#EpqbR6SXr8V4^esCb0GulS}+#zJ7=dwQlJ! z!}9!FuTO{;hBFL)-O=y7n9J#)J+WqlQVw_24?lkm`*stq$Uxv{NXK-oVg4_MbWA^+ zU;k~H=GQ_xrk~y5{r%VaPeMATYmF^_F{ER<*4W}#Lpr8w4KDs+NcXe1`F{)Pm_Q2m zUzd@vgRdt5x`9u%pd%Osf#a3O68!cAeI1N?KO!CYIevz8|EW6HD?pF@e^uv}bb;WU zNYU;ZstiFyIl@DF&b{7^jlA-gPG^oJ^R1>$Zx9+^eXFRu00rk<99!CdGjA%iJWOug zH`KWMc(w$Cca}zQ4cxl;lpWlR343?Ixzf_8TX>YqHRjXW&>U|0z~)pu)wuIFY2UX zS5n;#M{h4Nl7by(kCH2#U#^S{;v)ya~!+ zLLWm7cJl7SdfJUoz~bN_x68vQlZqfFxs={Ia~js_3nz_4!Ov!ryZMdkk2pz(^ zi`9_Z#YIe&B{izJE}~YuUG#X8mLu65qqE8T9xw26U6EBIZ6+2ODl_?l7719wN8)_{qTqw79)IuS%jnW{C43@-$})M#q7yQNZJq zJ}~Ih5#tQ0c#=J+)NH_dKe$v)DB-lJXB}cUrW@nHG)s0pWIgg;Tl-mazRg%|cIImm zjR)?QpZr*iGx)7Zt0u~aN@YI?QuTeX+Vh@YB)%txmlYA89mEy&GI_<`y*@4TZa%lI z_*U&P!v2!3VFbKy0ewfIg#)WOZd1j__we#7h!nxDpZcB2I>%^nw9IcVs>BH5`W5Ot*7vwWsc>lB1sdt$5r zTpBIu5X2OO!A8q%M8IhI_Pf!tQt)@9rHhb|j|RwS$vAXrv_t@mmQ!*dqowJk(bB$I z8*>}M@F~b>DR61DJUtkO{BE=q!{i@G^uVRz6hodM&R>FrjHOKNe2(4jcS$Eh;wB`)AwUn>c=6L4g`a7w^9#P=c$L=#_O9N|j z=PxE;beTd?290N|@3I3-mu5ri17^B(-w1%|W=!y- zUS@Dc5@%|S%&b3!mHQMi>y~oKLn4C%`wY0!UZ8!I+T>?YuHoUhlB+xcWQN z)xa&KbjA(EMFs;%XV;2E*&EXDH+q1ep(JGP)>Qx3f;#4F z`3(P2mP_Vq4K98$sAIm?;Nn+{@nsyj9E7_|1AO%8~jSf z4?TSz*ug>VKpd*Z8}y#jkA?01mD6vFk5{@izbS@m8UlGNbxE@x^RbAd=Qam>=aShP zVT_i=1F?IOR=B(~&(h9!ESlKgPN}1VESGJH+ewzqERJbg2DWcAl5ECj&@5jUoHUA? zPuK3>*f{B5yBMFOJ$x+57x1u3d&pX@ueAdAvE>#{=ixx3NjgPhc4LWK+_1wr_NTGB z@!b7Tx_tL2^(ozc*qEx}xF$w4h#@2l_&%4w?5Bs>;ts1t3F+(f2VI%apAwbfyLSJ2 zfo|sizCgE0uX+9jzSw>CUbQr7CKvPlxd(?}$E8#{tlD_!z@Az4vnN@6l$5J?JM0IoP`xlS6-Ms&_K(`$nZ@-Xy*0w0YRO_v_^hN5M#1O$9FIJg?UMS}mo?e*b zPZ<;!tdG;uu#FgoEp2X2Q&$u&z(4dOsgHeb8!*3F0<8g2gPdCJ5%oBj= z2&ERRx;>>@+HpWkM=3YBiA)>O2$JZk!AUD-s;d|;EeYqAE$fc?%B^Djh{K!OB;2wS_^7dp#2p|AuBmXSHC2+*ar#504o6Xo^U z0iD^h=rl{zUaDl6?Eyv#>@S(N5_fiD)bBUoabFYlN(0W!DjFcf}1B0P{sO;0ku??xcqEi{hR9@=vx>Q)MSoVYe*n$Y5 zSX;{+Tf?RbKQ8Xx^7fYouI!EImv9h6;-pX?2(5O9Em-Azb8p?m7%>Rb%R+nV=L_*s zXnn~m2s)LYduZR}g?(VmhPeaAQ7~O~uJ8kXrRiHOI`AUXt3Ky+bGYxOgdd>4a{sf&2Po z^0eQ?UUR9B!aT|vPlM6B^KRRu9CE!?tav6bc=V|3wZD$0ra;DsOs3*_%?6Cu0F*Xf7J`C+)e0=IPk$CYt)B@d@fJ;+~dM- zw3(+M^4)c*W3LxT$3gMfCsYnLZ#R$Kt$o$+;SH;aPf&pw`C%d3z1(1!gMK5AJEsQ+L7zA@70L;|^Fo%mpKdK-y<}rK@z#Q;RfdI@YZ(izi6czbF z8)AxjKk9RFSNa^1X~!kZQ4pB+aK=VRk?4W+Ib?aGC{j@B|M6u!0wzPXm@UO!c-}=KH&jix%4_S z2>~pZ^$a#(%VkIbXw}bT<4Fm&Ef6@mRP#2OgBuyhaV@}J0RCIILTLTbLrnNj4sD9M zY}|LLR8Ua75fhqxTb%Lxon`PAo^>;u8vl&sn16Qp|Jy3gFGg~JJN7yuo4-^P3iFS* zMgK1^&oN(XTJfuq+_k0^zZ%K0Tx(wO4=rNOIuk_?bNSpOT!h*}soMsjI{Z1d*ILDjKy-JZHG2fg!JyVCw=v zavo0935QL};hF}u&s6sg$9caM>d?3I6%Q&(m!aT#|*sj1(!V@_Vb#~kx|xxk52adcb}dzz#l zg&Te=s!sy{eNtSqC3UK4*0tVPqGP-%k4b6o=Ku5Qcb>?s% zyh@C8IAL(g<$uI7-@H_)L1;YAogbyiLEG%k-KO~f?6|a1ZS=1{hU-s^2}>Iki%w@KDzV_r~lJczJH+JfF*z1XvSOa@N``2bSmHR~xr9 zs-=PDIW!!=acO-+QJ8cWd&L2y_GT#b0k_zFOxjAC5y|CUB*d?MKGB9EHzY2m8t8WKG1qKtg@hoQV^aa01S;kI zGhAZH)z~a6p((h|JDA6zf`y-`_)VdU<(zMkObTHIkeKt@mqZHPzq?LtLT+q=_G#Uf zk`|U+-dg>rRE%26hx(4gJ^bL?d0mR7q5`!P8V_7c_nw->WP&BS%+>LkIYBR9OQ$2g zPRkfyVxZ_lVn`6cxspAHJ!{T3WI0zLGIMhep9LTPiGLNj0!8=3q0nJ)6w17bXlO+p z`VQPQq|;mI=LD%>m|H(%ft~fF0K=SfhE*^G67m(y7099Kf?#ftOacsZ!DHpESplP2 zvMkEK!JH(!(G|?)>w#(y{H@|zyP%Xzz0X9Kpp18g1jB;oMTh5}&bvjSn;7)v#~b|2 zap@KM8_W&N__NG|U``wab2$8|Xxe*@M`~%}2M>QwLTLphp)|_@NhsK$Box1^SWFu} zAQtll-lPjN-77&D!Q@$}3qq;ld{)GVg}6~mI%#js4G|B9ogC*)?&#MKY*xx*tq_YR z=cONnK%ik_$R)@dDnav+ndGcUp(M;pztpv&Y?&0|=!El+t^r!}GVaE|1Sg^Bs7d=7 zH)+I{w}jxdlh?-SBJ5L=b2(vV&Df1M%xA)ZU`_>qx!oDjmk@wJC!{2`G)T^w=&~;} zwPahYgvI2tkT2+PeT|qC z##3nEAjq>HQ61#aG&qtYgq5z~QYzpeo zQ9+bYw{xMPE-On8kcQILZm|Liwgh@kP{l^Nst8HmSKz2khAq=7KvRi&@K6DZS)NpQ z)(#@~$C;PLy>GBUQ&*i}PrCZP7`OqS-fm7q{UPl&hr(t+{hTRcNzE6Veo@|9q78X- z5Bjmi#k-L6zv*)@_?&<~xA6!~;;Gy^8M=Q;qvILTq9`K^mQhaP@WIzkNg(8=XTzEC z0=c`IEl`+#6Kk0n5u^X$VGsK4nxv-UNA zDXT&EqN96AK>iT(L$W8s41?)DqEFsddA_UJ8Xo8D7Cj2AV2-oKgGOw5As}8vGM2u4 z%i#iZ7UW?(R5_J8Wag*^zNs5XL$RE^OhakVmEWF-c4_}H4Tbh94TZ=d3`j$n#916+ z8>_qAxdWx4gzBCtVz(DXN9xkkEA!YcsJyZjv?(KkM4O<}&c4VD{IEtPTBPj;g&?<$ zRj`|vR$gqho3^8pCBv;-e_OsEGr?#L%e6O+9s^c)-CP6nEj9`$4Mp-Y4JFGkM8#wc z>y-B}~@<>+p|DbhSwDdFEOUlD~R=yK%ct zJNRcz2Xt~@19N^crUP>9uJK}jEp-k^ro7H;{U=#2f%MgD{3?Direpcpo&Db)()@Bv zcdg0AKaA;q_Ph9RF&zs?;r<(zOYrpsU^?)r7IeI_T7o}=pvPCN#{y=(ADIsP96w{a z|I~5`Y|#b$yDd5p)BU&OEj6wBXj$W-;^zxqS&yDBCzti6=DnVrv3!|3!|d2PT~g3k zDmQ&#&VA$cN!BX>0{7fesY%oFTVVrK-g z52vackw~j$q9j~DJ2R4OR_T9{^nGsE;@fTL?*Cn#g9gQ0dXn=yEys52ALE@Y{~m97 z@1-bFtLi&*_xkD2;qSYM`3=pZWRkmuEZX%rZoKNACVNK~-FN!bnS~fGilcC*JdN%L zbq)>AGU61Bbi*rNV<4m}I*>7~n&|=|9m}-OccjB&&X=w}bZG#V=vb43#Vkd?j(lp0 zlW+Ov#qg-P*MDAr_UQH;D&7F}Fnokpl8v*3-iWbJl}|W(bzSM zxV4(!xoLDFMYHShU>@61)brjL`7XQQj)Sra?PFyws9piu$313W93$v_wWP`2xTSgC z4O$Xs-ZLCj5eSIuBC6|zhkg)Ob^hg*Ft#~yQEhp~y8=a@y6xUKR3D{}U9{hlo-v84 z!*5XWkfKY+RsyXF7V%D=UmN-yD;~pwQ&Hk#J$m=0ZfPI+C2ylW5HS|r#q@kbtO!a) z;j(0npQcX&r=nOSe=DnZGrKpGDLZ;w%(Ff8iAWjMQCaHC`v#oih2ZTy5M3Rc^LQRFi9Ahac1sH3O3X9PvR|A1|oBj zu_oM^qfC5Hc&hMtk;NDcPTN+^4bj%P?k2x|f4IB28zZQX7@@@Q@Ce;AI^E%QBn1-* zblnRUTjKl0pBbo7Z_ujIVkiiHMqP_6QHCs*$bMc6+M;V7Ny7GoRyB{NLf><%N|l~K zSeVT(GLLEHKa2?!=OueQ_2&GmAnj!;iv0nwMVG1RGIo`U^6heq&WbHGnBEX0DJF0o zoQh)B(^*D8QNWO!5P1hnf2?A&(ZLrAl#0SQYcHT413x)EkG(1MKrD^&u0D{8Qq@tB zKXa+j-J~H;){Er>D|D{!wr&2P&?yp*FRq*`&>6G~qWolJ31exlrK(rWtw*;#ka^rrA2H?0X?IeSLM~+ts zI4(n^gL0y00mr4lNC?W{;~8x+&=wuM4Jq-}7M%~^xU4Zrmu}7(HWp}eXEgyiF5L^V zqOH{0nJHa*w;9|XMzWJ7A{Qng+ZOM|92s$eF3- z+GmF8SpMAm>F9-HJp+H=%x#+eaTgOik5uuNFcrefMYeT4+K%2vYiF+P0M?7E%-(KK8A#g zsW2_M5aotw0f|}(%xWnd4MXv^I?Cctgm(j>o_;~OLxoVu&{D?zpa4FqUe9G zqbi}`{n6us_m@NJ>(cP>L&J%H#Xp|Dd}!2sgvS)ZlFYF|=jjry zDdjyX^_vKp(&5cnx6;I0j}#~lIC6AoJYf7*fRIbMKZabcX-~8hYR7Key7-4d-Ou#s{~FYR zg|@#I>R7IXIPj?!fH?4J2z0!%T7uu6pvPd?`xDgt_yT^jT(YtLhtVjZx~-!B4(iyi zpbqiRDVM_EQ!aP*HV!OJFOGM|pN%ez1Dyptpw0rP%gzEf-XBvg!O%Mv;|Tw{r{YD`R}4pYJZPLY5dD*l#9CQ ziEzVSfa*4*!jr>cKesQwg0s8R4p3cu-|6oum)zP7C(F1)?z0Uhsp^74CJt}-K3$d; zuwzsegGvibztvo&T<%Pg{yF8+LuR%}q)|);pt{wjI0=C2Yyhe|o!90*y3J*5#fIsDToge#Ocjpp!E$OeNG0h*71HPL~KAg7$T0oe*H z)U`;2pgC5i?omB1GK1m72D-sf-+`l1OgzYTfM}Ew+-4ve#Z$t;8XS!xc^Qq8%N!$I z9rPR=jZ&B20Ysw^CzCG6L7oPL>w}_Elz)px`S3$DifH{YE0(i7{a~ zvB`M-jN43Dxz9)%JBj1zS$l80{}=(_yWEV3A-#&aq%P^}lmkay`bGXR>ay_`5OsM7 z4T`#qgRi}cx|9c^E>l5Km(<{>OHgOQn-JV5(m^URF!~u3@t|mwR``hon*pO4#)Z&< zMY&FzF65i(?^V$$F;t50?V`kDWP1if2LuDjgMSd}yw00wgtJLIAF5l;jzfFf&)sR3 z*021DP&Wk<>h$u+eL4E6x3hGKD9yf1;f}xs=-rKbrUfnnB8r<@4-gi&KBGlJVgBfw|)jg zpI8iw3@;BojDnWBsJ3*fDZ#DOj<_^dDXk#R4EUxRL_>^KVn(j?hSr2iSg9sK?xF`_ z>?nse3^PEfc?gMt9=C9PHO}i&&B|tPfBG&d$5~36uIC%()}i}^5ybw&{Ae8>4AhU9 zp|T!3Fzm0TS9J>%E8W0u*ij&yhV)Pl##Nz}Hd*3%Y6Mgk7vM4w@ z*vWnwjY54HjUuPoDwk+_Phu%+#}*{h^@C-)gafs+%V-qSz;pI$_qxKU$KE(&!SuMv z429rml;f*t6d}y-Os7EDX5wJ5PO}$COQp3WuTvb_EMqe4(P4+dK(A5Z6&Wv)fVRec1`r zYfRgIj>`|+2$0hAdty+G$G<%y$if^cC8d`)Eoh)){*uYR`qQ8&1+bPzk{=RCQoHAG zL`W2ul+-cx!A>*F)|8O3yds{^BgdUI1chLGgrB84g1gYS=hpk8!TFKExW*Keez_Bd zAz7-=UioZVkcqJbalL%f=enV;c^BpR&&(d>wvO<&g%9z5PrUR!ZATV!R52;jCrak7 z<*|QX@j8;6-j5|bQQksXi|Xk8aO(&o%cE)4ZLDzLlM%+-%n2@S6@j^F<+=wz;w3I% zzqEH_;s9+(uCnD3%4YKj_G1EVd5j0t-^Dsj$;;}3{g9n}!wq|vHubYh`z5z-9T&)c z2@A4cngjMrOPy0Gm!@x`<3`~>!#bd|`x-jNuZDF$n`ZxQ9pe|nx*zY6{$KWAvR-R+ z@rz*{+qFg)zZ%xDU2Ayp55u~jz0LnySjP&|yZ?q(2fm(wunnxm0Y@+n0>>-d1HV0i ze+U2J{^Y*|KgZ9sI+p(s>;6is`;K+Ud>s+rtLR99D!TsvPgQi!W&k(kg$J-nHv`(F zD+F!QCI6my`9l@mI8a5m|L>~kc&jZzRdkAfql)f#tuEoiA2;dTw_shJ`m*ip!li?< zlZpsKQ4JX_*1KngpK+B+655TC9#_@>n2$2I{d+!2v)g_*XVrl{>j=jW`6x`Fd=ysx zejp#kI24?ZVxe0p^_iflld|23F7iJTrEoGfHwu;u$w` zp0QBNT?|F?ipKGHif0~>*%qjdsc)aINN^{2#_NS3V9HS^C=U$oayKv!$bq})p6DU8 z%^NTOUtuz;eVck>EuoA|0&6NUSN`Wl3ys&k#vVAR)Gk z=uv0iIHnG#IRL zu=t|V`=fR>=e!Z3Tfen{i4;n4C$^27aSmEaI`(TO)u%6$srvM`o}+36ymHoj*ldB% z>&W3*Hm85n>Oc(!^n^^{27`+rI+Ydo2OH{UW09l>qZWswq6KJcrvol$qQspE{rB@~ zQ-xom=+2$tHpUx9=MhtQKd*`sYpR7#IjfouRmcGKl2<1ZO&STsYiHbW8g!|DLCBvc z8*bNtZS<6o#1(A7lq}9i3WykGxmlj@e$atKn>WO9rKAQaz<28*N~{OaU~qi08u)#i z?hFQ4Gb{VPO$Y7weVgtLc$;qOYMX9{n(Te;He(M0o!zY z9)I4ZlaTXT?Y;Ss58gMR&PwI5*Opt>_lZ?-da@Mf;_@3h!l?_*5HhNi;*MH;E#-Fy zdg3(r#vr*)i~(MYGOYoS>uRKfUR}y{Za_ea>x_0Hi0m|MNqeryE)kIHvVqXco*W|6 z_XC%5ooGNo7NhNzTn8#K=o4G+q*w+@3=+ujLsLMaj*WEvyDAaGs&T@VfPCzRjYQE6 znU|Xa>alj%#AO;G%M*(##gAZWW~EDJ2#9GTJ;-Zb#u^KW`{_@zw&F_Zy+l-rICJ|9 zEw_%d$d@FY9|0#fim2Fx$@b3j1K6X;hMiy71C z2lX6pF$-;WtAK!%-L^<<{{R{<%NNj@)73MVTK z&cr|gDfYVHfD~^@<&yhEE>xs=l^WoHl+deylt#5#6&S}m#DU1&^5gmnljbI39Bp^3 z83IJ>{etP7Ni1J*=MI$<#f4q2)z!$aPAG7&#D=9>tR@7C0c&-nz9PDLpx(Yz2GZrJ zKKx8OP{kXrX}aArp%o<#108W%p)-P0$(N-3bNNM- z=`W_M3_uB4zpJ396p&2zPAO=^-n(qCdoCHAZxVu^W75Nc#g2}my9BEonlt<9h0lwg z8JW1O(63#5){mcJ`6C3IW6@$yK5xpMD!=LD-0##goi{~a=auh3RcKUz%W1Hg5Zqa@ zk51YxqPqhAX>BPWgw_N`!jR;ps&&7uOwk)sF)CS{TFU2%e0~feQ?2V(fa{t%MUU|f z4O~b!^+&DFX8uh$YvVc1y)XEbw++vJMs;l0n(hB$RL6F$(f+SRb!^wN9sZ-lI<{*~ zE`BwtyVm65m!rCC%`W~~RQJ>7#s3!7v4O?5zZUDj*Ao!6T{$nory!J9TTfMosyrH6IL9jU^L&(2ARlEd zeC;BBvj6A#C>|ysK=~*ITpd3t81MZ^DEyWC%U zf2TTZSx~|F^XU_t+ChB(STUczDdKdN_~4naPP-d+@wGC~Wk^#GU+q3E&E4-c286#Es5yW`kS(LIjO|I=U)7C~!d$I)Cro_2NamZGeS4+y8 zxXN1JF-`q$^r~Q-FkJvu(^2RPvR3O8S%$Ab>g8=-Z=Z)#Hj52L%mTYN^*o3`Ee4|C z76Sqa2kATiK}3pUcIGrF_Of(O%5;R^cV5z{Tt7$C)*WRBJ^VWidJc2i#-ux@Cu0YUFE*yf=8O4*Igk;4LBC zm@_^!Ck8CXP)p;~W+S#(HNQK)S~z|nF&2vJ!q*zzyY_ZI-+K%)f9o;mlmYb^Bmq4J zvdKV?fs!2-sK=l<9+ra84rX6;ywG!uMDE=*NUYN~kqUj}Q&b~{9_-9BB~7;Bzq55? zjHOEl=rIt?NeA^9c(`O@ynI&|(VW6D$PdjyPt9$b^bXaLAJ@x-ppRxq%zzE&4M?o( zecNKM!iQr^I=`eBfMKSHCEp|J9Kv8a>7e<#+3OC1ZcO6VD*_sEe~?&r0El({u|5nD z=Xz>-lL}j*7183Xz|w$%*ETo?~y(?v7e1Tc7@@w%O-%? zftjNHNMn1{NJptsrxf{=ckwBs#T{riws&qV)SA(9IFIDGj49WRiBnM@lfC9ENAsJ& zBFikTd%tT%NQZ^HDCxw8#5CO12!oKPenv9Nlj<*VXT&f3)MA7qyEgJdL1g9AW!@z% z0qP$}U{_htT- z`?B@kccqTBD$DrFed!ER>YPPzCV%R_Z2uScCC3(&>Yv<~acszZpE1%w?#tSL=f3m@ z+?UoM_a(j-$bCt3>AvhR<*Ua8+?VB7?o0LW?#t1xR=I~QH;-RPB-ARUwi($xz@AE> z(Kg>Z+h?vSp$&*i3~CKip}O>5ewJ?4kuRT6pmKQCszXZZ2Y4^(xv&L5-b=VxdioE5 z_p%k_y)0Kb%?9<0>j3@YE)VBr#tr#dfqwBE9r^r;O7YgKjXHf$zc>}pFMbE;7dHxm zL=U>^7bgSy#S2i9*IGaub@n=EF8J1OESQEIU0DL zzTR?ay~Gzx#j^(b#YY2o@})QI*ILxiC^6ICZ-%V5Sh*mpl#!C&CZO|{@YlxQ-c1A2 zE)UYR>V8IZ?AIFU|6(-9eyxfAuSIk0*YX?wqiBx(S`&+3jON&{HL>{BXpa3_GmC#1 z&He1`_Ftnpu*UY+GzY$(0Q3ev)q;*!mP_zw5cK$p^1y$%KWTJqKZ=aMSua`tQ;n`# zw_WtjU!+}v_UZmjE1mvjE8RJ$m2Nsj`2${j<#a!|m9FPsTj}2RTsU!p3dU(|XAx;-JFl@8Ql@V%Ap$Aa<8R=O?MKNXC#icTs1q?HbT z_h$v;npi$6w<;M_mgk722bj@mJwAwREt}Z4o79^i_VBxU#-wY?~;HLsL(xJLY;L&OWjdZ!c zH`1-xpuPv&F0DMs2+Y`m8}ECSDd2sQaL54LE@hO#jdYF7F=Ew034rYq1FA9qBVfB+ zOeWnxhkOzk9{XD(U4KM_veo*P?UKdl1Py4Udj)EwlNSaz(sg}rq*E`Vt<|L>s5X@D z+~oOY?S4GLku8)_fNL{XvemYVLBD<w#q${f%oFw z0)_!}FdZeu<{dV)FIG<|k`=RYN8L{)n$>%J^z)HH>akx^eg{c&jcZZR*Y$;69{2%h(Ix6b5ZQr+0 z1eH)iqy$8|J48U~kPhjR?vUOR(k&t_f^?U((jC%`fPj)B0wSQl`!fU9!}GrGFZ=fg z`(10Vwa0PB5neRyz}$*h=DdXAkDoQY%grV;qko=oEGX^4_cVvo z6k6f<_F>0bSy3jb>ta;Hjbq}L4OaGr9VexT`+CW3UrEr{QWwahXxhwQisqp zbsuqOt1IU&uQoC(jQg%CtXA?dvk4L@S2{kx2{#NOqk;Ic$%=WA^MeI zgB#2~tL{ubO4o@SwY0LGCQ0)?=>$;`O3as@6}wt2se9IFsQeo}(sR>M1XdOwLb@U^ zlR8LTK;dkN0u19zn!qsbICyoWR)s1c>qRcp4QwpP8m|I_qpT!y12~Ey%68mHEiB5t z|8@(Hz!^ljBCpjn?nRs7T9q9II^3EikC9q)dnn3bLQ#(M;TnLW*nTZtc13uh_3*$f zcc_E>qn70kb&h|;vfQs9jQ$VLThi0f9qPd1XoWfO)gJVj{*R}Mk64-mU+$p}E&gS3 z?x25*e=5$g!^*Wkh;w`88~fgxoy>$;TJmU- zU440Wda0T8$g&CJvGT1%htImJYy3YEQi_%Zde>u#w{F9Qdyow_?DrF(o=$v{ulq=4g7@SC^c+FVb@Q-y8P z%UKtkMY%KQVSp5-p8zS*Q@TB$F~_aZDIzA=pD(nfjl1Qxs>B*lT|n;sKt42kUO>@n zNqpJPTvAfpl#S8YGW^Be2erUp5c*sw>(&h~vhiiV>1%DiDNhaGUGt4R|MdcT@{?9C zL&=QGVJLsCT{){+t5i3F?eY90qI$m9N$+b*baAF30(Z|wI~!4j8e-5dong#Dc9Q8( z9n1+}rA8ef2AM7rWV*~8q1$$%6?|XDXYURqc_P(Ec4;+=ynOqG^cjs)Z99sucNi0i z{W*5EP>PR2&rIVY)@Mw8Ns~6($V(??d3q!4VtF|(r8f}LmJN*+!umN*vGc1ig@I-# zte-31@8=>*mxbox{hVV7Kh)2`v~qWF#9XjbCq?fOQSu|cAt!QL zv^IxoHi26iEmF@dI{jJs!ep*hl8Lf$l@w6v(c})3y%nUO5ekzevQ)V=7qk2xr!kBv zq{+^KOTYM6FI^@63C$HP-k-g6jUCh10rv6}*rr=B=ffj}u$Lg!;fJOA!yN`!fy2OM z-(fI|(=0$)b`IL6>tDdYKy&bPNLpwYT0kd%V`57HISigd4ub&_zj`hLlbnkeYVW(A zTfouH>*CgX*4-)msMu_RryCizP1g}?3byIC9zS4)ZPNwvmcX~^a04f_T82FJG^aSA zZ92wXOO{W_#p(X!dL%bUBa4h3Q&lyq6Tvo}*yb*(!gKx$#U=8NXhNZLB7B#dG#Rq; zjVU$-hFY1LfS4{m$1sdny9+Kc=rcswi**_0X}7YQQM}SLh-8JI-9CH82NT0x_nf?B zGivhEr1v>Z>1uT3*Dm$swJj?%h2BQ~QS9OwU@@3Bi1AjN4s30LEC!E}HQ&N422}nrma7qR+xG=% z@Z|35Etd-~0PH1^Y-~&j++v^xVK1#D7wluYqePjiWW7U$HUmI|~>o<-*~P9&eeuQR>lc7)&75xL0y<*jd;h_m$LbAfYYR^~#Mv7fyHolyrlPTS~n!XEK%V)Rd zvORa@W7Wmw*zH@6ee-s*Nb=}1<9S)5+nIC16F*fa4aKnb)l~3nf+Z-|iJgb%I#(8u z>+~4U^!xMFTT*vCbAso(N0V+J>7O+k&eBHDJS~cs+1kfmT0IJS-a>ufp36n(!R_{& zVmi5Z)S2?QX*IDgaYj#eY1-1@b84%bo`Z)%;(WoezYfBYsw@v z^l?HAW1sXe1A`P;rpsj0ntT#|HMyO)!$v#Hey%L9)YSM^a-RxogQPSoe3>rqWl;F0LRWlIY@88a=2NK#m3p-b-D!#_ z+qXIDVfW~j zRW)`zazk8-Mq9mP^#@#2EET$kJ&mR9b2fo-t4IBQOnmX`rai}AVBbV+Db%t^D(%qqsG5%%g?x0TkA4+%N zX$1Z0|NBNAxFNib0~cUBcu<~$k6nTb@aP9Fz_TB?01JP=Bs_5CuV2Xb(vFQDN|yo# z#@4!);Qz*&*1ETJwas*Nk#5{Tva+_+)igo6AG7pBQJ3`xrQIV?+M)B-d5_L?Oh*q5 zNnVs%{X8eX&r5mVy0}bh^!4kPxtD!CF90uvoBEzzy#2LX>$y*MKhgcdOL66L0*iIF z9qccaUE4}8vG!$UjI-?VQocBd{@|rV!g(ptJn3HQdOSS0e(+M}`~WY-8SqjX_joDd zGX*il(F2GtY6|)j%{+yt!`^n|JN)<3?q^=g!KIz+XwFh&fgXB7fo*fjdLzOoZA;bD zW$rMsLC#OSl%-rCHo$*hHLq4A0>lQ)oa0YFz#Mh$G04OH0bK)tmr}ULOW7FW_??$h zm0~KOJwW6fj~{w0oza6@!N(P02FST4Z7P&w%k%kza$6*=URkYA)&|B*JMaj~hjw{Gg>6U4dvR@Y>GMg&3;s zvT>o>4$x8#sO=zH3Kl}i0kz#eE#-jP?h1aD0=%}X`d-^*^DH+g@)>rnJ3faH%%-j>!w z4K}YPy4RA=idkImy^4r6wMZ1J^KfqZ1!Of)dIGl^JX4o==mNJIWWuZlo9jmMkfN^i zeU)SV?aRTH)Y*BEcDxH%4TdC>*;A7>m|7%~)po;d?Nj^EZzi(FiRgf(I>RaixS|eu z$&}(a^_D%)MgJe#@qGX0dC$u=T+`;~G-C%Tjo0*$v!CjCe<`>bq9?)m*iK#cy#QHj z!Q~pFHeZo#GzkPQNz&<$nzO|CTT!2;j-^kf-BprIoKF(s9ICwJsOg<%LDUeyNp=1D zi7 zT-u+@cLRqS;@=m>SUxZalDL<1yA@58*>M*)hTA9tw`~rbNP1u6ch`V3bjJ^(j zEWfFFCS7qpRGBA_?d_-7X_%z087`^oyayz8PI{futBs04QpXewm(*FRls@o(LLZOa zri_=gP0k#=zf-4oQYjoCKmP$$0saL)*?wG1o(ATwZK|(c>w;3(#h0{kgLs^_Vd>86 z7*|mcxJG7s@O^Pmq#{Unn)dgZ;(P&k#GXQ1t8Z!N>Tsj?^W=@Zjp$_~YttodQp`<& zzbxqVumWiQnjB&;o58yBJ0shh|(_*EUoy8{b zd=pbVN8@KHj(w>?mD3#do4E^37y2#x3)P(G`#-ChyyDm%*Fbez<{! z4-(ZS+$aj*J)c~hXZ$S9WbuiKHjR8^|6N5qf`CA12$KUog!!69fQq>&U^jlGVXwIp zfs;~-0#?D@Y=!|T1=ig8k2L(;-1(Ht2$}K;t$aoqtTQk=Fy7H0>YV?m#XI_gj<)}} z)i`4Dj{esVNdKqHJNiSNVjQ)2M}MeOj3XEC=nr*{@h^*a2mPS`WATn2>cIab-of5h zpmGlOiVM2{ONP)j`^gXXQwsYnSn~TV-oYN~pa$>n&SU}uIW&{`bAy+vy5Ha_kl6j; zrU?1$Z`d^eZpy^}6E_8AQ(f=n%e&?sIV_OlpbR(;%Ks*Gu3^BGy_=X7$Ru|Z?yZr7#@!p1=C7ljF*s$yR-EnZBfn52&8^~Rr;tS|< zzR{8nIhIcBL4D8X8-gwfcboOCWvk*YYkF2vThgK$YY2)NRSTonw)~z^g>f)rM)9vz zG!hz3R=Q`>C+Ch`Rwq-5pWVlWf=#3NT=BIlEEFPV8| zI;G7pDa*cq0r-DDSV9vcwyT8Ud>Xh@8O@u$RF?jk~8brjL zvo9|l4SWqJVvg*1wa;i91z#dJaxbJ8DzjKXe2hR){Dh;CPH7a`wPQq}*k$q2D=YX)HBgFiSq+TOwIFVjBpHj)A7Z4H?m-v~~ z%+v0Ydkt3-n$tqn9$mw|Q4VYIlqq2?-pT7|s95zfz8$*Jl?RIN;uxgf z&jEMci}<*A2o!WQNpvY4C8%x^k3>78Na^Zh?|8jY@hs2|j)>iCEO~y9%TmRUTS~A2>WWX9HS99Z$-4NG;x{cgX#a zN7U}}m+JB6u*edp&@Jz~RirQ2j-}myE8pJ}%t78DVe76%dG0ln#H|zyuWN5_X)rjn zM50;}=_iLfWAI6oejZ78=C~Rmk$#?jPeqQB9w^adfH#o&j#>SL6Z!F&FtH#xv7pj^ zI_?`d*P)ab150^ITT7vO?NA?%kzY@K*}>NkCiFq7g8hI zy+Z<0o-Zur>2XHAgr~gR`yl1z->(}2DR1DBDm>*a8YQh@z)~JQl=8T3LCTx7s?>z3 z>u7oIl?750R zaobzNx&1``rPT{f=Pk&*Jo&7XB)b*I(zoS%GbJx72+K99iLQ#X(CXu|S$Wv2)G3&@be8O^uJv^9sHddr589o1aB&N*S%RC}y zBW)NgsYn}IB51FQUa8|1ZMx6O+!;U5mnW+4yR7*2>dS&Hqs{l{Wp`v*iZKL0g%`G# zW_&JNgW^gnMN~^epc2chmVj}k=jGMcWNd)n`TR|c@6C`esJhx5Q z+~1}&DII@IY5tt?9t!*Yobf<~=QrSHPvEq^)jIXP!kaTgR&(C2P#$%D8;;snYq{D} z%a^1U$Y_?;6}~2Bj`!{U=lsvR;_d9Nm8HEZzR~mja%RJlHN|#u%X(HXpGR2^jAN{n zrO#H0n3TV0Kejj4FlRt+7L9R+4(eGOn+OY ztIX81szZJ|g%PJPzq_q0pq(Yb>(uoe-0A910^;d1W0guPoby)&fyE9!q^Zt(nQ(H} zWHsNw33r1tZ=$p zlgS3~(vU|tc&o{d@PxNf zk$f6q+db<#EaAPeP8bw_Xg)Q)7w}f#7!@8Hd>%9)vRj8lcIfk?Pgq^OR%Xu5(EGHI z5oYN~f1o~booC68SWaIA)tuKPJH)u~S!?c{V-@<9nQ7i#l)c2NIReTNLe1lPb`M@6 z$`~1*BGR!DzezP~4n%fr=caexXBeFV7?n0SMrFd~e$qZhr4{Vn^-!JM$Ee)f-@UW( zBL^ZoC%DM2Ewi;bmj*7fTX~`b6WO&R<8%8<>6NW`m5||C=GGSt``rx1rGSa-WZjLC z9JD2w`rLQG@}0RH<*@)>M~dL3<1Yu+FJxj}FS3lMk++jMo7x<-{ri+=r|`M{NGDDz zR-tQI0Ux6^adr)G&o0ponaX#Wdn;&!FKI+BqFftbtFd;%WdRvqi$UE^HSl?X=qfBQt1JlO2fN{5z~jabppq40P2!5`q1o-jJa4 z_48Vz);?!e1E91M0?T_=)^J9q!ZCG`V{;^odKip)+01QEf&_Zd@?$8)Q&cpD6MKe5 zUt8D7W~pt6k#D5*ZzSZ3Xq}f<>J+$doS!8@h%jQBqO^<_8X?4U$*i{-CMjQxUX(~? zf=kNlfTTRG4&NdMNXpOa4pbgvL84~b#(57(%1>kqi6s;|IWEpi71hq2t_5{o!hBpv z$g=Wa%KVO2dP_6E;6_jrp#B_)p=>vdv%@} zx?9K2?5n8NRwYp9^@hOeJbz2I(m?-rQl0*K1yImSC*BWwc^vt&q!xFw$zHQQyYBr3 zJzt`qW-&38@L4); zE*wdSs=@`RDhq(BGNV%`YsId#DU1S)b~8Gpq@dEHeF3lZ{F-OA@~>lr?N@pXkF1iF zfzfWS(xbWtH`qO8tN3g0^lz**4XWQmRkF}M|*fV^Sx;ubpVH9V5Zrz9Bv2FNw9N#+Hyg zf!tqLM|eul{Je!LlCWR^SA*;9lY5Q_hCPOZJ{bxI{*PMN`}O0}|LH=H z;ZSE9M=tCg>P+Lvg}npukbnFd_Ad*22ff1mV_}a0R>u87*n_>Tz!Dv-tb-EW{+K50 zsR;Y6{TvAU{{6~W0k{9PnfxC1*y#S|yyhyUz~Xupfr<1ek-1h&vD&V z;C6{#ogbODwB3$W;FI0-1F%cR5Iy#eiXuLR4#sMmoyo7Qi$R-K9b5HZ80Mr^)gF_HSM>B(rN*UA0Y5Uuk73-Ys-FUjC(^?3>L->(A2iD*cJn0TA{a^?3~A zVaQAn_H5U1CgtzIm;|2s3|qM5EMut-p!hIV)m= zq+En4`sd&D?t-m0_-C1{usC+00Wa z{FmZQMW?Pc_@)eX*gqzdXYqW04xg4CNh7H}*y%F!%dpSPF}HKiPbyFZy}DLj(hBN4 z$z)2M*8(*TJvbtX%C~QBkGJ@p7?st*`f3y^e$mSBfpc9WLrt1xA98nBmhbhZamo_2 z0BM*B;R@3((vo=6=nfd!l;MDpR=$sH#$+8#TItp!c>iN&(-cNpVf~e~av98QmcdCY z)<2V0=4F47Rzv}5rFAfGCdqp}2_mgL{9k7_zmryQEx(giM1P*yRM~_`D~tb)v|<90 zRu~c_f?%YTIGO)OT0#H&q?KO{ckw?+D;xtL?S=dxt(femJx3U6#chwYvOJ?v0w=9B zIs7MS<UM*cE@$e;h6+^(PIJQ_bEb_j=l8T!rV)Hh2`m|3g6C+iT$K4Z)PCP zh)6oa$zc+IPVf^-v$@x>i@oF1jV)W)jZ`A+p1{nO6ZfQyy?LgGI0R zJ$&NGDuVLf@ex4o~#sas>9&oxodNPrcvauyCAy_XsJL<1Nrf z)TG&*3z~3UfKP0G;4BIh&(fAz7@RB)j8wz}6Pq@l^_ajuUS2oY$9o1yD}{l8w34O0 zWLB2*InvePc3wlJ%)nqTGYesl(>%_!SvT`{xm|ffcNjN=``n#p4s8aQb7eOfMiI=z zm7@ozS}O)Wq&&_GxDUde;&VxA?K|#ix>V8nhL;^%AJb!rYA;Yz1x)z+fpJZF8rZnz z=4%FMT+`pVlNuiGJ_$;D2~Ge70=2dixLYi^n=2IV@GM%fX<*^51`2mr7IsK!>fdN8 z-?;8b>HT$Jx??=lssB++cZ`QR^gm+hj`7#eNB^hO9pj-6F^*cgV?5|1{vXGkqnGXu zb&T;ZOLqtTTl{0`juC3a|72Vf_O=2=IM^#L>;fzpLf1e~Mc6g_!H*FZ{C=zQU=MY` zxF##(-%NMn2UK|~e`{QGvUO@>e;cp%1puyaXJYQz%T;!)U!tZ(Ot;;ow4UL*sL}|= zH8Eel%wnH2V~L0owNM=^nK#)MAKd8Z88cpHm6cf@E}v3W=o?i?GubS@{FmxCsj+YQ zpSN!Kk|WZ4vWRg=v?$S*qpi<&ggC{QD~!op3+o*S?}P(aa5jevtI$Y`Btu0V-`PJ1 zwfzoUsaB#5DO`X9SJte!>(!JlUFBM9;Z>^Ybk;=ajC>Th{8}_bHcT!lWXia~#Hw`U zUC$69gfeM;`4b&i zeP5KHu=B~7GUzv1hVfS7u8HwJCQi8xcq_ETGpy(Z4+{`;>DxqR(4Ok77%5R1cpbM6 zU>X(~G?vv)kjX&Q;(21PbS&!QY>kV_Uk1Cz?D=+|pK!3rb$od!YyDzRa!2}`%Z+($!{d|J6|05J7aCwTf{S(-eK!HeR{O*V@^S35-Hse0|tS$jsg1cLj5)KIhi= zvez~LWVyS$Z@D|2%^CWOjE5wg#E*W(5j_nh_8tl+V;3AjmR9Tb`R2`uC- zjRXaKI)QtWCLiY#`en&RenDMaBBTTj9T!a88FO(lA(@*KCnI*&+B_k}7_- zA;MF7eYg-IdHlipRFeF1PyKv0<#FaM10D>q9~*hO{?+sBZ0Pvdj9( z2>Q09bq(ac>Z}RT@}I?YkxS~2*HpN>Z8y+a{+VCvYKzYafdwF*uzMA^cW3wPt?sVJFqZ-&A8PqDHjM5#d$lJ29 z>S6%3lH2qZjeM%+ zTS+2Jt3LUM;AcKlif@jmS@mXneRIOMv|Qb=`~VIkV|^zt{)xj5Ay-^Gjk5>Gx>2?=Cg?YK3Awny|G}lbY^7~&U}g%xMuw19PFfg#8C)PF z)3>%Zx8k6s)iN_PqR}+f);F`HHr6z~N26_KLJR-3x|X#St(C5}jirILJ&nG#i7`3& z0{~h$8s#X6=#onQRRV%v8+llX)G9FBw%=ql z(iV)o%-q^ui2o)ZG@)1VWuqi&%w-l#Xzp5W^z4fLGNEblO?P8^8)0t8(n`skJUji0 zLZw-phsiS6So^FCKl4m>Ddo7W+`4o4aIyNr@xeZVzFpda_?5&bZm2T)wMo-SF@Cz7 z&&EgDLst@Zd#mIagq`KKs8W``FxO;RE@_SQ{T=gx|lzkG&+!taKZPyhCraKcYO~>wUGzTkkT( zKN?uEyW5H-x8AhNbw1(5@V;W=$AqTG)_jB=n9wx+eM0j~%ta| ztU)iji{C9wA#hcLBayT(Z9^?*Gs;1Ur$SU+=uJV`{ zz>YvOgIk?>(O>%(Q#!6J&Su+vVkUOEZohnw+Ix17>)R0IjXZaR>Jbdykerx$#`dnz zEP^dA$tNn#3YP2Yy}L-*J(07wDQh%hH^1jPm>mJ+I{pQi9l-^3cD5V|5^y_0oLpS! zz8!%Ga5PQ#IhuNbI*Ayn4*_W9_QH&tFJdeoclWyCQyZU0izc>M5Jxi^;%JVXs?)k4 zIP%_Omu@_^c36NAvn)kS_6xgD_v}K-bq6?TC2tJ^txR?o?15IW_dzRbFwly@ladRR z-r5~?FLBR*bIYR8_Prb#B&A0^vTQU^@us>KTQ|Af)VrYjs^eXi#7abx=7i8Yr}N{* zkfB`nC|0cU`+%kzd_c3c{>Ol(92n5-1Ou8RzhE?Jh0$hby%G_zR3F(Yl_&=W9>3N6 zp6i9QXZ1p-oGGK%yeqv{?uTrmYG?(oGK{^%=^<R#aPQ(P$O!?b7D(sc zd=MVxGuYY~>`O58>Rf-wTQXeJR7toxTAbV2w>6{~9@gl$NDx96sDk?C_1u8d(5ltV zgfkRM^KQyKxokS0u5a`31u|*7Kah`NHwlVwAUPGQ-xkL_ZI-Lzmq>=&(?Pf7hMiPw zISJYB&?43?yM}|(%)k2)kQ&oJ&6sE2p-yOyFd}@I`{sD?Eeyq5iH*p;!RL}?USpfO zetrfwBuv^-;6(d2BtOfWrp95U=LCj?#SiWJ6p%(D&EH4(#hMox4w!TFZ5X~jrv5q& zBOvk#=jAx;LtaCLOy!^~E$HpE z(y^w^q-pm#nw|^w(y#k9o2!kuiYVOdh}C!R5H!<%)Mk)+8P}$>o9LUBW@t>ARB?}s zbY7+pTcui-`LP_6TtKC6-xI%~ymd^yMl*p%kl88l;B%R&(BC&5%w@{$&1Lc=1qM|o zo{CFv_$HuPVy=seOZ!q)juY;MzU@-G52~{1{%}ZLk-h+{^PpnyK zaQ?Ye7SU5@vzgn+O)2t`zcDu_SFdPk5Ul3;o2RR+hca1bOkK|3L|VR^cnKEpPK&?f zbG%5->RMB4C*qYzMPlE^suoHLWC^yhYe1IZe+?!}7@OnCq$RlPm2^vnGpSvvJD`VH z5z}e#&3p`%t_AHByBYS-_U&Wm-e>x2N}N`nvqCL9X#?NEdvES_g8q89{96pq2UvY+ z6b%<92t^Z7gmM&wN-87rv|EMI7K9V1WWPteWLzeA#4DA}_shTaYR>#|eG7p>&K;jpezpDupULFr;8%$nqmo&{aqwN!`n7IFET;zIQOloI>M1 z!}*9HdVq`j6udpqy!?C+nIAXcBE8nA%MeuGg;)|9!|J;Uj{s2L zB^kzdHayohtZi|I4Q7(?_EitDWhHj__HUhl8}LjrwM>8kuV}Rz5i;OidkZt*(Ku4_ z!3}uzwaX;KG&*v^3B29&eW?L9s&E6IM+-O1fT!iXZ@_CEe*M-HZosR740tuf7nTn+ z;MJD=Zonho^c}V0tf}gS8SvuhfB`R?t(*6qUA+35ZY%At20Xl940xo#l%T}`8SrW$ z1D@HQ0dK6uSsOCoslp9-X8Q@R{Y!&%*$5^5BXX1o_gOsD(pj8tRmx$xJ^mnYpy*z#Fa? zqXG>ck6Jt;)Zj7uiMMOf8e;A_@E!sO-mP5Vz=Jn<8-o;k4!jh|fhS`;e+hEn+4!!y zTl?-i@Ma|P3ON_UQ7@@lzHD}FzpIJ<1~rv7Ka=$i!p+xDT{Sq?{fa2hJ%w1BSvS`G z087&aVri-`2JdRoU^W4kCLw`;2pGwdfO+x2jkX1pLCfe*0Yt^2Kl zyP15chlJ)(!rRp<;erw#GL-PBp@iqMd)uMf_2GuD^??bG`A`S`M=jwoAL_jSh$TGc zLk%SUyIMRjKTSvYOfEM1q~71L zBA%)?s;)q(a@gT2-yMl^t=d^vU;k{=kdYIVF|>4D?X1)o?LD4}&RbD4Y-{~Us_dPo z2383+fk>!YK2-`jNEs8#&#B8>YL*YPHX6flvxLE^Jdq$VGgu>389wbK5xN&Y-X6JjD$*U&}55 z`L5aSzM9I58#y`p{uB{sWbdP&(PHf&(;Ma@x1YmnP%K|Y5>UI5l5x7M>8m+O-vXDsPgC$P}?o z+TMe12tgfFbl62emDrC3z27W5K_y-8R?$jU1r@4+6z{3=OdDHQtJ?poc+RYXpDBy{4><2v7=-MT0QK6+s8Os-)uA{g& z3NIK)r5buUO?+3JTiA3w$!7zK^9h_^5*{m|^%-9{NAt@hCW4m49!HZxUd|t{>h@y+ zf?%~dp%V9jd~G8UG(Qn2;hlF=x{lrGtuMx|&$Jx5Dxhzfrh}#H^H=92m0vh=X8-9e zpBCiqSGP~q-OlSV$f2>gA&kt-IM>TxydW+kDu5MWlY zD^>1XPGC$GELJ=3PZJWF*uH$iH6*#e_oDZsz6-}opVX!-ovU%dSz*yyA`C_zlfk5z zj=5!EwK;t;@g_op=cU=+vshq5%i_I#&#B~+i}R?Dkn`+9Bp7PfPOJD2m3MK8_0}S3 zMKhw&UFUzLk<+56B`~l3=x%G?_7`SKu9C}%qt*l5Q_s$UWyxQ32?#%Q3FE+VjsbU^ zZ~QgUr*)>^FIIUgj;63Y8!XZQ&rx8BCwxgXQ+wb_+# zWw;bKjL~VMDG`$ z`l~5C>|fC=lP*V}E9`DFaQre#di7nM$wtLxo;FKriD$8U`EI3U2^h}n>-3;}Cz%#2 z=2ha1b=7UXZ@5|7ukN`0v$CEHKj~PMv7+D{RlW>`trlFhIDSd7ENww!JjPK5qjgk` zl>WRl8)HK}&ar;_i>xR!i>FUHOb|J7^yeg)ruk11=w z*_2S#2CH{}iTR}&`4c=hYU8-fj(O2)2H7rPX3{J1M0s|uhyO59#FpAe_Y6#uAf~ z5znM7fpPC$lwpp03J0b;mO~x&AGLJHa;TI3BbM%14mFqf?@D(phdRVKYUz&UP=^>t zF5R&l>KNl+mhKLEh5P5y9jtr%gLDUbTY<71>=hSwVSh9e_Edyjvmg9m-@o7cJLX@D z$p80r_vfaB-$Zx<`y#y6*2V9uchfKtUbfx~NQ7teGG^DB=T{Nls4EcRnO3vE9Co5A zxiruhkTK4@C&HU`;Qt}Q3x|vF7I@OPfe3Fx@P`Nws}+dwtbhp5Yfpq{voFGHC}2r6 z^Y|gci>*2rmxdY~P-1T0CrYwZc3tkH=v=*%deEu@CQNpI=kdy#3R|re>GQ;U*3u+B zIu{Le*rF}&x{jJGeiz}j|0=?p+fBo*V0cL)E>D*m2Z``5ysuhTE0Q=!gtxX>vt1(q4hi8*&0`IH-oNn+(Aw!D!dp9g-W9HW9j!FELJ{r>?6DFIVGl_ce^L2 zYy4JJ`^1M2mC|p>kcIKB{3DWlxI$A^=ay!tZTA|ykvSgY8#juffOn~he80e(nvWsW zwV(zC9{Mlw?gfZa&Bm~7f>i;#~h3v;Wi(G@1@9|Ew z`l|*Ov2@tmOEe|RMjq81Do4=eWq91sj3!Qkgg?YpQH~S;!BrtL_l3=9 zK0kFFiwT<1+?V0axb4aC4EJPsU`CUvDETKD-aVKMZ`lx%;l<_OxeRF%QsU#V_caMQ zK$CDvv@;s6NzhQ-(8_s&tS0Uhk#C5|cwjt%4}O@bNCndI_i z3@qK78^t9J4#0KJPn>`RcJDBsM!CHn%;WIev*98Au;JyM+_&L@-MfQqc-P3Q-$jsg z9#`Ux8N7=|Gl_N58f{GPL-L0b_hB1l=f7O;(?1NB@te!q015B^*@j0Tv(&?0YOQEe zQo17W{%U1_Y$^xG^%R?4rPmxVPs0C$4KEFD!;6)Nc@p3@Jh&&}U>n|lCOo(ej~lY# zp}}o<3IC%FZ}nFj-t|Vo_^GH^XmnI;2`+UZ`c``wtFTt$@2jP0ZWEZb3NOM|yV3k+j!7A?| zunG=Xz%#hd6bLQgu>%!eJy^g~hE#a{dn&vvpu*b#D!lwo4|AZx!)Z)z04lt|J#J$60-i#Z`G8`XRo6Emik`F) z-U7QTvQ6sLch1s3XqOF7sW{%5te1D3&c5?L)$0^JDBV$kbjR$6SD@5ZUk1|M!c-z; zIiK6JoL`Nq2Y*>TU^y>F!Xc{6{U_{rdUnZ}wIHu5`zGs6&jSmhM;&`iTF>L&!%i z-LW3(7~@}-?hg95_{Y*63#@nhlXSP=%dzYaWwPuKWx}3{P`ZQtl)^5+g5Pi59qgeF z=C6!U)T#xAE(7#>{og!zKO6}WL8={8f<)9K4urR)x=A+aIoH}37gM0_ zZbe|(<8s*S?e-;7HglR2p@818v|rtgh|;>PRU0R`Ged-Ph`CSykp< zx+{b`5|XPX?ueHft@zrh%2`b$0Xl@+byQ3MV`yRYO$b(m;`$5d}FY7u__kt?EZqqZ;*UCT1x2>#Sa@3Xb_|QgqMtAG# zrYASoJ!y_ILE78W;_@K^z6FB?3X>#kPigmjKJ6r&Aj+rxf;QSKy^1Wgc=o(+$m!2_ zjl#OSPq%12{i|6yt7pd1!RTpUTW&Lk@r#!6K+Yt($NlN2V)!qqZz8OsYuArt&W(y* zV!W~wb4~1c1o0UG2(6MhYlr^wVS)Zz`W=8)DbZQ6gU~9~)_yRwin6w*YzCq}K&zCjI5U?K1=cMZFqyH{E*wPhWy5NF7XOQ-R}Q_|mYI(bnoIo!Oj zN;DZ5*B~K&{dU`R&wO)oTC_HYYBqse87)%JEjs;K`NCwbRg#IaIoaM*YE#iDl4_Ea zRS7;VK}1O7%P+BM8!#;#mAX`#1St|!#Sz6rWlG*Sln|ZkpFu@*#EP~_@^LPjaApoQ zbpPVA$mK#5s?)X<&{Hl!+WVf~?CXVzR;w0%^l+)0%FRh{I8RBq46g{JcR}UdFx5|v z1T`tN1cg+=vT^@HP~KIxFQ0TpOD^t3ywx-x^_ODXq`qUUId;P~qv8N!9p7fKj|k6o zsbLrAZ#QZ0Jg~Ux$!?eJiE2%H_jEtg1M+1Lj?*K2F{(*nZ6BOAFl9Pum=G=wXd+m& zMV3YsOseI|>59=4FVHt<>W=U)MPYF{U?;X&51?4calF;=Gb+M*K*BDI-g5Iom;pjQ z`MZGp2!lPc%1Jm`<>Z@9hoUp^bm!Nns&K;aW348|6GXXCeW@COXSeG$F1z>1bh{fk zvQco8F&;m4tLd(J=hx?$-Zz;z3EsTwCH+?Cp*d-DdukWW7NJmbcJ|}YES~9BjPW#L z)6`Ya-MKGjvT+Te_-4@wjIyDPHQ_}(yZE5_-3=_h*FH}p;cN#b?+Xo;gW3fa{N=dQu+x)FN7wpobtpp|LkE3#0Ykf7@-j+Mp)9A zj|&b4VuZ%|9YY{S&<0`zAwt1G#9i!9cdHh+B7YGhxc@9hn3IIW2%jJ^!V4fqP`VTb z7b8fkl|J!*mlt)mU5{OVX--xwnV+l554HLWZoLksGrJ3YWXD?KhZi36Zr8N)gL)`7 z&+G_KXfi8=##V*Gl?ZQQDVt|S@=HS(ohX44;XF_xFmqiN1WJT7T%bglw*8774k;0? zDQzZsQI-{oFkHOoNItbPjK#->_OZi8#|m#KalT26t__E}Blh0q7WN*h=hVc=^=>rY zzQpn&N|&{Uao?)k>W{LcA&T~E63|g@zpb-Fa{IdyA=|sH#;ea~zUdVYO5bPE@~aBD zLnAv6YX`XP6lY$_TQv_Nn%t{|Ht(#O!RDO`1K7Na@Q=;cX{%oZ*{)zZ>@~=C5h9JS z=8j&Z0gzxqL35`AYwpUw4)t!)163iobG&FnTnf0`OSef>Q!EvRhdp7h+?eU<5g%Mu zxjnixO$b zqnGUtb%^mV%XSA<)c;tvV}<_oKY?b#-d13_4YsQXCAs}^OxFF_$GRW;SYfg6w`>P{ zr~|Sc+u!xy*(=hc=WOokhvATQ;SS3jpGe0y#F{5R5%sRybpoULN47)lCfd(-At2k? zQBT#w=Q2Mtly569AgIU5x*i>aNn*F30u^%@1g1sbVqle0wbM z*7AtL5(LdufS{S#>cpckXeQ>t(98)Ug8}Ze(BB>BJHZD#&dXoJv)%vfI0w+o-4B=m zntA>=Xr?#>%?#*TGcIzy`#(C)`;qNq$AJ=|)}1;9C=qml5&@<-w{el7%si3L5|y_V zdm=kY#pPq!01oxN3rnl`iRtxgNMDqzQc_Oiw0??Kd1dRj__l=KSB;#5^7tHT{fKH_ zxrh8JQwHlMdVSkzS1^~!)*3SL3?i#kf8;!Sw^oU%1=SdkRb=w5UO;3OY&cnEGdOuiXgAQfGVB6%|h3)_gN(>pVcKSi{jO+9kZ-(JEoxGQXl#3I_6&lDrLo4uR(T zRHiI@>fTgldJ>lIS+CAzD!)iDm5H?F;|r!Tg~3#&MX^CVjRlwRMP}}~-lrO_xqfH~ z!j?!_Dw_)M+HOv(Ado39$F@92KsxKr#CHF*AdzsxBM6y!lMfFEj?9dMkeR2xBQwXo zBQtTE1t`nTAtSu<>u*KCK;!UqNLuK-`8zVRcpsU$ty#h8Q1lZrvwcMJJ2Epx5s~+L z;PZQX$jsn0`-$xdo2Q48=>_M`pTv(YJ`b7=w_RptcimglaoD zG82<9+HIVSGtyxT*bpYu<&WW1ZpadjoOFrs!&9V{Fr2xenz@{gekUw`Q|70=yVI@M znQ>tlZS5$HNGB|>UF3~+Y(z|ET~EOM=+(|*^0EBOGpV{u`g8Zyd~-h(5cO4gsUCkF zHdNvi1<_SVUa}p_xW5SKD!Clw{cyU96tl#wMj$w!0dy6Pw#Z<(;2cdF&{aIsow>*( zBr?vkZyNS;B)tehmJ_@_Qy6F@|0!x>PjDV0Cl&$(=eKX*&_aUq3b^3>9&LRqTyX9+ z7%w{FRX`ER)TGLNr8ZAE2QD~QD7_66oZtE`IJf1Ds)Y;A>Fj~voWZ_s3kc2?{!?&H z`n%xV+^SQE7YNQ};DU2rNO0~?OzBbeb&Fcv)`|WX!TIZ71?NmaaLxw_&P^b}d3pm} za4wv!!VC${FX_Pq=jk~6#a&){9z`WP2~Th8GdBXU$EvzUi4|V=LS#N7DX_un9X*EsYT_k-`08Dz)2v(GC;s+YOE=t>2fh_$ zIC%`Zd@m_YB3m4+5)q;r^@OYF&|rz16#h zYd^zPFKdSTiz=+3osFVJq7V+2)I^6!_UgL;GJhp>A?fv-|%LE{y z01e7S$i%`*!@|r)&qT<~L{Gy?$MXLNF4W2lKteSEDOAgf=AMDIzKs@*ff?=IwdR&) z_bfF{sErM@EHy3d_b{Tg5LT4dL{r<+jOGsf7XK9{%66!ejH4Fu*ba4)apWQ%+o8@f z{$&yGpda*qEaI_2E%={AJlNX`6!BoMxUdVbbO>Do{S9H)?5982_wV=NOxQ#H6A{mc zfL)em?MBZnS+1|8Xsfk*t9K0W)jKHSeTE`lQ0veVEaK6EvC7|9 z@6`2NE26DBXa@+aXzFcjrqk`(Sv8|6B^3&)#_#Z#8fE*wkdbp%P0m~D`GTUg>JUKFxpy1_XsSX0%~=4@{E)f+?uusjX8_RLR>Q(J$e@J)nmPcW zsR98s=Y_*}y6x#F2DEp+12hk|-UXEx?cVPfBeL$N*(&_X=I$bv4FHE%E7UJls6CLCZ0G)IIbA-+IsalC;!koL!!NUXo<@NF zF3Y)Cf}4cReg+#Q*~*Y1)-b223JhoR#?)OWahU(4(Ryu4otGU*&Yf3t@tsb_lXMMa z7?H{1@ggIFnmxxJ9G=anvHLH-!yR2`Sck6f(=_(JEAendb3eG_0ot!kfgRlG4hc>ON z%sa`e%sc(7%sZ#QWZscYpWj8Ep{5Qf4q61Q+lxoHlX{Qa^o$TyXg|1LrZ3&G$$M#W zv0G##<}0YkwfLf@8b1RPjLw{RRdea$Jf+&wdA?4aTx zk;DWmMjM6U?9o6iT{9(y8IE>atuK<64FAO{6CK741`&p31(8+6wcxx6s1(W6MT3%w zhG(f+n1?VVx@AKA^vgRhR6Pn4T5Cd;xL_9rkHb7W*#Y&A`{LjO)i?FdwiQtClGPli zA?n@uot59zyIa`WfO?0DepvX5eOU_e<0nSO(Hy4m$lx=arD4mBeAjMxWWrV|wkewe zc3P<7iWZjPtAukrI7Q-`4)C2J3_p>vj=`Ll{q)FXDz^*{TIIb>?wqLiR6MU^&w6)e zoit@bo=DEOt@kQehTI#A+=NU;K`I=iTt_AzxwR2YmP?*nT!lguf`-YB5oT&iI84gm z_9;da^Ps`k!sDSECd(02EIdxURP&PdM^WxQ7Vnmu+%5a%#qq5JvY%{=oUO|N0nr;9V@aQjT4^m%%!0Qi>cJ%lojRY0EBn1 zCQ9bYnn`>ng9s2_NEl*Qv9U5&bS;GNKFa{Q5SN_&hem+#0Bfe*tx@9AzBO8%ZSq%w zQ0&e)SA@rLWz9tUX3ZpC(g<=g6&+m}KR3zk=s*_<2yDj`<%GT1+E@KLy64NUc_&+G zEkuQ{h<)+kFV@V!gbu)(8F^*R?7ixrxk~uWnyFJ^c??)Hc`YKYteM(tgufA9*;Y~5 z*3mdmx*CHLdsr@(1m+Qaes{ZL9Wwtzce&L;7TbpWZ@pEL?AGvNs$0|ZixxKVn2T6} z-YVle&&hz)yQ~l(^)3YHtzzvD^j1;V-ej8^SskoymCD@!(h)QhU>AViDu;fLc(i-h zz5||ZG5~lVN`T%fU<`!n=QKy7SAeH$6(rw$)muf=#OMm}cv<{*J;2`qFW-6Y%~fxe zVC-C{>a`SG9uBq@CAAn|Wgt;J} zGrC^tQ*~1Coc;9#T!qiv9$De@M-LDMpTpQ8SDc;196?`2->G8h9{m{cu2t~=$ z_5NQB@i?yKO8oCq@i?wk$@tX}kKe z@=XuN?z2rucBfV5=Bpi+yP%cV?OU@=oM8@y)g0y9k0`Pn+Zau_ynuNg@$yMUJ-us{ zzZSfpRMOqhfKbcf98=-CIxDi7l`Z+>Cmm#mx>wupwnyMA8tcmQ3SNtEhA#FKI%y=P z)|ErH-vt2M?}kUj#=H5mbt0yHPV3^e3Lf~N#5*h{KHyt?U+A?WB_VpenkJUrLDMg0 z!MadhHED9#w%|h`KnQPQ<<+na?E#bO=1h-4U#A4~dO7RF8$z_$T1&q>1Nbai(l*C> zb=z}Y5vPw_9|>l7-z~q#_Z2hj2;E>BlPIS3>8a#URMd)>2<*_A31x9Bv2mFG9piZi zfr7aTop3uGHGM1w(=B?jgJaPx*wptS$pwpfbyyxG+r=_$b%u2cfopT z;dI)En<|vFMyeM(^*#Nrd5}Y;6Ow*MUwnvg2j}*-1E8{eS-B61+~+GM2=DM>(&1c~tRr#^Kf^9gGP6W``kdf>L`K*d8BK~?X^42E z9c=7*>5RWZ616}BbeS^An8Cvc&7>RlpBxqCzgaXj0{>*uWc?o&O>~Gw(=Oq=Mf1Y` z@pp@+O*#O1=_iF|=68$c=HD!u1IQM#f4696!Hi)Xh>UfC z+pi$+X&Fo(PHD!iv70+i^4pD$7IL)5pS5fv-nm7eTSvlE2)-jz2`daXkOe8VK0h>A zd>&U-s=ep&_J*u-sO7LsX49t!r{ZULAo~XdCl_=!O zC3z-4(gvS9X1Y9gb3^Ahb@-^tn{bpDgslne)Kmb-OX-S*qk}*mWztfZZ+-6g*?{He z+VOrX28ui(NBl9F!;R9|VT*1bjeTP`268v65b~&xP~-9- ztE&V&q>m&>`U6Osc@p$@i=PIzT9}~cUM1jd={+$;33)2UhoJ~0;8Bn_7vGDXk=6r! zOTbejB;RpYBeZx0B;b+jj(FT)g{K3b!F+b|Pwcyel+Xzz;B5y033x}}67UE%CP_p3 zfCN05ZwYvVKmwllLOVhdksFY0&ck>2&k1<-6@N*9O3=p!LPIguphLbcD3dr zf?gn5=HnT6b3OI%R@5eC8nPO~c^RG!TGv@rlJa{OsLT>RK^Tbc4A-)z?aci8CXK@C z^h?)gk&~LuaHVrVcpca7BF_RyGQqcH7JgZ)C^xxEX@kSJMNP^-uY!@qm6aZVJhdta z^f8sq(SmGuAhE_<5C@1J1Ol@%{e-|r9W!k!`fq|QBXFMwmZ7iK!T zCJdU|+GaMU)>c0VegrXItEd5DW25H)hR93|W@Myi12KV^i9u|P^sH>GKX2HUK%V6{ z0ozK)7|^Ayb*-$wpLuq5#@t5BSl5BU%G%OK+nQbm^3(rLtNvl!&A*0s91!*GAK)G2 zjRIk~-@KU|zj-quPa))2-^uUWCHuRA2l=S~q2K}6s*NTH!3+l#`}(Z`LV`e4RuTs?$&a?A@uH3XIPEvrUwmxD9&qBB=Oru~T( zU6a?yD~D%iYt3yXF)wpZj|XNhpAzvV?5^#59gcN#UD-4XdR*W0p<9Iio^9^+a`Gkj z+5S+7m21_7k|hv=XZ*Cz=p{gSd-g07>ntn);bq&iDYA^%+?#Nj;0An}ic^=iM_n!` z@+eyHFCwjD!>p>-;xj9r1}r+wxC~7xGD!d_cw`yf`zmv+_QSRZWsDZiVQS-7{WHO9 zUE|D(Bkdw;?3HWKA+`gdG+)S_KvN@D=kJ7nOThzU_drtcaFu-wqIF385%tkcV*+dP zF6{dO5s#I=YRWZMh)-mMJdul?_ZDxp^(P=9fpkD23f(y2*tu)wWNnSFp219?(@$m1zd+-B zWLmhi-~3EKneWxI&8{x<38%||UztpKY)4pE@Px})yHQ93%|)e{5G^~$mjxCPMXwbW zzcOooySvumpOHDd7Q(69cV9==g-GAZzwcw#W@!hPH*Z>O9!>7^?(SC(ah&}Jq87fT zQ6UU-OUP*DZ%StCsYe0A%hf@uAOozL_o@Z3UXYs{WoK<x1LMr z>mpher`x!~3EIt9lE!M6AMJcF_qYWj@0VV@>*-#=8J~^9<;)-c1n8iNEmnyMV`Ns+ zG;Pm!j7ZgVUxo?++QFMY1Ucj0SqaOB)Xquf1^>Q9Iayj=Z}UfuR6rliRF>8+!9GTY zL7x+!`gW$)a6MnNU4G?A)xKpbttDPfTwpmh0xNXa-Tg6bj7h4uI%qo%PrR%ZXKmhw zB1DHh2tUKC6E1sEQnjLaq_}c)DG~$+k@5Ivl}MNCgulyp&>{Y;)^lIcW?NQQ<oV6Cl0kdDg8veK{=30=xUQxj% z;+~Cr6>m-{1}k7UrOkPB!?Z+CwSQ2`f^zWwD%|`aL!8c=3@ycv9ESt35Br+ollko_ zXr89Yg}FNmdf6gD@7!nVo0(~6O50brw(q& zkjJiJlqV-y+8a4rW)SnrJqdz~Pg49&HyunLC^$aX%6nTh|MrYf8u~zNzEBQx7c0WS$sxg;gU;ejAd>U_y%FD(Ws)O*se6M-DOV&QHb*ln;_2 z*sWcp{6Q}7iPP5CGiI4HMjrCZ+qBhp7NE=TqyU81hE#%T2kS+P2=hwgvyMt=h^F!p zPef1td2^2S6UndECk#Lr%~OWtJ&}nX%%zdK8?112rC(siz9HVz0W66wuNn|jwun~# zF%WWoQ)K<7_k`)|3ze9JUKS2zlGGDeVdGh=KH9*Ufi~DUjZt^bwZ+uo#}AM=Tvkp* z+k^E?nffG{Gd4dDxV=uycnGz&a};Q7fu=4oj+?GdN0F5@m?r#Di5LB)KcvHoT)z#K z^Fso`d5h|>1uT9U;n324y>#d$vKZ56&!3iZcS0ZBA(8j7B~%kR&J1eLvu>45 zzL6<7(~QGV#2WUzqvqL!(+B1?mgwqM!7}s)$u+7@quAG=tA?8xSdV=I93CmF&9hA) zx!V^nwKF~&xns)FFQs&BtrAeq&~=`&0~TS@KhNjxeyBqJa61gm=MJxQMovmF`1OOf`-XmSqS7nKpDcwRKvQd1TM0zVnUMth2jNsmlANOH z?pu3_bl!a!)yF+MGR@?MSVil?8T2GvVXf%^?a_^oc_U7#*^>6}>e4EljitL%G zltx?L#SW})%}E+QJ6p%zC_JxgE4KqIk!_{!!^u9Rbu@3o*G1vE^bp z?+!-nmnsqGu*-L95-z!QKWD|@7U6JEse3*PCV^vLvP~TG=Pt=4G{4m;c~r6Ta2Ih@ z_|tajSdE#%+sD0h;y%T}U>;@AyRrq}0(m3yn7arE@jAWX1$WiGQ&)FWAv?0wX*FLCBAUIO(IZ69gGXnNQmjI@-)$JEvZH1enV$OE-t^ zeWDT-3}285=rPy(An>K>ZCX6FXrxrQLerOJYSGDDm6CBh#j0vO7@;iR>Gbu(hp`vX z!Q;Y?KO$!k##O&o$q2;61bE*e&pH#}hi7BFDx!dZIUfWRR(`_x zwam}RO=Vw~hK$SsP+s4w++Tnj!JOGr|>r8FH+mIgc23%e4 z-%bA2DZZfcJN(Z|8_#V3qQL0m+hK)ZH|(AK4IFbmi)I-9~o8cf3ej&A|*$7dr7Z*4lCk=(kbJ7 zURwQSV(caF<>9m4-7a_^2BPgJPl*zPiYv!*UEeErY|$f=uv0#o^9XuAPsEn++sk3a|edDpo$rlvjuWy2()FH_Z<@y80~FSPYFI{6JF%EiN6xZA02<6pojChEoB%l zBnW%Sno+YzjYd<#vuIcIc^Bb30S-&Gz=f2DFrRn~RVR-1jx9K>9gVl??(QnIul6UI zj(LQum0{h-Xj3gcI!cG9en(}a_PX3|$6-YvmO6w6$!ReJf86s(AmnwCpaae)>kp4F z@J9SD(a4skStcS>5Yjf3rl$y=p;4NGU`wPB9AH=n)i2B8pP#nE$#>0Q-W`sUu}`vI z#dPkZXi&<@5T-MlG0&yCk-}3KXYgOV}zlMs3}6 zVe3ud-D9{!eK0ZDa2WL^W0YaZV7YPiqYf*iFe+m^)Ai`w@d&e>7VOUw6|rF7_GZ1aHUvF2;nG#txy0>$jAxeJv1m_-9O$8l7T`)Z(t7E(s z$&1~#BYJAZos^3<9q^&r$m%0y!Le^83!I#-}o&om|{8syMUWK4ftr1o3 zM%H-BJVAh}*`au-Vx5^wkukVdL`w1K4YA2v)!R=LwBL0;z18%lxN6F|qEjvIA${th zAfAb7wZMW0)c!iZ-#U~-T$?pnl!97Qa;by}`X{bC{o3866FU7-XlkE~D^hkIvluFs zvKsI+-|R)X>rX6Cg!sJRVV}U-N)wMIJj3F`J+Z{7dc{3iPZV5&io(Dffla)vdQ$BA ziyfhXe#sdvJVuzphFvKZf#X#7Q=Dte0}+lZ%>zHwBOJ5SFKAYZ5>z3tOi&UbxANFN zA#iuvcrG(zT$o>WGl>2;<2G-N|C`$?=+9E&ay(x;lYRZP(T)qvje`BvVvY#=E3n<% zTU^+Pp9^lkYihUuRVyFoBocugoN_8v~s-==NZkqS4qxs21QN4T`@L++^BxD zTj^=Oe%=l++ae?=R@SOmEJNsX1NU@w)M{O|0?=NA_fE~jYS;{hQq03BU<-zl?&-Ek z*;ak(Eg?;=LtNT5l%TDpafqo;n5R!lZ? zUA#sE0Pw3oFSRH+Ykw1*sp{H1-PMTe| zbq9G13(1f`b5Be^WdGP`P~&^L(aG&>mTtu?F{WZapdt72B<+1;qAKDg{4xISB%k#Oss|SU~jbV74oOW?`jgXS~v5!C){wDFS!&eOGLMsLui$fv@v5FoWp9z>tA&ftj9}6_9F)!AxL!5F6;Hlo7t~ zCDt~3!JutsscAxI@8Aefl%~m*I!&i(ZLO(oY{g)0sjCa@B(}2Fwfs%2wqjtU)3nqw zw7%MLOs8#b_#>$rxP;gEDwqISnuQT`RY>}ME&vKF^uWLWH|K(D6;PO180i^-kpcJr z?`+8gW};_jV)-fe|IeNbegv2Q*m1?q0XQ;%afAPK>DfVmae?jUfcACY1K=N3QT{cQ z2K~cr#ou1NSKthJEkO=`V`|8(1Ud5?Q-gkEY7m5}|7t!5X#6ja?(YN*`p4~o7g$l= zuRNui%B>TqL7Yh)*OSLsC3K_>QXLWsZQ{vu-&*c}`Aj7_6W2(m!xqgL;r?3;W#^9z zF>^c2r0|5U)4t}rDvaBb&$wNyPgVp68HDGq5x4@(!Of)QnqA_1Bcj%ftBy zC$KxK6lY8?n(M>bwk>Yy_QS2OFOG^$&k5gKh=;N5gx=z{ZYt~Tj%$uMbpFEG-swvf zQ}|qM$d<+25h^XOyeLcL_-LSdlY9#{My<(qt|Gq9v56qnKQDPlqJcyB=n2)y6CV?p zfe7SPvJwrFn6cRvGEEao2gY>c7v5z+D_wzAHu%|TCh8A!HzGPoSIZI$M;?aAzq#`m zzV0E3neEf?#oAM&kMU>}coHcmCk4+--=LTVeo}#M1(Gq_MZP6tviA;cSu(ev z$vG{DO>XZK*+vkh2$8^JN@SZx6Q=2=G2Bs$lgs+JrRm{Sg6{MZ6&h*EbRwEq^Ee3)xycpHbrojREpVM;E698AYNKv#9Sow8>5-y;6^ye(o$D!9E9Br%vVNvU{DRHD|tZPT7lo#vE)$1zqH1kzBU=ObpE4 z#gd}J4Z{dtSmQJc{5|N+@O3<|VCH@9Ve6ng921L<&&}}>gIn$TaQ3nMt*dXIE?{pgz z9CH%p->%PVX-$7;|N_yC5s>NbcK>uet(3Nmg7F|E!=#VwIqZS zagi1QpJIp18sb2@73f}j4VgP~S&Kd}+f7FFxyzPRJAPibIyT=RP262TK`>`E3JqG~ z9!#fi7NqK<*iFlPq?Nri`^*{0_k3UO@lu36-T%}P>8tE5hC7$x9xo{g&Y3$w&uBn) zmW2!}wUv#9Ae|SJFTE z9Chb>-KQh#-nqPKhluky;ub5v=oggDzPp~-lb(WHq@H?E5u`S_O%6$YSnw~B`cQgS z#FLa4l&JklPjF1u`sH^^4mJ_mfY`=mud82=3)5 z29&4<(qWp0G%J@0C9f0rllx+6qGVNSVLV0fbI@DDa;@bmK^iSybne#Hfkv9$MmE_R zgdA+f6fWlBESf~}Fzw>CuUKSG_3Ru5j=mzl*HzK}p~MclmL|c*1_IP(0GR(+HUba@ zsLd?DB11C$b=mPBO3$nyM!>%d@bn+RzzRq<>}+iRPXYtewJIenz#^Fy7}=jLJPSJ@ zvomx2k{AA3g%mIVh-|Dtq2SNO111nX3p0R^KS7xLX~hGk>(x*g0Z%(H|DXvhC|lRpUZX1;=E$ZH9508zEC&V1jx4T3ze zkY7Qz4qW{TLfC)j>AzM8e&=b{f2K$SZvRPur?(4&j7NG%Si0F-$^(3FbthHadT--o zpjMfIV=ymy>5_RT3)iT$pLgTk&HIIm>bsyovp3C;{T??B{lYuz*N(JqT8Dzw&f5)_q4^^-3(E>2CGIe-pM zPc1Ib)+(F^lNN#9)V8pE`Bjnu+iD}nD@UrTQw#&-uD!Z8^+xzC>byyh)ed7OZG>VK zBlJ2mq}-k`%Fb*LdoH%r43d|d-X49No=Uc&rykbAHOeQUY5q9>iwcho=i!7`aDk_{ zw&W-8m=1~u!!eTV^Gj~h_x!MReXTN3i)>qOu-yvmMpoI-P9&4`NWwA%2 zBi#1KC^PgSv#_NuY}lPfY)m40aM0$o5sTIFLV?PEYgZMDK>y35p64~-IV%{COjX)& zG;^e29!z-NcO)^52TM?#9k~(hdaNf_Au_^JZ$_=)2E<}Or)WlB6Nw*G>K7l(RpgNn+Do=Cqq>XYMIvPg3`yE2>smTqK z(ZmOPtYp-}BJazNTMr!UgrD{!S8|d|MopF2OB;*qxnkYW z=A_k*42>T?z4e+t?;&<8O{TX04atVP@E^j&RD%ilQC!J_>(XT)SsLZKD ztzY;bmVw)?`*OyC6xtd_Zn3W2N-5a&cQu&+k^h1O+q^N@ZF6#&Ae(XMi$dBXn7n zVDYCnJ(CGg+{OgzK1R0B`_RU|7^d0;ggIaGd+@bTY_BtPxL^*V=*S_7PT;-1Ae-ED z9~XJ7j$Y9v><}AD^&)OnnY?8tMN=x!?7omMF{H)&fK74s3S4jOS$!pqjNkus&zIwAXjhtfzf=4(B+sH;2G z{uDdzi}gKxJA1$G;Ht97X15W1bJk5J8i{0#VbF~j?9^$n2G=YeXC;^DoZQ)h)@`47 z<{ZSkEuN&R?8Rf2I%wGA3kOO|x-O264?e{7Egaw|>*mPl(%u&=jgQA5)#12Hovy$i zbQBclL@nnR2_K4r3bG5Eq8t)&2{CNz-(bx4C3(j*e|yjP;0?jMsvEFS9d}x6TICjX zIr2A6J3ceVCVhm9daGog9q(yIJ-MejpBV>_k8DNaRc*tRk>sbJY)wV4-@PGwtJh-; zKiTEjTkMIt>u25>)S)Ro|C?Z`Pr65y-Ll7YmM zsL1?SBoM_~!!Ld>-l5}h>#AW=B<8tkPHBHuu$ zo7}Pb&RH`i2Yoy7HzPL#n=nn~ngVY0E2)G$grV6QjDTr1!q}~N{SRWvlN`Z9lL1xJ zLIeAI7bUXWkv8+Ci1#9mQ1(s%0i_(t8V)FzZ~N{ifain|fs zXyQeCBN?_gDtJG7QgZD88ZKI2WL8R~Xyxf}^X<=Brf~frTXVNDYjEj~{W*l>E z5$LY_oOAl`5Mr3A10Kac6nJ*%Ml`J(D>M*eomIajeP*-rr6*KmgkrZbrmFo_!o zp`Kg5d}#?MF!OPKczP2b)sD$l(5P7OJ-iTyOjr2(FY@;_X;G&s@Vu=Ym_OK+-Lr@_ zD;Dj9`yqZaT}!F>9l!rT&Yy|j*I#A+bsh2_0yY~UQnCDPmB|JMPy<+H{sheWxrg;U`9525SaO= z@Wu6qd#&OMGY4R22Zr`%oML7N{OpVXV*Pq|I`g%vD@-7EdRB-v0)rA{_=E?DcJn__(Ljw=Lp!C!vpkdz6E!(bQBv#;kB)fd%4Ln9MI^LwG$VcGfHSbXXX3Tv3DZ>MQh zJ*mPpUbLW7N49(TfdbvAQ(m3ftym6bPO-&DLAWn&yldyJOqvS zAP4;BO&6mY%SvGPT~LjbCx!(RIg(rjDyCz^m>J0J~^mr(QbVBblYq_4IaYX03Dyk)jG!L@5?we-ur5 zSM_vyA;xSMJt4jjp@}oegCWB$P=%?8G-+{SUUT9^$kj5sCHD&q?~KLhle$C-9rUir z){vdC(}E^#&IjJj^J&nU4>&Svkj@@J4{D|9KBMuI9H@Ab?gsUti1*-vU-fAD8TKYm z+z{1+M4I@clDxOVj6$}nW)DiO=>+lD%LOH4#LnZ@)=EVDEA4rn`#%wGs#&HgRyxla z!)s8v*FAYO)SNg-WM?2F9h&%hFzMcbUzv76BOGW2&nsQrkxCKauJ0Q~om1!-E7kL~ z?qf$U>EfX5yu#KJ3LoKQ*Lb_`IZGe%Qn;YR)4SoTDb2_B76-%wbz12*A7jKFS64lY z^*nN{BKup$Fh`OOT-~?TIq{7J^qbe6eRgy)RMPPqVj^-8ngo%Kys1gX5=D^7A@iw;`gg*6`-1lQq%xs4X!xfDt`K*prpwB1liy42v-m@!L z`zck&H0%xIoI>bn*~xV3&Ir*J_qg)#APLB$lAVF6AnxW76Wj)16Up z;K6k&%)c?+Uq(jm5#f&C})tj8%U@he~NIkk-WXC zQ#*TJjon}?==MMFTb#90P5)P|HsL z{y4oE(6HN=W2h0Z;U1Mh;*^ktMjv)4CW_nT%MhGR#8iur%G-5f(fib>*4^!_fpmsFBw-hwYQEA$a5A<2f6}?u!nwUIj=2}%kAi_)F;Y>RWpLFHq?b0klQ&*hx zJqUX34?mUEExn(Km37eWhh=2>YJv_~Lc-z(&}N)#MI$@1ifrlLivse{p4^O%ia0QH z|IJ_>TleEkG3MK*rpnk~oADFW)g*5-5l3d|4*A`76s^N}@(4=9dhm|skO@ZP>RE}= z8|OQW{(M7a*fzNdaf((*?Ca4Zr&HD>-8iF!gDgGx@&01kIu5$R(eC#YqTH004xDe2x!piIj>*3y-9!_M0dR};oT#PiO3%B2z^=D>cDqudE? z{8q5?L&^*F*9)tBB%fp+ARb3$s;xYbsL3GOu7aP<;lA-KB9;Px^Ty7%J_&45q_`LJr6V{ro__|xeXeJE|iBG%XQF*$pz zf;5h><}AorRagb``uQy}#=9t-Nb23TZaE5X4qWt%mifftX`*4*gKXF4_v`eu( zovmAj=U&OpEOX?*w2y7Df{u@+-9eIfU*X;u)V<)O*-^`V=r)zeVcYr+)ml$2fz5kY zLJ%)w2o+=2f%JaI%}{CjhO7I=rwq7nT&1Axr*E|+rg6$#sLvP1ht;elll45WCZ8=y zTv0lZH?fhc)89`LYh9k_5})96*(JF5`WWd|x0*8>_Dpw+-Gv%M-bs%Tl2NXlD1Vaw zLkC?%m7qc**fLITch-1A`r4FPhYnA>o70FY(ACK7daQov_Vl$e2-}1T_Smr)({*k{ zT1>Bcz2B9g-ke*GZ5SD6%77{hs+Q>{2K#8KI%sd2)_Dw5knKeln?xW)l^Mb zR~zUa2hYn34|Gz~)qDYOAG@h4X*MBp)h4X(g~^cE6$1|Zi2*78Cj)k{Xhwpwt{8A^ z?6J0@_=!W#ELt8KXt?Oh!Rf{qhV8Fk_g3nMG79vIzkD&YvAqyblu)d&)90It&l;o^ zL#=yS4lhe(I2Sn4t6%@JB24am&6kwwi=~Yf)&BbuNjA^98q8L=RQhX5H(jRc54$gz zo|)!9f3BPc0&~Ba%c`n3qhE2^Hq8y33f;3_&gVI=-ZC9uX{pQ+7FrgN(+}0HnQ`9i z!cRVP#L0g8%rW;lo(wd}Nj76@b++2nA;-##DY&}lap84pqI0=Vh9B874`@H*(}yzI z6L+1Tv}H!Lh$m1Qr-mC=Mt4giXB~$}C`^!27T+0E#H5xchkmv;R`tfHOi%{5%&yzV z+|VTN==H*qCBhLymWkmOH_6aew%lk4(Ghc_@aorr1(cglscEHd-z#t2^w1HE%6%2Y z(q!1rZ8+L_3{!v3`pi<*mPLuudS~fmCnsELRt&{K-FcMNHHI&1Z?O(ns=a`ru-&k4 znmPT&)@~QVfrv4;%H9X#wQ$1b3rEKA$pKX__2r#KSo53O;Ku%gym!=nH#Bnto%#C0 z>kihF>oQ94JfRg@GA>MLNl-rqsei%ueW32!_oh0py`KWDmono^t}H3N29i<=X7Ema zmCpmLdS+E91K*UWiT92;VP6)I?sgiYg#~ejd1w^dZm_UZE~_oHgT;~4jFL3R3Vj~b zKesYPs4qR$P+cWM$Qp+?<~B|iBU@W>7*fm6P!f!}aT+!A+?$uzIS^YEnQ4kvPo>S7 zSsa<5PG;D|+$Mm!y0T`TBW#*sr%qB|n{L&_K8^w9y`Ny0HI)5+h>d{Ks=H+v#Gp`i2Rm+@t-JYE;J$Q;~Kb-PlS9i{HIRnmDXjFX~CI zjzYK#^U|TtM&quqS9HAKJ}DzBpp^i^BO;Q&hDs4I42+^--*&b*?|!B~lq9iq{qYyd z_D`lpjD4*)$d|(K)3~~;v~zDBZmZ@S_Ako5;&<{1t4-{spe4R>c}WHu#}!*3vw#~H zi#~(Cg1~s>lBIC1j9Kjy$> zZn*b?vfIy^pDap!mWR3@(LF|W*z)^?xzV_{^mw7S22+lb0}ekav#hw4Yn3F#H7V3X#&grLhFY!l3s! zP?|Z#fo=3sB51L9)XWdK%{xnRD0kvZaZH8mC3(Ex(cRQ2eXnYXs>x_TR<5yWpiZ(h zcTk{5jh%ZRehw|L+y*ruuYH33=q~0gfn*iTp!lBn2^F)F*iMh$<}B|q1p$^q zLKT_Wo%m$0)hGM*(FnVoHp_ywRVc_w3yhxjCZ>ppAwk1g=C^Y11K*hT-8gp}v~Kyr zHy;(OPNyX4>#cfxRB~42UEAQeBW60P&bJts?0T9(>cb2v=RGYdx7p#NvAoAB8qv!27RP&em~^M6Qy;2*6Q z{;?MHs}UghT6(~L7XgB=Wx4#-2oQX&O2;opfZ%JDI{wQD@Q1CF|M496%Msv@=D2^2 z0Kr!p<3DL{1bMMs@g8K(g&h30Clm54LeBgKhmb4ucNGxwQ9mL;rhiI+SB;|ApXN?{ z$d>g28bz09xdYZw9?YG*wIuPmc#=eK`itW@mmscY0&(M(;zdVIgAoE)Uh0vjoo}rLu5CrM^xCBgg$b@V*t$La4FCuDz5!stHvp`?+g!8!wY*C0psuE9 z+HN~6gV}C#ZmGJ)aE75xog9w|IfOIj!9?@2G0`;I6kD@Q-IsoC=m9qxl*SRy`$LLL zYx%vUmMojDkJpo)#DKJdWk2l8RPJ zUeOJ&j<9#PAFC?{&nw97q{YV>XFf5${Z7_tBo{WKb$E@RT_fN2`DI9F_;L@a+-5$F zC*A25Bf8YFYyK_7uo3w|FB~IjDN;g_;+!Nk3b9HUu#udA%K4sl!4#y4?!t~C3xpO z1pnw%p=AERKf=G_UnTMKr6w+VZI@Jry`x`8)ny*-T?@bVSW)dGoUW z8UI+m^qB$GTg0@E)H1B#O1F;Cr?7R2PqYIC%VkAzB<7I62F z)b#G135p+y+)z^Wq}%bCXMH4VN*H(NXk10`D{frzhC&<%vXqD;{v>vMAA5Xi;^NzV zOA;|@n)rkVF{8}dwQaqf7=GB)ULqV%k~;<*-4RVCg(!xX!ymZaii_i?de+U9r`(bG zz$?8YreoBj#2bl)=hd={Tc+CU;+wJVoD3`U=q0}5C`T#=~&Jtk`#7> zQ*O=CGoyXqEQ%SI(GdxRZKyXB1*aipM3zdu6YgE*ZxUIN9=Nk#G_EHQi`HZ{^5a7} zhsm3UZGl$;ieLuo%_`HyLq*|kZKBHUz2c3@b-QtX8T!FMpV&Y21GxdI;Z}inBEHCx zb0l2_1{XAu$AiYV2FXmJxSZ*2MtWMRHgC5mwY6}k1=>_j`c5|3t)KV+D|!7i_ES83 zU6h=roOw<@<#`}v>%g>dox6RlsOrJs;;jl*f_DM)iHh9aSUq(LAS>}Uj&Ti1ir_J+ zP%}1ly;Lapjt!4Z!;`P*&%FY<&y>Pp!TgMmyE1U$J_I<@J4eIRu4V={WsFh1 z`h>hP@DU|+@6@b-@Ja`K+>^m^$Hb<4{oIJtQxEYT;u@YlB4tV+j$jc zz7hr=vm#T*u2gKhY~s0VnVY?F5K)!6U=(u``tD%kP3y^%+cnI|FYYgHD3SW?F5$p( zy>sE#&}0gkC7XSfLg{Wr@qyhPne2l(ev{IgxU&h|PV(V}k1wo;0BO;oSxmD zM&Txnc*!XAy9Qj?bL?LNSD7&onuRE6MmT)?w+1SZ)u4CC32)4wM-hwkMZs}yYM8_@ zq2pG#r1eb_1;S||DLuI}_uO@apl~n@3hOcQP?LR2Y>S@8>I2#XvOfC;*i%DOx(ULy zkt!0i{PvjJis5&QUkC(m`eYFLS4#Y`HfuCcjNcXwIU9?G8?Umux?6wE>A{11;*sS z^8#(*-D|LP4l`BbzKCE56h)lcE1-DLtzdjrJcyOpsfG3tkUTuWw3pmF@qQ_@woeZI zNY3HuCQ}VuO1chNm`~4;eMUj6hwsj`z+hC)F7U@z;T0sTS1B$yh>7?st|3;I7Ev+y zNg$vh!6ZFt)9-I(?tW*F!QESh#?a7{sF--?l~sBRyZeenZ57(KFU{_&(54#wofs+L z??dL?l}5ZAk~YoJHQj2XcpXjjd1$&ZDmmYC;9w=`)I288!?5)7hQ`*#$&dN(T2jF; z$A8z-0{*-B?}u)&f4nOG)%cI)T6Kct zyxf=#z4W&Cu01fLi=pQqsx}>Q<{xksmdc~$mQdV~lr$;D#CpybRU9&#)kPy0D*^w0 zu*B-_kdbF1lhJlG=3M`%$|hXf{u0(kg8W$jq=Rtwlx|ufIp3E4EAPIGjJEr?^5vdH z!m^uqOo(>8W>SW}Z~S^7)uF%e-8O;iDLmW2XLMTuhysXlr2uY-Q8_^PFM%(sSlG<* z_3QKTr4inVGVFIEK|Rq({{4qLqv&Q?s*Z@q>y1j5kIe{dm3=Z=1iSJTaKh8g@}%5h zV72QeuL!X8e+qyA0sdJ4tXOZv977*pSaM@gL516n&S}@$@Xs(i%jD~?3j3gz;-Bh#T6#O&^#cJAfn<^Z z06=rY=%RFZOltQl09>r?(y}A84c1sYZXP)Qz+}Cwqw_w%i1g`R{wM4U`js6A;;gRY2ioMXTeY(r^ z(izDvVl{X^{x!D7L-+PkpR?3*>gSV_zSE3kP}{r=ddh~Gs+n$6a|zAW9X=-!-1pd+ zKCfmgovD)11UrUNVC)b-?HG1QrbAH%qWqBXhJXY}x{Abn^58Fa(zIg;iE zcs`XV_yVoN2QA$ry#v)YqT>(1e5B#?*5EsOmb^x5&XCc|d#GPspuB(!bm;uM3)J9$ zb%DmiT%ap&VJ=XiZ!S_Tc=`MH9gZZ^=5Dp^Uz@2HDD%gpQbp(k*(02t9qezwc%vG2PnrrdkSr ziO7V?R_$nCCagy$*d!1=h7v(B6>|x3HUYE44n^+~V_Y?TYt)2?96JpLQuK?7Qi^i9 ze8G$lUkcBjLuP8Qb)!_VbaD_jT*W{R%v047io&r5eki-L&7EJ)X$ z`c&KX%A3AD{1UqI*^}prOY2t?=uTikA$gUjJ=6rc!pfT<&Zw2c7}S9v@S6#gz{^GQ zn+dcu(pCfV!LrHB{@k_6tkQLMMy{~3IU#%YeLRxY@CUDm>678^z6N3kVGew`X4RUSN-ow1fc&d0Qz6kH~r5O(Eo^Ldm8q3 zIKu$_PZp~G?ZNav%rq4XT|ocq`knr_^IiX&f$D!MWncBb#&7yx?@r0#+4@@PgeH=L zJ(_Sadan85E3~ckf_BP=)}0iV-55wjmy&IidJ0Rg86 za~q?Rcv^m+9t$>{W-}L*G@d6s+)?~P8({a$Y61X&G5`Pq4$$*=%d6M_!vQ)Db%4?s z*nblMzdJyS{?h^4=cExC-XD@b$k2CGbvl(?FL6B1san}`sM*GojV7^YW+dYVOtsr| z>79OtcNXuaedJ6LR;#VW_hvx;zTT${%&I}g(@2-;ZO#`~?uJ%Hbea|lmmWNLZ7Ijv zY7a7_Z&T4w%jZwR_kCosN?J0GD`qw}3ub9AsD3hq6GIe*`TBWwO+mxK9o5Ftn?`c} zuLpoE%yXstHxP9T$~bWxUnA9H$D^9npoveQ6v-as8?nrR{k_7|Qt1+nh(g`Okqs2# zo?ExQhzX6a?~Jfp@;FU6SWyNi&u&O58wog^u&$7RoFyn5uH&E~VMA$dN+fQDXtSLyuC0|}ZG>gxx5 zgzC=-bD~|yj0zO!gq0>fXyr-iHW5}y$soITA{9*ZY0oy!N46h%|AO z?i#h*HRNW)?bkMrH~SmfjjZA+Z;p$11RD`(`L?aR#rLr~$UGX7B~*SwFyT2N5hpV? zbWqsvR=zrv7cQRrc^9sq=?NuA45jHajsC|mr{?jL0^T`gT1y+`xvowgoh~pDF#Ved z_>dOHfTZ6UkUop=8v`z0s%D3oKm~Ow;$SAw--&>^KSaQ&uOi^$R}pafhX@$HsGhKG zEvmK}R1UNP27GG;q)3RHMLPanD1kOB&U zbYj^;B0p&b1R(HJ2Ff#I)1inr&T`c%KRN+(fQ~M6252XsKPSV31q#=)Fzo1|qZ=0V zMi1lqKr$JjpA@@ln*!W517&L|`1(A3w1Pr7 z4uOs4Th_dH4G%k*z}ymjzKCy2q_-t0HbYdb2jPtL4g{X34(5^|ScE+5lI>{Iv;;)g_gs zRyUCkwS<+-bUKY@dRz(UK~0?!r1gQ|Pw1_7KWos$Jr=)C>w>ap0$MsZ^;HXVE zuAcDr@D1NmFNpy+&rAUqido%=h*#AQ1q6AoBVozPY^w6Z&&I~ROWF?~Y!!%Hfq339 zFKIa20c*@bEF{av`yRC{A!e2CF6;W$Kis&!x{%GjIeFV})tC*Q9BH5$uL9_BT=0HP z*TsTrm7y+u%Xc+8lnz;5py324A*7H@KuZW*1an^K_#qFhm7aJoRS47iBwgB#)pRy2 z3NN^ROEt7bpj(l64ARk(Qo4hs=>{V~PHv5v0VvP`Bq&$<>>$<;AVHj1C<&5y5YlBJ zikBZLWdbC~0+67-bLUqQRJzpN9|Djdfrm@yOdd0g1c~-OKuPeDz#fbQD@wKOch1cN z({_K5U^yM;_|LQmxAmHL6tNmBS!SMdFeaDD1)l1wq(37xn2A(cBK92K8y zR(3f8KI_Z`=xZUcXGI``T?ua_G<^&kpR zt$)ty-y%sNXrU}ngYfa$5j&*CW#;YVjE>IS(8#+pc%&6I@*C}Wn-4e6i_V-!KG=6Z zvw0ZW$z8v_F!|VHT<{@w<9pkeJThBl@wWHVE4{p;T@8+JxNW$kvk)WWW1+S%V=%EZ z<4p-OJ}%eE8Imoc=Rh91_dq~#;;20 zyo29jP*KJebi3_!PbH>}$fvHNO}iXaj4_q&Et$e!hkw0&-?jnn+(NUC--8s##^ZM6 z+jzdlR6`oqFYAsea2hBBiOA%3(23{ERDNT=OTBy&GKb5RT-Lm+WPs zL8Rq9&E``1P7rxoklLhnG5nP)Jp#i4t!&q?mPH*A4wXo-XI~TEHrJt!Gz?!JpObOy zY1PHs<_(r(zMsM2<3ML2lU{j8H;*8GFQ)|>Jqoe89C#3tn%+`#75{vRnk;eT1!`9T z3$hUH_G>H0;QofekWo6JP!#$0UTOj@|DJ&cCitb5>)W{rtaQQV+FBzLl(J(32Q4kS z3e};iSjs%tjU(A5d>?YeV42pa$b(@7IHJSwnAFMbu3F90^u;$x&@Mm)ivsXknPsLD zw=Yv1+bGUnA-xUx=qp+|k;+%OayaD)0Sa)&tWW|BwoSkPa)dcKti*-xErPq)l#5eg zbr%|eR?w{u8I}CzKI4!&zsH*Ixbyv<_Fu0Hi(ke>u9~2!Z}qu1%`e&D^_cRtwGEb5 zF`syX$`e2#qhGh(yX7gqvQLLZACi$gBIc@JeQ4VA;sNmzdw>Rm@nab#p7%MpZgmr= z`S0uaO;@IL^Ppic1lRhs6XaQxL9BfhJ@35%0t}_mYel{-W`0xh+Gg8&)q(O3h^sLL z(TF7#-&bOO?c5)mb>uyU(fNIs>l+^X3c7zN zo~l|w>Y&ms_pU}CV8GC0w`jVw<2+N~S2CbfnC5#BXMomI<_3A|uaKPY_pn2I3Trts zghLu3>V{&#;hFTyICE>x*qd-HW}zhc*FQ9v6vG|u(vS04zh@Q8hR8T;ztTt`pn^rg zSmEb8kvGsy%WRx8;kqik%)$b?0CS7x^O8H6R+5OUK}ym<7oe|g9@fYwLtoam>oQkU z+@1_&Wsa4++DxW>QZhKe&PMbC82Vvo&Iz$3oK$$eHf#1wggY|{4C$F>JMNXay~aGt zKwG4ro6^9O*0xR0=$!h2=aiS*{4SYc+!*gNC4tEU>U8bVurKeS{MU(qH$T>=Y<(A@ zo>m{dfB}wUqz~Y~Dej`>B_{B=be}7f|EgF|935{C5L1;Qlpmb0v!*FK@}f{Hkz#e_ z;?y*85h{qmGbi@pz4EKJe4#p=(TnRuBN_BQ3dn+q7W2<GN=IR4gi8aiP zxN;30XcmmXF^g;q{Uj&)g5XuVB^q+6FK{6bI>nDuB75Ch7Ow9o-3L6NLSOMu{44&I zZF=MFbhoG#?+!^L;UKfJQE+oUx5Cym?uCmozXPwLe#N3Xl~kZtSqMv>GFIF@O{cG} z@yv~VAYJZ&K`hBM#8pKlfBNi^g$c(}H;0@dZcnnDc-P4`sCplv+i!YRYI9VVartfo zrvtv`tau7KPt}TZlX_+YxdVH5A3%Q2f*@HW=13>I(ChGLv9a%>ha;rg1ok)R*KQb> zG@$IV5iOA9X~iynz+V6YS0z1t+1sa;aI&f$^;Z|{@E1s~ri5_k2)NHCU2$E}!%lyp z*+w0mu!v&4SGE|t94N~;IgcasfO~kVIK)+?kW{cV$T(Ja>k%TygXE@bAq7|V<_h|x zZ42s1l#;U+ttk~YCO?M7ymr~2fs5LmZ!ZI1F<)71Y&fxJZ`oY&w(ImDtWhcmi|;CCUZ z;8#-s`7Wdd{JRuDz6*IGe>L#qyHJ7Smjge(3spG&W#Gqmp%TY02Yx?e{=X0WVCvmp zPyl(qt9!6>E|l(ICmh&=@5WEqrxbPs#)N+czdwrhKOCU{Ck60a^+Uyr_`d6!OjW#5VCqo8_H=<{PVtYKyx z6N=L5p{Ua5P3Px*55K6_8xYl;c{gh7`l%)_M{t93+CwrVi#5-VHvu)1d8 zC)3`W!A0z)GEU4)C(1*EVAWEB;NIe98}(2*6PqWDG66^2|~+o6cbitJJee|PF6NoZpGDYSyw5p&G+pu z#Bfl{s~$FAymRe>d*Q$uw$xNR733Z7TL9C?CbS3G@})sAN0 z*STbf6ubzG(D>^9%mdt?4(2wO?3{R9rZuoblmp)8h(Q#Bag`&SU%5=gG$UEO$gm+# zWmwNqW#eHbQ;&N`WIJfLkjy)`Ng&W8UQ*XiI+S(|H}cGDmM5Z=>A@=oQU4V_&D{Ig zb4#7WA@W6?vjQvQbV9C&;##$Bz>f-thHOCdY1m!SCXP`@dk3= zT7CD{%-Ed^wOt>*d>JVyVK>6#|6~9B^cU@)$G<6m|9c4NSNrF;5YX@T&l$;|*gv5m zpgJ^bX>l`&jb8E5JMI5}|EF5Pv{Jt%{cF73n~RK;A`PMxc#o0{xV8mDy=X#5^5V3M zdr0i-1+Q^*8kIdwSIG2vWV{le?DDwzfxJ|07Q>wTY`+Y$Zv30DxrD`mD=iI4dMDVs ze(u9;I46OISr0V1afvBE=-vTidJf;d8md`)8!>NJsVtS+d?k8bQOKHOL-T5;rVExO zGzN6Ql^uuyr5*z-Qp9u>aMd(%vJZ%omdLkSt>rxBF)uMyTuSAS%M(4-v-$1-RkjS} zT!e%Qc{c2;yF(qI{l9mBqJ#tJ#}o+fL1BdeA-Yn<4V z!q2x)KD^S?ogdaW5$S*8MRuD&=*81C>2ck-$w%B8%L4>nC=?NoUYc;5&c}s5Rt&?N z$07lIvmR?0WeJv9!PiX-(>C|?ohhz5z>V(9JXAQHKj9?`DlZiJK?; z1WjxBs|ryE&siB6=hpm$zP%L6zEm^2aq4Fel}WPdMY${= zVX1~Cn+n1Efj?F}5xVz=H4;=BGyO!tk#GXaEFM zLm5$^0TA(|7TN$PjE>8TkfR=9F$6RKhIv360QcBi(*Xl0-!}tjm)N zHUI(!&~)O@rI~M4pS{h%R)7bK43;*B2ubRp7p)J8AFR~5wU+XX1?;+idiqoR0|x0` zKp^<#@b5wjz`qRt{&;uwe;kSN%i-UJ${fEO{_$U^&han9KmH39I(|9)``J0}Z^J)6 zm}d7E@DFxjfuS8t(}UvQci$)9cQS;1N}+!P+o3-jKw(ey6Wx!C`>z^6zcm2b8IS+R z7>J)ofc|j|M6=qrF%W(qA3yyJ4S@Lq1i+3nh@}HdsVZ|0niL5-b7KSJ#7g z`-AgawOr~0szCkbvvQ@HHv-u z6?u;8ESn6Csq0R~4{PD-PU#Gs>>EkKpT5Lm-A+W@EJJM_!6mbczRWLQSVrf$QF0f* zC_b3u!vSzt`W}BZ%ltepA}`4-kl@6myA)Qwon&VNN?09`j1q*~?=DJErSae3Cv& z7GS9T6NmtXWx)K10L}b!1SpUJQvm@YK);yRA-(!x|D^a~|1^c#KgIeR+Ty<1KWhN{ zr(f5~TLOQpgAo0k1lD|Oma_e_NSe6fhpTEXPqU0s?ckR!{G;g4PWFWK$%S6JYEPA$ zw4~)n#OPnMse3Ab%&eE8=R|RHm*`}+sJ5EWmA7fI5(gFmivA-4)TU<5Sz`0uoMYf? zLUx9rDbW(P`j;b25#rbD9UY2heFutwFy{z9eU}VRC%YX_0mH}h-Jp;zP z7n%XH4P?N~gsmK3y4`?chQN>Dra!31U`~`kwe{rHO?w>vQ-4onLWtMh7R0jaG@^`4 z1gn!Fm+FYLO^-0EkJChR5XfhCeOSxiQZ^!~Zfm;a8KG26guD(j#|vjq=GMD(wQ6Td zWNd{=G=OG^9Ug9fB+zEWbOBi=C)@~+ia>BhS>206DUaeI(H4smG4St>OE16B3HkUk z4DV(-PW+u!Osx6EuIb5496NL}i*C}}_c(w-5RbN&;?RIW5Yv}{K@dn8++o?&2>yea&(?Dtd1q+v`kK7X6#PVa?+_R z`$zLk-goT5_lp`nR{&EWo~Li_UJ-~<3FuzwYNdisfv{*L1*Sl7PJEjJVFR54G1I(U zave4WLRifMm;y1LnNhkEqvEzIXgg~52~@HJodQvw4e@veOo1rWQA&T|NlzU;x`AMm9mikfF4c6`-Gyr%8@ZjxwZF3k`Oj<*-GWU zNpg~2%(DuB_(qB5+Qd9}sb>2-Jpe6G*LQO0!`r*Ng84aJ%x*}mQ<{lHQn{B=b%Jk| zF1c7PrLMGJN6T8(^(2}f01{wyzQ*;ewl@O(ieh0NZL$k9+$W#tY1jG@Gfxy?2{0^r z_JiGp!D&~QfeyedSOQE@wwFtKeHb(WMuY9V`=BrE&$~JnL+Gd zYy9NDP@&`31HhkAz+c|ne;WW^sMPVx0pQP8`?mogKTNy(3jheau)yFBrtLu~@4Md< z_FaVi>N^|q!`Sdo`XB76egc4?|0@9gJ^^Ozf13k{lY-ItZ3YB10p|F28@)EYahZwR zxtG)a_YT0LO#lELG@_zdfCL!5IUoT>{|^Z;B9jk^o(D80D*JnUmUjEpx43Hay#dhR zdjjZ8z()GHRf}#`M{CVZ6H8Bw4i%R#W4elGvoo4}-$y_+Ku18-{%8Pne||cJ&G8cf zun8&vhC&5ElAjBJc&l}NMt2f^E&vYx&jO$lQ~IG8dT%l>Jm{BD}aLDsBRv~ICGyw(<<&LS}9#jR~iX}3&-d!(~GJ;dv zuX|`GNf%5~BNAZJR$zlOWm!+4J0-Drw0!#^*!o2$3%t!^8r)g1MqKA2pM}jO>z}EB zDo_=W5vl@ad{qIs3Z@_Scj1# zcJ~)$sF~Q_PjJo2kKB;vNCcDVX67Zb?^JkV6&$1c?vA|CL>C~_U-dvSkjgQ82G``( z^Nfo1P;`CuvX(0(_rv>2h^Q?ZQG%!)kbX~Qx}JC=XX73W0FQOktjZpVOR8u0^N-+L z?bf``1^`gqGrS2q*{i$aR(vzgr3rN-^rnKR3Mz@|-zEWueV+uV@~26FSn&tn+yD4Z zYC$;P+y82w{MPTcd~8%GX&HN2my6oF@c7F z4s~^dnnGfp?B(pgX_G1ETOSzZ(k>6hQkX4=yMLLT=;f=`8~PUEE&Lrovijke&}4gfi&nu@TJlH6}*sr4iyI`XL_n`#H2#f+0 zLM7*>hK>TH1_-cAS!wYr0sd(e;C`uA%^yYq<_`Ui0P7z@2~Z9?3XmH*3J~wG2}pst zs{o|HB#FBO2r}G(d?P@QR%I0|O+g_j0lE;Td*$SnjV6dL!O_A9u(8r$^;uH``!@o- zELq2r3_L9q6#G zc(FMKVByM5!O)lv)x~Ni&=py6?V@&^*ob?qmG=Z)ktSq$l*A}ODgz%pDjPlzLRhTJ z^%Xx+Fz)FFFs`08c8twIu#4QZp2wVBC$hnrm#~bv?u~##ve6_G_Cw0T6fpLH& zl)At;K=DD{aK7Y)0W(kNI6#b{8w{{?f7AWt*&bhD$-yNW^?;`BTcS?lq(4VzH z{y#3{n-vtq3HiTTL1)}X4EZqT@~7-W2rX|tE`o0u7vj-*S_FQjXK=PF*IZ0uO*g8T z!5>{!_4vVQN_Y3d-lzn=;KxSXg~ca^v&k(dCst0MlEDE1pAY61my$1YwD`Vdt#FW} zmT;=q|L9qNMUSI9wO)O#-HYKV)|ZC!$0wgQ306O*_lewX1iYX#IapcTOcZaZeRW-u z$>$m>cBhXXmG7+XJG+n|tw{2PV;JatDSsAF%x+<~YhHG~l3wMxQs{S*vQn|JOVm+8 zjzNOFE>L=H+W%l2+aY#m+P_%c&ps!3Ca|5ljW3eA)6A&1aEQciQ)&%;#A>*&z(Ptc zN1-k~5;_fn)Ucm%pX^;-y8oTpwbn7kOv7j}LKR(v)U+rZRss_9RX}!*K8P-kZ#vpnV+a z*PgaP-OkH-Ehx+sNcj4b!y>=Yt7jo$gPsvWqcL;rs0G8#KGxZjuU=hp!D@eeqtIFh zJ?RpSL=EqWUxZHGhYqwuvMXeVHNgTRymv=i{{tk;-SG_%vf z-9S>i*wD?5-dxSYl`^%!w5$EP$4Q^EUthK1yjBp2cTX-E%Uf}(dVC%u)df97694FHlww(0PE~9hWt2;Mn#Em+I1KW&}yGw;qGBzcvDbR|Glft?a541*we$ z*MsB52BX%g1S&PXYb=fB?m1yUEQlm#Q^tt)EtW_se*(|+nlM7XcmPxT5~=`Mkmv-d z*;H)2krtN1gZekG(HZgAZ~9(|KEI?4K{XTNr*PNr*8|l?v7+eoQ>d$jBxx6-lg z=5oMqN+4RAHsycxz5)z|M;~aBJesAt#uL~f?T=pYZmGIddi+Hi8AgcXll4wTo<3p$ zy+Kd7w>N-Bz~X@+X9Z!u7d@avus`rRxF6$?uYxav zBj9EAUKDN_j}n*eTL@coEG1S&J$Z;hXDB^ZVg~Z+ftNmiku}c0O&z`TlHQQ^(T*J5 z+JjgjO7l@R$<^AKl1%S>PpAYBz*BvCOn$^v-|Zv#ri zaDZq*kmlM^>NUMpx|`_+B3lh;?dZ)w6sScQikOA^n%A+h9zm9)$dPx>GZ9J_3G%AP zuKl5>3NEd<5M0 z#!@%;SG)xSW0uC2;(DC2V~HoFp5kR=q5^N4ou#TKqrT8(I~hO=Txecl7Bt~uDe#1- zc_y~H5KulW-HTBPv#{kaI(YA%{08(E(^5`5JSL)3c7x`l5%71W z1$`4vyk8p9cUq@367MOIv8LdnsuP@1upi^Qo1~+k9_A#uH5ptYb(^_$1ebIr^V+7> z3X5*a6Nb?EWEIWhn3|_A-r-^8cv*;L8nv)Ke44GuZ8X!zR9uQH7l7~FFSBxQE}2}X zOKWjsrXX}N2$5jrv~*ouz_QD8xcRg2czD0E6}4g@G1=Ysy`Ee|5AL`W@C&o?W}vo^ zXWKZNio49KDy5Bk%9nS4uA-q4Zd2K+5V{M;1W6u8_$ZiyRHeknlqhBV=I-6(aCp7; zr^}SFOqLaq7RPx}_S`WBnzLgVoC?lc^Gr1hWLN~s{JzEfX4cWT#FL52SnUA;{A%8cI=;n9OpS$rC~-%V5Jj&jG}AGJ04#x0~1 zY%U(|(w}4Tg`^ZHDDr{$fs_?)K7Mu}{G1C+#mB?V&I94()q~zUi90x(0<(;DpzzHJ zJ0e8|8*(g0B`65|0q`f^yqPAhRu1-GkEl>_s42^SeGELHx@PI>>gXcC!C~rP;==CY zU~6P=#BSnX$6;#bZf5J?Xk~A~;ppsO;cR4Q2Rvr8112Whau}JIIJnunx-bF%5HLO& z_|MGV6k2dc18&uRrXu`h0f~>BlN|)C5KP6x39O$B#Kld;2jXVu1cUyuRXe+Id|f!3 zi>VC$f8Y&?Am+#x`bN9KeuhHxpO(Td<$lEnV$wf4clX-f;e3-LYUEb_fI* zYxZN$!90BId|=*xZ1sP`o`X0qQ~&~V^RR<~74rOU&%q!*c5W{Ie{9u%=bnQ&FH{lY z21D3EyqrMZ$&XFv27}l+LI2!G{%_gz3)OzOx%t`offaK9ZqvEBx!A${JiOfh)cNi2 z-SrDqgMe5YcHo=_tpCTZbAfr;LHzu@pnq!pf6KOCs44_pEZI4sOZ?rob8&;&`N6;! z;GbId-?{BS4F&$&DkBi6+2pT`$%K3tz+snLSRDjbRH5SfdNKx%d_66}9(*gBfH*Q#R-2{A+_#bmbhN!MQ-&tPEddH7d8S+;n&DWm5cRf|p+hXYz`A z_^m(Z_>gN}99ItSo?#j(nSX}{QVGn>v~VzmTbPT+NFI^7{Xk7i&|iDz^SiCNhhIL{ zdw#45UhG>M-8jNRV~RQ-*eE(rBA4>IQs6RzKO5ECv)A{jXna=#d})lz&jWe#?c73y zcO!f6;$5Dgx=*!AQwlCbn<9754KzgNDnGBkquo!!uOXOQ^JgSc$k`KLcOKilk%8?| z8tM+(7AVONoNaTRI4m!3C)&r=MoJia_H;j_Z6rExa1Sv%?c7YHF8v%%Br^{6?DK-O z3uxvUvE)W%2S)-#z)30ZmT1C}0~~9Xbf^6QS+0AfN>kB6cvVS0?f$T(9dlfYDRUnMR9Vlx(E$%9kC#&8LlFpoy^ZXGPq?*%Z7SwAcKX;_r_!Tl-4uDpxci?x_1@IbixEy|KNm+6|y;)Z)Gw#qB}Bhletl&Zy?lpU)Q^NG-O`+l7= zqunnGE)?~q{zG5^!`cj)+4-jTsIiH$tf&VQU+R-!s32`>v@%8lC<7*A#u zRr(Hzm&HI}NJlfE%YQbh#L9!vEB=zn-mSMD%QVFLG#*D0k9D=TyG>mH9( z>KNz8||X@XXm%Bt>?I^tXv zHO@i;iK8@(#Dv4jAS>K9a-R_zp!Ez9aK$T&e9c8rAQk)Qd=^^{uFUjO3ZDz3qp`?< zA8q@ni$^fT?@q>2;w@Zre9HKubj&N53b|-5{1gJgE8)lNbFn?~LYz}pG~rgv`I`|) zUMh^G?uoMuJ~E4@$)fNBO|$e#5bHQM#yFGXcM(^Kh}T#13gh!hmK~+ja0aw53(Fcg zvI>oU@Q~iw^a?zDmEEo0id2W3lKyCtX;}1r&H-0mRK%GXvaa%Y{Nd{-_CyxwrC~vZ zz`(-dhNUa+FEJF>kn(F_}rpvNmZ8hqPQ!`@*(o6zS=X#SGB2I^dRmx z=&4%+rn|#E`sHH8OgE0MUwMO`e|nmtPsY)amATgtIG0HqCGcF&r1qsCVFbHNQ^bm= zTVP0ijI`m3CwF%`WY+bA67CCbrzU~KUMUt`=7;x|%v?`<`StazZhJdF5G3sGyVFa~ zF=z}PF-qhUFqhnI`ieaKJ8zM)Z!-_}pCHR4l>Zf`| z@+Yl0riC8&#difv+8y5Y6?u?IayR=-G50{oHY5~;v-}mkCr?3F90f#aMjKOS2M*a2 zBtgx6FZnT=H`Vw#&Odh)gbX*X-Z(gLY8>#Afe)jV?d_N|BmR;WDn>{}L$r9yS)RWe zr=M;&M^?YGqpLuk!Hc^mT~^;Wz=^KXLrV4VId#^(WiwYV8#)d+n|Uo33%7;Ro0^hC ztZ6InF7+A3e7Tfbz1a9Oga&b5$b8Am2L|qYhYvjg|}f2f>*zyMA01HbttzUy2UDkAXn0W}1kKkPa`CvfuPvR4L9r=L@ zF^80utt(Ke=8%HcRwc|#fEqHiW(*Wm&5Z2OJTta+XY8kW@mr2niY@UbEeFUytIRwz zLQuzOB#UjdB9cSeEkT+%Gj|Zt&b>yt@me{K-(4m5&YBF}&|G&%hmyVL<2g%l>gK=pW#MRP z@%|*{rKTwZ(kr}=Up)amzOv)e;P7T+Xyd59lcQcAi*eb}QU3Y>0sW&lTa`2~ZyWhH zm*{>FcsnMRf{NW)qCNeQiFnce`tf;A$6iMLw*6WXDt!@xJ-1pvXImvL*G$Lu=d-0f zCx|aOIoaVGD!#YTcKaf@jcE7DWsz?^qHY^*tUi0w+_+3R;WiyX>BW+2nJ!-?ZrmJ& zO&nB+)x3+VNfG9-y-@i#1eQ?DU2Op)XByg{^O{o1|z0U_{@d`&(wu8VAM3gU{~(qhOb!}pb5 zNuRnAwW^1lxu}eQU#&+vx#_xo$ct)>`Xo<3`&PY?PJEvhX7hpVmB7S4`2?z<2WGqx zHv^rB;+&(il-F@N4;S^BZl@2W8>%V`la}3irf&k*jOT1IPcC>fgc!daWHKPAy6mTf z9X0!?(P&FIe_1OZ?^IYZGy*FvPh74w8NIGMpH~&t*>kjok_FEXB;e*cq|-gXhM}HR z(Kx673U0fq;a>JhX0LFIx7o;q-cgSW)|jmF*33k5QaQ(5A)i6lW!&@lJGLG-5{7mI zJa3qW&u%-^MA)sm`Mw9aiEo-EF+aOERfnc-=?F|! z@ZpotWnxU_+|_j?JiJhfMa6OMWxZ%U!YIP5M|u0ZTx9K4;`pS`I&Zom_!D=yas%07 zsRVbC3|gWh!!<9PHxcC_*zX1C7%Qk*-SifH7PqWG>T_3oO;Rg#YCz)C0*{MZrd(rJ zTx*qgQ2SH4%}gyM=SReR59+E;6VFaHox5gam(3Vk5&B<-Mj)P)qm!@GMDU z5f~2ywTexXSbdYqE{!ms7Pc`dQR^{fts6yLTVKD$pDkx06Q9BPX#WX$^-7jjXi~py z_q+9VJ#p0qk5Sf%Td6gBjd+(T##@k<4KSa}G3lPnKw@Rg{VP6JR4NOG<$LCMEYKZR z;6DlIzBb}Sz4hI`)GSyEmVQS#mso)p%=dMtql7f{^KuoqEY> zP49BJQ-Je>`!{#hKW!J~c^pgAU>)ABJh&H$R_ZAx9W>EiIwnXE!CHMEeZhycT?2J6 z(Vd4JeL)9hPW)u0G$4^G>&~89i~Z4w?B+@>PD?2J9PvV_{J>)ZrF}nraaC&Hudn|~ z3-J2eiX=rVaoE%L3h>!OccEWe5sh|@koWnx-c0H!20V*Kp_PQa&s`6jy21{cO@z>A zd}hUE&tIPaA>6K&6EU(J&#Rilw%KeQZqUWGAK`*1Beua=K90T4=f$=TU(8+?(fg*~ zYu=t#ubkM|Shu^u(OCh0M1o@Q4!y^jzl`!$3qIR!&l`XMsDq!Rz)0#dhMF?~Fx%kcZvbaNV zc&ZC=4a4_$_89O*?=Fq#NSm-fE@=268HlA3fm66^8ZZX z``bto@ZS6-H4+57%EI9ATc@@RYR!osR}Xw+n|*WB64(bCF$C7aJ@hutCr+pCxk!gI5B?3EI<5-!ct zA3d9K9wjaH>#(>k3F7HSh*XH!`}<5f4L+a!JgfVq=5(DDyq6)n{t{_nGP+>->9Y5= z-6g&0kamHIN-fvP5POd!Mm;gr+NI z>5Sd^;?c1~T?*mR#rPn++}*rxmtaEO+3)N=+)C;EdhvkTQG>n`2A(a4^|GGU9r?9pUluf4 zT?>Np_nvc5VkL3BPgu($4bCw%B@M-`Kw9m`pGNIBNveIjhH?L9hi*&6RXRk`mpRPx zq^@7E1aNN#apmHB`#-ny<(e)`L^oz94C(d2#4>c|O&!`H{s?&zwf77z?vBE4m5NEo z?&|!E8PCU?LCSj%Waq-4Qz90qQU*!6zhJGVvb;mNbBn?KQ<7P|<=Hs%rST!wT`II& zFKAU5Q~=*1a@p-0hvBDnY~`7Y8HRzG*`Y{Hx+tSfIwGPuJa`ksv|GY${2~&wPX!{y zf~ewY5;bV5nZ-f#5>86tFKO@RW>%i{y-Smkp-tsRZ`h$(1>S;|XjGEi_q;kiwH|X+ z_(b<2c!s?O5gDRtQabRk`-_c3yISB_M#JIK3*cDb3R#6>t$E_9=ovGo$db4kGA8>ENJ+Pb>4|0)y+o+Y{ z;n9aO8-!+ptYhjj*)IVPRx z&~!u@ZZ{{-E+Wd7u>XlsC)JGegsE6s8Z`X%DK80wO}4!_9uOu?n*~Z(&eO6* zAdq9(5ginF!_Cc;@Ai>o3G%aJw-&gTXLs-KeA2Fqg<7}oImELO#>j9|5vh(RPK8vx za9n=(IM1Me7J+uZ(>5tT-l+CkvU*yJZxnemqpy+;I>#h=^uAbzPeI+n3H@k;Mj7OI z{o*V?EQU)( z0!r5|J-mUDVxLw5;(dvJdaJ`YBHh>F{TGaT&+fL|r#)k~*9=6(e9rtq{ZakR=672U zab7GG=sQ0wYZrb~XO~jaP2`Dcpr6`Wde2xKa?MHPL91L!2|R~sb&PQ@^WF|zl}bN< zNa0>Bp(j&BX=@`AZuV+2^B(hV@SS`r{*u-x?T;cs8WHbgT;L|NSDE&3W7LC=pX$)F z`MqYH%0q2>_GQqb%AurH=khG`o;zZcYEW{O6LF9Ra;j|9iTAo8yhECz(zU%pj^jdp zjG*xu9{DtlfsOoJyM|H9NFByKOS^OiKa+?F#&y}W zt81~)zvX@fTSJ%4V~g3yBH#xVwWToDiQDp8;8~$dbwc&^27}4a*WdN^^_T3ERtCo` zZzOv{0`Q|J-&Z-QtzGUr81qDxF75JpTOOYzU`yD*AOFHe?be+4f!abjnuD4rD%K-3 z4x=Sbw8{^`sCJ!VmuGp3^H7>(dno!CuA9B@#xHT<40VbNK);%o39p?~((hxL%GYFU z_KaZ3W{~;dJ@bKjYH~(Hcd}O|c@=F|Q15k*cS(^=iZLnp@Cp5OJ^E&eHIf_`=({>!dcUI4Usc>iGgJB z{;xk97`p<#cQX?=XDe5)|H;k{0$r$>00IyaaI-`C3h-U#})QBFxvbRTf(06KiCq)1>*Z_Dy1BhEdhh;OE+7OxRjN2 z)$|vZK}eE5%=0?+5dxh@iI>y10Jt0r8N&d3Z%xhW@kLR^)8EdR1e$^Is&nT7hbszl z<>iBx!_ICci~0bqgX2|^FKoj8kfqM#`wLWZ_KWk; zsNXG(D;sFQn8l0T4T8BcbV%3kh+!yvujJ^_*Y3O_L-GxJUGt?ar!2 z*o;jgJz^YgWZ4oe9<_6u*Gj>d$R2l4&>TB#B2MT9Z&6sbNNJCk&$;o-a#|tiOdoe( z(9SrHY2UzoADn@Lhuc?R`YiDZ*;Vhld&T_)lB=DZ!rG=(GYNH1{2WR;6z0~;o3Z&{ zs8Dy@KyEZcWNWZy6X%TKGu(@;5DjP#Pgc}?rWs3 z4`?x&mI-uSw?0ik(A+5MY@9_mE8McMwW;2Lj7aHTIcI*zf#amaRjzoY!ffP>(afX4 z>^gXUnOH6Hz5q*ng@&f6tN0E^Mwn0Jl@M_O^UTbMyG`2%9W(-Nqs`Zen7jzBBwFMs z7BsF8+|HptJqn&l8KYMV#!#Bp@H2~7Quc2asGwQ>59ZVl1>71{^J=2;Ne5>Dqjv6wPG~GOo#7u4s$wBN2QC@>&7%Sg( z)LVWOAKqkBHL5&A19HP?Q9O)>ygD0 z=2+E-06kL$0&DHdGG|%K1oxWhasBY$U9s1|Be=uYpKQjyjV2A>u|Xc@gus%eg@gu3 zz%g}>rzB@ytU^mGbnk1xhIQhWnE#KvvkZ!B-L`fhXmElAcXx*%2_(3?yF+kyf(CbY zf_u>5?(V_e-3j_NoV$1SIVV5z6+2aT-zt8r>i*HJe%I>tK68vYX6$k3s^;->vUM0g zdWEH$tnUn4aws3YKA2YhhqB&_@g)#UJ|K@7HV1Ji4c3rbkTQNLXOAFv>*8$9wfRq@B;>Us9$Z_t3)J; zT~i?eHDdsY&%V^I)tFn;K=0BLCYMHkVVkSPYj&Oiu7FSN0leY=^@5glf1(va?IV~d zI3vs?3$P8=R?^fnTYrZ&Z$~l^n#@DLrKIPOLnrr9OHuOxaV(isZ6L*a8AcYjOfKNF zzC9$bILLvfFcA?ag{T9qhrD6;`%p76kORL(PJ}vP{D4FVHJ*-9_&V|-k%@|wnB>64 zppc9HBY)GTaj}xOo$GO8cGM&4X6_E@3Hs9oA%cUGtihy5gg)<(FqxQ8B z5}nEeeOWkDU>H3mgj-w7j)6%561+{S(;w-&qA`vvPs|20@j2ZSD4fiPAwVg@868Ay zq~+tPrO{wHtv*jc%sVJ~9GKOzp_Ye6%n6)(F8c27oIymA8JdWE>cVrYUvZ1+MhWDvtfPhs)|!8iTR z`;GIYJ^ZoywH0;a5foW_xdYWNKGGU}sDj1Mnl~}{Iu#gDNyH%5kO=cNvL&p4CyP4% zQ>Qt%3GInEyQ2q3pOUys^%820bLsFy z5jeJ1&Dsh=+Rvp)z3rvK>5Dopx+IKpCP1wPsxle58oW>quF2=2U)U9?wLIfMlZ^{1 zE=YEBF9zNw1C09WK1Hc=7E87Q7E|+CJx8pJ>M4@O^d>v*k`>9Fp%En&A{IW8GT@Ok z%8GJ9iI-qoub)dM4isMYp}x_J#u}Mv8p!h;^-=;)KsGrcYMMNilfod^F3MyD?kOqm zk?(jl-E?a_c+va{F&*7*U%`BL;CQbkYwg*lnW+=-er8^~k~h)^_P)zmyqkz?(Ogk$ zV=0D$-lELI54P>-142u_a$TLBbW$%4y69l_-T68}ktdU$F+)-jx_I8y^GO&y^F=+h zZ(KIt-z&al6ndv%1z(&@k+66#+uC%)7h%25uOd z{-;F*h9`*`%m9^=jpf1Z{O9(PnVAm2n5@6W_xsfCB|XEFtdGo$tkg_^Qv)=O{)raM zjC9ltw7;c2`ZtpW!;{KKj4TY)^o)Q_@Q;-TKo>PFE#vQ~Bs_iLe+Cx6Tq|Rs1IV%r z05A7n&X$1|VDx7LaOVF;gl2eBnTVc^jvC;%__ynvo|W+drhkhv{kt#pCsmK==$NUQ z0XI0H^7i9Wr=w+~2FSI{^uMFK;i(rpVBLNvL_bQY5AZ6bYh`9*sjX{;3y|{vAnV6_ z$_iJRj{fn<^1#K9Ke~?xk2cOjQ;(=3ioGWnrrs z06Xu<4~c5EM}T!;Xs9P|iC7tkCmj{;rit-$wlj!Y1DZnxfETI1A{z2muF_>okE9=7 z+8$|EUzQ^v!`;`TJ|<~RHe6jA+T2z#-8~}IY^2=sjmRGEP=BLx{*$G;*M7z~lU?wDiCyFn4(2aDUvLdjRy~rA{ zUuqVAnc_#UBgO*0yeQy(3Z$=d1 zaqtYFkm;URlXDP3)TA;Sdj;8Af4L!Q4wy*r@rUqy$9a5q`+g^!%%N(^Wp&UgB4jTn zJ`s@-2qCd`_}sL`;;<0|?3;V1>dT8zzaAH{((?QBPVjwTSq3T&!f{j`HI#$%xTd6jENKQ*%a^?TL+5v3Ky!%Sr2AHNDaT`R?)jdXyOJnk zt+S}g@gMuj14ta)ePInqvn-yBq9^Nl)@tr9UC@oeNzoQHOCh^MrF42d-U)WSfd*~O z%$HW8ik2MCpkBns#WU3 zgBA5RsEnu1hiv-64wO8X`gtfv`)S*FtMT}0#^#+q3WUESNps$y6@lrRTQrS)o+Vis z1&mU@jV+-)mhA5aK6Fqz)p{lzSlIXC#ZD195a;(LTGYOb?E{&T@D_TiokMvDIo(go zOsqPD0TH@bMP^H_@_U)r`9dLrcXl-5%E1d6D_RJ+h)nay>b5}(t!65GGF34}F(1vf zCb^y~=y$yn8(L6bvq*Qi^gf3z<|QHwNoP z#h762`6Y2Z^dL|h`IbY%BTmB}P^)cJ&^%?k@acN=yGSFU>kQT#4FUlPIH$IWYj~2z zSy4o)s|e|=;v|tOgGXL6)Lpu^z9d=#m)NF$0;SgYa&s-t485>hR4Y30o) zffHl;_B#7^84>}d7T5y38U5|}xS%up(axqrV5Hv!4HOVYIsKru*%*iPlgkTn=V!THAevK`eMuN%Jr2HxRAXxQz{`qe8FzqLKcAZv& zyp=EBw@NAMeKu?kv}otPL)<((ZwzjuX`EckNN?V*DZG=w07vmfxoy72q2rIAYJQ7G z9OzZNd@`m4nHn(RI8Dfh)>>{`t46qYYp+Dn9|9D>fY(bGid}y9fDXf)@w}>gecY8P zBC14;V6xyr+?B=?xjW9jHLfMr$g@drInx|7k1cIy+86cx)vCB^JU zC#B#F|2)xAiAwYccl*;udZr+@M^H>idZyuEVmRF7$QV5B37Ppw@O0_)B+29mPvx?X z=*$iJhdI9j{(N(eA(U-0l9wY8lr$m&qnfhb{Js^Ph$EkJqo>(LQZ`havRfURgsSr` zS8sIaUK~m}RgKNN$nGV<(ioevIe$*f#(w`y^)z*~At0!PQb(~RIp=(!D?X0)UdnNj z=0M7^Dso;_!zg-$-8FoKeZ^yY*~^@ts$LkxmFI|_7e6KpNze?Z>E#aV4dR)oUDTd* z(@o};sfYMH1J$mSOO?z5)wtbi7MI~!5=<^#F_B1+I59e+f?BMBL6k1vQFcxPL6%b9 zftux664TNo{7#Da85XF0Zo`W3+1!fE!c^!wnYKFLS(3?);`U+0X_4c;84+&0n&KwqNJLESNGcoa7@;9!a zSR4=vTk3(ZJjjEdo3rJLd3$2&CL0A>cmh7J%4BA!#%+ZwR1g1%2ql6BD<$3R|NQUAM+PnXH&vAXS=V9eqTiteVVkKX5ySsf|(@+$zAI@TzHY7bf zz?i^Z`#rzr-sF78zV` z2`1%9w!Ev=&KHry6=1jWlaZrX-N?wv0goBiSR`&4t^^W~@s=e@WXndG`|xdFpA5n< zH<|KVlC?Vi?(#_k!3SjK9f4N5%rYWT;Y}q&Q|+L$qGSN?HCrJGD}I1xLZjz3v1Rhr zB=?NUfkn8MqbIw3wkYQ$rI(b?Bkf_1%BUAyGVD*?r~cZW&apa`o+n!(#JV0GP1R8- zn7Ow9yVZx|h8w8}We+@DPphxf6S%u1_r9hdiR@M2EJCJo00zt z%yb@duk_5^jYRR&bwW)Z!R;gOvAZv9fG(9ZMIx^a!Ag(FOvLgzma`dc_s;PparBZ& ze(1vdEDseMhz*9XB88HCk!@L`6NiA|TkCq`de+KLcwM7R&c0oF1tbrl7)GZVJJeU5 zZZqee9I?I}W!?9>HbJrX%k?x96o-!Iem_s_R*~{@9(30{RK>8GHDPyJxI}#!P8Mj+ zoCaeLtaS0T5G0gP1#r^G5BL>6h}rz_Vutw96u4@aAHp0|3wq$EuB30Mogb4KxTqkyq6WLN-+51wW}z z+Nmy8MpD*flhcJj8I)g3pUgN{f-DL}oTP=^BlLy;*!_wu12=$1B58)63cF!)#)1UK zFEvgsS|*JD)3l3G`l>CesK6S&svbDwaF!R2hCs%UScRKO?163gJI7uxx#w8})q*H? z($2P-XHfUp5sHRbx^m@xX6|leKpqj4fx47|6-y@}@dSO{2ImuI79M&M;g^cdo3T_WIe7rO}?l2x5yF=x9W8}`v zfy+K0Tp~XHeY}XA1ddqM83K!p@YHkS;CtyBO8^g?OwhmNp{~u4V7FDak=;b-NX-_3 zOL8vpqNr!DEef-#v?A$5j9E_cr)J?gD@N{yH7$tc*uZMQ`x_kwGOSMn+uMpJmT{-V zJBko7Jzs=rhhij*@4m*-n7qg;l8WcTx5+#vLYw7w4~=e7k>t$w;FhLI_2U6b`U=;f z@exnne0Et;khG`UKU;CqA)3^dT9DPVQ&=pLacAz(gru7>WPar`_IV1jDi~(si@g@t z!$XFS(n|pdRvQ&A(IbJ~Pr^&1gduF5z4}X|<@#dXohOEQ!tvh;S;_fJC@;+|xv1nQ z#lV!-CvmO$$#Dvo5xAARauWkZ2ukW`=|%bTUxdJZ805`DP!_!fh@jNf_hOw4AEPXD zoK|mg0HinO#&Wj6nG1L|hN%j(L2@ACCBC~@;*jA&JD&ndKBcDkn47+i2J!xziUp?i zr0IjK^I8OvfZW^Ql#JVfuU$2)c(ZBK2hfhr9Iy=CX7u41He-G)gWB7Ti*&e?pl7YY zut|;w(^z~Q-A-BFfWxf$+T4p^=z%sm?Izk5xC5hiLdG^{ZJ;*KADlY^nB_w)*D!b|QYAv%0re3NmTioRHO45Qc zqm4H=)62Ir?>tIp#q8Mf6+}MLd8&w^&an%vAYKTuuC{%iv-0^4A3V#M9apk%S+lV` z$T|B4ia?Lhs^d*Gf>VTD_b@y0`wX~mKHRJhJ1U=m;lk2d31d(3uyI9Khk0&v91?f2*{qLWBEO{)Zeh^Pb#JShzc2fU=x{&*} z-VF$sGCm4{zrdD{kC{hqd=v^FNb(U&9}fP&PR2j5lkpKd|AQ?b zKkC2P63~GBOKhnk8Uhd#>j6o#qLUZ|iqwsQ6`}!vsXV808fLO^XMox^)E`}*m_|DJ zpX$%|5xEJ4(^*3p09mtTUkcLq7htTwDbT)DR*v6xj_;`}-QI2uy5(OFQYg7JxGBuJ zrXp*PtJYp^nYOnm`yl2sMMQn^lHB5&by2y!%Swx!w*|jYhttQqt=Jl@y}P8HU9o0m z0NSU&&)Oc)IpMdt*xBA-_w~XPh&A6NgUvLoCBR^B1pB7sM#S+VB-XLbgXGhSeaJH{q-@Bv&1W~>^&-pG&^JsewGfE@j$W@WN;pghtT+oboq!9jaP2BR* z`c34-lG2{+x1Xxt^9{(Z8|;G_9cRlB*j+a)gurxcP+DjP)L<~Qh=37kw$Z#~aD<+K zV~e9FcjBNjZ?%0L9cJ4sd)V)1!{2L-i$tIwFgr6KR_p5kRwd|}<_SZKfyRXfvN>Hf zPfbLt9X%H9L5BGb^f_8AMmVp|S3`}fZdQ`uFiS>~#9_21E_a?mFbE%FPvGv}QJ?0i zLz{zR6zgb_x3pqt038x9@eOU4Nksqjuw%-OAqq)_7oy-`f{WZcdTdAW&^OOy0*+fl zpuh~*KX;U6Z0&+1FMdGrfG|-ECwLA`DOT2W-h;0xI5=6IhWY$9O+-mht_LnP8p zZ;81Qr2Npf{CSzHMyxj|o>}{9z!^jJPhvuTKMDa4ov!kM&{sd>W$D3DLTmBH0&?}t zN|;`I70rT0*PhGA-DYd3GPyMdslD8Vw7uX6$}{J?hn_TG`5{UFxp>B`UOWgwrHZ~w zm)EPAu1F?(|4iW*xu`KhKm!hqko=(QpDmCOcF@rw#JZAztPTlbc%;nVl@IqSgjI2J zQh7+*t<(y~h3khkuU>ycaJG35yG6wOXyhr2dlGQ&_=5OKr*!L8@&viVL3HY3iWCs*LwP=)Xb0)T#rj^ z+_GpoCF}Yuo>xt^HXMmMTOu!Q+6&lL-P(*}y?;L?GRhPLcU}20C^gw7LG6%nRlA>a z%F2BkFBK8Gln3IFL)AblomTtiOAT0ke(H|aQ42jQxm7%{*K`)P=9WF_;oyaIO(nPh zDU$^|S)$i>qYexm=FP2m==19NdzW0B9HodBgi$fdD#KkmBD`37_xin$uiMDAc3xLi z`h>ZcJAyvs2_^GB*J+XEm|i6Kz?JDbACsYJ73na=XU>PqwumP-hsZ~@jSmIyz+OLM z14#N+vCtY5DZoh4ZrFoe`0jqHR_!mhoXE)tA-{yM-Qv~hKuJ()#caiptF7dRjb0*A zfl(5VQKHfPo;P3DbQX+HftdR38ZQ8i;$kLCm4&7Vy6QgV;-6$G7BtiAhB;ikRG<}9 zIr?s`qXumr<`5%+zxBPkr_N(iOlX;m&A$(7{*pdUzH8cLQeYJHo?cfC#30OJP?;Q3 zwN^_qNpu}~!h|BpMO9}W{{$tjin~-G%mD$TGt7Z#@;%u-(de+w{I~Nk-FfbWJrv;A zl8I7hcIL7nh@|MC z%Ol-_rk$#h^U|dCc?%puu3J0@NczKof1ZS_@YBfIEd6Mbc-{%Qwx7kh=&(b;fU@;G zST{cJ2JZ(<{*Ccj+2RSeUTemrsuxv*X(zxo%!$Q_<*okI1gn#Vlm^=(aScOAK^O1Q zi&3cA*^mna>Ufu_5Y4Qb5sPixOH&v5lk_9(AO7#tTDqhM6lly1W_YU1?8oxwf<=5Uj|XP zQ5YVmS0sic^2Vo$y==IIDYpVKD%Uujbu7L;=e;w)v3Jh(Y>GSjxk28fH3%-(oQS`>BcPNtJ>h89_f*o#A(91pO_m{xfX&h;a8ehANLjysQmc2eLVQXZp-wC-S+WU>G7>UDEje|eSGDS zqW=S)A3yxR;hB~0|2H9Nm~a4}j`Jq^Dl8S$2r#DQ5HP02_6ukG+lczpg&2x3BwzHx zRlPmcnfE2(G5Bn)ODijfh6rjOukD)WGUXD-ZKUO^QsiRX&~6{vSPM-X3sSEvovLc; zmXSBc&-Bhl&-{JmP!vp{<)aGGz}N1+-j!e7nm|2UD7w!na#Ou^4niMm@+#4Je(~j2 z^;v`G_P(;Zk?jS`(Xvo^G0DWZccHV{EOg<(2<+S4{f!2bg$vQEJ!qT7o!XF$5Ailk zv5`A@uUwQJw1bAhW7{s z_f$rznxBqNJb?($(gUbtr&^KlRM^it0z(*XUT~FC(l35@2(jNxvHMu7WT36Om342+CvFfjegYBX#zBurYEcwhfJOhh zvIf{AA+;1b9)u0g*_G%Mb=JXXiw*jObuwJuye2z(8{oNv(;(dV3F!s9P_L4ajO&K*^BMC% z6tdwH6CUF*iCy=A;k-UROkt*AZFA<>kbQ$2&QcO+3W2mNyKlJ-&AxPjEC@)AVTVXC zWmukj-r1o{Ex`tUXIgwt{^|*K2E@#@6al8g*A?Ng#b;f|#JnHzm_KRs;7gbx8jryn z_itx)7uGjhc>vk^5L?&2Yb=_l#=(v8x6s}~s7x7UJ@{;)lGKLF4-bjp?}Vt1ga-r@ zArXO>7sfw7kUzI(DMqa;3duPM!k{7VLI6{R9W2Kb@Nhy;3YIRA)3}N!X26| zF|GoTnwqu?i%t9^gbYZZBIApg$Rn__DAyw$Wgx@xLg*oMxDU}3V9GS9tb8LFfw5EZ zg)#95XRN{Wv|*@w3z+0Ha=8-m)dRb`-l?%=bXoh0M%ucF>uYg&VbIS;hH(G};~e#N z1)>q}Xv1bfav75ij3Mo61qUbv7hI49xBDhRCt{@U>RHasi4xdH$ZWDJ5R^S9Tl0LY zdOgh&0JIxS*TQ^Rf^h+dpN;ViAAhzo){VZe`<;0(f{1ynIqOhPTp}(9QyfKG7_$tB zAkzijLh3;29Br^PFSIs!+YY$+aaOyg-X$4DVjtgsPx6$#naF>EiQnh2VqV6M1XK z$9zgdj7H1OrsCmMtD*`&6pru`92d3JNW|!L4F)7Afr1Ngro-NFLGj2J3Voi1dA8Oc zIw5<6Sgsa#9>AQNeuu4e8^yz*%No?0{vD;i%An!8HU0 zC8YJdTi)rXT%Shro4ZA(8}(nuj$mwaq>o&`p5Eh`X8JfL`-wVz0kkTPH4tg#RKJgR z#pP9yJk)^wXNNHRfHq~q`ExHKwZhq@_Tz}qhuoytw)}omL&lIJZ9oK3n7uTLG1&tG zL%SPy^7o{pf|F1kNx`D}*+CM9C#U4M88;EhA=ZOYAkr8e*&r4p^wjG`-i#s7e@Wq8 z!88LZzVe57OnR4(s%PBV~~Kt>|F;`)`uxo_zcWPOqbbk_(dTARKu zi}Rz|Qc4GaOZp^L8f1PgrpG+hxDW0&ep$9+fH}Rhez{ztC&zditKLu6I+6Je%sO5R zM-+|N*+H|Xgem?b&l_H6Qr%eEC_yd7<<1krj_{^^;Ny?@2z14ZseRTwX@^vUxnht^ zwlpES-wm^LHKT>;T)Dtn=9^)&@w9g8LlF6KSiK@xFh0)}jWYJtNAXrGH@dd&oIteS zKMShT{`vTspALKb<()GNpfQORFyrqpy-F;!00{yR_VOFHP*3etqW|esf?qyaW>z+U zrUnoK{?d-gN)M3KeowH?zqZJ~E$IcY@%?Y5<(Iz;COUwo3>aR@^p}+fNX&q-9KWSE z_311Bq+$pI6QKK)?mPqXGBfl|Sh4v2XP8tw)XZKN0ZXb?`r%FP+=fnp{RM4DzSsv;yxk5054E;QKF>Cr7s^XM17)BgIaev9KX$O zKUzGcRQ1aOa*R&ns#0WKRF~A^Cw7kkLs%vOLs$@sa2FqQj5@A| z&PiD&1NsAu4h$G4&?`}L`awPP{5#p`57WNxbOGcRQ)-G7PKcYWuzY!fLWUf04uxZj z8cV;L`gfrdGH~sosogd2IyB7;ldJLSwtM&!vQx$70NstTAF*FZ3x+eh-G13Z4K><9 zhe$@F@@B@$9e8PVl@!xdl#>NHR~D*{L5!9CQ7=6gSew032pH%2DnbG66zw<(x24ne zN39n$BuJD{96Ye-=iW_8Jy>`gCp|ErL;Yu1z%|4r*`eLN5_xoQ?o5E1j-qtxu-#tX z3f>*|(B(RVAJ)#|eL#sVP5&^hDU{rUJ=zt*TpWM3rne%NyccO;(pASd7)|?X4yM3d zu>X+vUJ|wj&;a@F>q%#b`~si>vbeU0UNV<8%uplR{OF|bOOMxj9K-Y^%qEm&jXe=o z*??HWMCo49Njwa8yr-!?Ue;FD&T@fDXgy5Dks4w6>X0A>ga(VqR2RNL7pyd~@;r&` zLLPD|Uoj{0y>05kcT1?rLApwM3etkw0+7?y&N&s@u)M~I<{mV?Kz~!e<~(Rg4tEnO z#YD<{3m12mg%4^*Ud(gE-_^~MD|g@A0dk4n5*pRf+$pd$^tf@8nQDRgHdvK-cMO+w z!DM))jLHp}U?C?4U)Y-};a3Il7+QUepbeJ?tKgU~}yNpXZ1 z8_%fIq1K@~c^NWSg+p%!NW2_x+372xQh4U`(may&1VLK?v$!E6jXbM@@b+<}6jios z(8kUWa!ULUc`58oG(=6ygfDf`Uh1w4b>E^>RbbX%b+!b9iNEI0&51Y!q6`wmrBuZ= zr&)_+I{St%tDzzQRM}P)TWI*n^0R@S#@Hl><2Q`7?leHSN~}AQ|MOhu3<JV81f) z2>7dKrSP>(N{T3;cT!?&!dF^S>NwQ2aV_S9OH8%WG@MNEIB12dhK0chPW>H%RYn{p zv{nnsp#Jh|g*@P* zF*uTZX}(<&9=|L(gFwS86~Wvr8DoL9(PoGFXCe6dwh3D;&Ni8|XZaT(TT zdUV8~O8MuUJPA8E`c-`8KsI6*R4tf|n=duC{xL87AgwfEId|wyRVi69;W?JL&Z;iI!a15#2o%%EF<-UET=}G&1 zyyX{!v{;Q4GMH(9P1as^l&`eMmN7G_?5_`_&wV*c(@x+%5Wiy~{R(4{hd#@C8${^n z13XagZNiyE;E~1Kcs6{8K&Bx2Mw4oLJHfp#>UiarWpl~>Qvvv=wc=mi z?Elj!?`M0UUq0FYW0d#r+o=D~Cd_{t<*_`i3-g~wc`Q$|b^M>AJeDU_GyZXu_p`hD zZ=<|N5ALr>e~(XIJVW z!woB@Yg~!{mD^;WdVx-xl77DLU_e4+`PFrA%Do(%I%@gVRf*cHb2`8zJ7;t>I_J?| z1x+MpOiZB-`FX_c>vi4b?M%FslC<75`*_TFMQ)2Uda@d5m29w^MM(4yEHtah}5rVsGuxht%@ zDf}*-&Io;^P*;c>u)DK!Go(q!0-sytn{s+Ds2QM}*w=jtZ1{{63AVB6+2Ngpho8mr zv#MuJ=L92?FbiOkCpHz6z&~GqL>~BprgpBLsTiaC{sW}l(dALRZ&lN|=%g$@ISL6P zj7$=ZYdotQ*<^#2&vgxG{rl_yxmkFV({e+qnSJ)+?!`2=OJS|hun&jp98jFKcjPhtnSISn18&o`ezeR_A%Dp;E%6GB#ITgIh46K`-b1zVIQrW_RIUp9v8cpNR|U z%?EV#?3Ay2ydJM6U#k+!9Cgc@a*II33$Lh^!1*Nc#O?~u>^@HnZ(1lp@dCNHlvx|i zJYHfbZO*vka;p#yfBDk6>xJaL(>HokQ{L-k2wVkN^KBqaFX;g{OOy?n>X`PevF>21 zuDjqmAXa4+(R8Nhe8D9LJtqQ|gX1D;R;c_hI-Uq_J>=~5Z|hMhS)Yr|u6{8H#|mU? zx%J?N$!%QSpG7v;JgH~y7R1&PLnLE-FqC>*%$w1$NOLrMA7vYJF8aZvHT1^3$5rG& z4banSh|>YDil-$5%X;lisx~WoG#6Q>e(2PvhnHEUxX7HMe}hP=oM_9eHMXs^zg z&af-}1+8-?lAPADyocOhVACN1HRBe(fP}?E$ALz5;=#H2UY2c4I}=Iy4AEgmb8Q2K z(%mEJQzSBNp`;FcZv)zqPLwwVf5!29M=B`-FnjSr3s&IrS2SN7<^nW6j{$!+b8nn< ze?hgh$fmYouw}lxtx%!ee^vujhb{qkp*&y?G`mr0b^9;QbL0YW9)g-+DchW@Xp9bk z^NeQU6#m6|bQ%ww2W0g%9uwNRWj#c9ca=yUWRtQQzJzQWPUzaqm)!vl}ovq;{7M7vM0JC5kCt^@c$;!sJ z6oJ@B@2?$D8{2qu$&gj1Km+;esMJ3`Rc%_cm{)RTj328PE9DSU*n^|;NnRYskhO|i5v z*0A)q-;KvTmV@58wzWXY47=-<*Me;#jHui*)-t5Se6lJvLs-2m757T&;7aMBjT7WS zBv_(5$!Mp8K2-U{g1XF^3om}98m@Q<6+bHD4WC*@ZoOLnjTB!rEx%3!FS$J0;LV-N zC)9O2>b3-^BR<-3D?DsYA-rV7*?ew)PGc-JN)>jGP={m<)wN`rbLM$AWC3>hwH0PX z`xqxT>L!fUaK`t73sWlYF^aUPi$tjXp!S`VP10O6>wWszov6^)67#WYIf?j6g0}Y6 zC2vMloG+pS4j4yW)mPtTuZ)hO(luEfVI>6|z)Cx3-oKP}=pCSFcwX z#6a(jjtnf(Jl2A?bUWNE4`~iziDL2I^`F^;K<^Jb-iYDN-IFOBW#B0n{FV`;Ckp9^*{41tjGWw0ARX0;7`|7=fNlT0op=T1XQrD>^UX#FtYgG$@n@TcF! zlPVwphdVVLGwokReFg@=$W*|rrvHtiKFiNw=$99s0niA|0ys0k!v7hv%s>Ya`T-Mc zeuu#Ko7GO%Csjb`0Ip|1$nw9dos0mbpY``7@jg}O{%O7EZ{uK=N2T%?)Xv8T?<3!_pmt-@jHB;k?yh+Vf%ZLw!=iOK(Zz@}c$dC}zy-8-R`52rHYy`fKggb2 z0omeZwT%VeuTN6$QN-2t>MoA~p+qjL-tg_MfYB?hB5nVQpnV+Q;%a}%czrtqy5ZdH zoqsSpk5pA;kbJzJi_|~2#9no#8mAX|8OM?$Yoop-xjnJF9UQz{JPX;)ITAig#-%N$x&x}{Ou0m7@|0e z3Fd)Hx+YGTfU%L+2caRIIiZdvgWKJ^{#{Tz7^b?k5!8_DuK0 zR}q&>-r7>%<(dvg-Afc7N3h6c8RY8F1??J)=H*gfU|1bzWWP6lm&N2*;oiLYMc-Sv zr}e}Xko($4pat`FXJb&FvyQ)}cqR=|0w8;8XrKUOPp>a6kv1t5(-Rd#RwJr)p@8Jq z&T1yJ+I;nh78fo9JCqjDi#>Sx?;g7!aw^V%LkWHPl(>OxBgn|&Kq04kBAWn2JU(s& znmTMK-rk6{XjlKu+IT=}JdJYL#>3GGI_!Z>%LYKxGGy@-KnU_YCFR7Y`36&8h zQ~v4|ESGadwTyoUvwxdgg~PP-&7nHwr)LOhN6goyM$QQhWT^^A*mNC7^_56M{!q?_ zg;UMI{e$ zkIsRrhGY9KvYw5n=U^T?J`2*l%spj9KT)Lx#sj%xCaF@zn-Dlt8Ykz)=s7Nb0dbZT z7lWphTS&;j$T30*e*6k2I9P10Of3T2Sf;M$cF3n%(*H$!+)z6I=-|-&j24?|!{{A* z4^O!7vt=Sf{1C$Jf>1nRfxS3s%i2M=Zz}UluwnLs%&_P(X|wi<7xrwRTyb-v=Tk70 zO?Wm@O9kneq&7=RL@!Oy5KRD@=RIs;9THG&XV1izQ&Ou8Ex|!p<^(WE0~_MLl$fD* z2&Yt3AQV|s^cA|cboh+MX;W&ULrDo>5UR9h4+;8GvgKt?9c8utWI64*nH_lTD}-3{ z8&i~N0!%ue`I=5l#!cL3S>K+0jh!t@{<^a3A)8 zm5h}U9=rz&SfJr~1OLdF>n)&ymw)z`nl)MNrA{-R#=S zw9iMi$hY0^sUj}LawV#o;p^jA>DZKal}|L z`r7jo?KbZ2o~{PWr~)L`Y+tPo(Z+E2@$3O<98y+;xp>)nfh8kX%s$I2{%^=b;(ll% zomqBY*Mu#To`0hEj|*3S3zPQ&yj|@TerTe`QmBneo4ApXb;^&;K(~ij8{rFmU$98sb%RluFnrM+u+S!#S##=itE3{u;u;Uqwua5)Jg^F z`nUj(PS#`q%PM#-u0i!x1?IE&id%O#y~J3?AW|hJZ+5Ig4&4;blH_{er_5oF6;A>q zo7j&7ZxK?Xk9>}I#GYYzp~Slc?bh>1unJUcR5DGXfi2|~lb)J`IE=RJ8=vHVAtr$% z*}Ia6Mr+5L1=Mt?imB+?L%s8yhcOf|Ew9QZ-|z%8e)jwbY4*O*H*(5hq!94E&N(g< zc6b+zky}7lM)~kl2yO9%6Rg4mJ!tn~SST-Rm2y3;-=NhB4MB;4IC2MEPU6|a)!vEh z8zm=abat*3P3QHet7iC_an;sk@K7z{Z(M-+I>fgCV3@vZX=}RXUf)V7ZH^)IX7erbnr_! zA0sN5pTa)tlLU`H`S*vb4GKFPlMXNvHTE&lHu8}qxj_)jYHFtRZK z5@P<{%F4*f3`mIiUutD#eNv(4Pm%M-h5j3@tWUqrpH#{D5hMKLLjRp}V}AFA{-lZy z9RmwB?So7Aug+b1K)V89xXSOS=sb1pe=6qxZ7j?BU={ckP51G+@`$H@_;gwS=;D05 z6CdCDgKk+LR_H$w_VJ_s3t{P4*cgA&x%)VR^q@F&rwxOEssDn&{9?O=@iTrUI=Q*|V%HkgFRVQhS`~Vw^wG5Bw{TS{@{Nu8WSM61!lKoX zcGGjbUq=rU{no{(?{iGu6mOk(CN;fnURAtTY}YZ&yy6lmoVm^}Nri^edA8gV>04`b zkg$HGZJ$AtPa$0o^&DA+P^2m-+#sAPe9S)0bhU=juuMZiJO;Nd7p%sBF#yvD31;@T z(x-K^ytJDSu}4RUL>OEKgR%0Y1Le|AACv7szdKH*sb0_on(1|T8RZDH4;d1(R^VHM zSl4JVM|x}~Kt2&dQ?p|tNkTxMQ~^A-fL>5Z6iia}8@NM}*EKS#a+Mc4W)cA(>f=HO z2#EHW>nScr=QG~jR#Q?#zOUq@f1y894Jpc1jsa>?y2ab~4yEV9fljDa+|B+QwMHMJ zKADImDxIYeAP~2f+>g&%9Pw5P!PEfF;00rtCiERL=C@b47aDOw{(hS98O{Wk1{p)M zX&TCl$WjwSG$8xC-w+1a`M-ogPtPvkr_KPM$1)fu3ljwcbmM1V8F~ zo2k*mL0}7HcXW6*?aLx?Ve&@y#hB{Z^CI|gJeL-UA`C0JN*i!TRcqA3uXxj&4yOIO z7iY#&_I=>D37Lyo39kNS&hKE=a+1!RaV=g1d2J`%(vGLvde(+r#Da~>i6}_q!$1Um zbSAssLvTes3sz`s`gWX$JGx)0H586>!O+|%aa$N$kcdA(M;xycl})<+7B&c-zh6mZ zp~ctu(yLS4UpdvqZQB|0K4sh+6XElU%ef|na}-y%nnnv@Z}(|L%i-&(1|Ci`YMj(Q zw(=XNT_5-|ygTpr0J)eOwcR<+q@W=D9>n+D+X8rSM03lD5>4G8&ROmP3Jhp~6L~k7 zVBi%3j~z{YQt|7>#=D_OcgzOwDhPewe5#_XZ3Z%Djj86IJ%xF3|9bN`vKq9@A#&d{ zPQFswT|l50?R1d5(%X?)BPxUkR}Yt!gtuB z7hCL2`9c)%GdvC!qd!5CM&A}{H^gN=s>OUNNtTF%`{dVitMh})PD1*4nUji(3V(SkfozFD>h+oV;CzNwLS7xh6=atYY2=S~{}#pJ3r{uCX&QN)#JyIbAN zNLs}As+EMW!_&*Ppnq^ZzRn(Z>%zBK^JW;tXQp_obY;iC4>l7$U)-p*O)GR1r|w>I z)tre14T9KD^Z3+o0(i(Fp zCUl>lKn@Di^N_^cRFrUH3*t)yi?Izh&Kn%viVnHmMZ5we+?SuIUnp7op`dWno!P!j zr99FBL4jxUv^?Wx%aIDy6_3arC5+fHP-zghAnK$ZZF#bE!>6F_)e%H@MdE?P@D7;@6 z!S#kVU@(@XKQQVUO_H7P#@y%E2N{y@tza8zSw)3%o>`}P1>aDc#tX)x^``dUrY70> zzizp?a@?xhxv90Dr%JMW8M~c%5{#XBB1X19h1;B5enj2Ph2yR03+)117**yng;ljs z(UrfBFPR0>?|{BpSH3I?63yHew+?lZiCjFXVc0HAtfX`lJmsJ5999sepB6HR4VzX+ ze=NbUSN76(K@-QHgOaj>ak+k-kAsR)(xV}fuMTlB6Cs2;$llkmZPee9zPllqk7JKQ zDeZKNWf|F>x?m?P;8mwHa_2Y5(#sU&NW4l3(r6#z{&&=H_J{JBq{H2ZtXg(BxeO0$``2i>=-D^ z%NNoX#4~RPE>ke?0y;h;7=TjVvw*=wdNjQ?A($Mz(P=RXei*q&6?_=mwB+mnhK|HojD?MYRQe;n-n>^lGZVDC|D z`~~5X^$)x5<4^7b+CBc>JRUsSbst{&g99H|=)Yj^-<<|O47@DA1baX9N*k?CfL^&Q zc)Aw%r(PLvJ@RjQrC&6aa4=g^I7wtNk}%D5aWUtSrJVXK6eT*Zc4oa{ zTE%S}yE=b+THdVYBMQxkXq8yFPB>GTwRM{9DiO<;Ub87@C%1q!jJ1Uh3d0yF+Sgla zKi}@T9z6^+N@>z0s<||!urGxy6J3qUE2Qt=V1RbuU+7hkjjalR@@6=^kXANoL;CoQ z_Lj2nbim$Ph%}VIoqdNa%A^QN80aPS`}J^*6`23W-CKr5xh{O)gh+!Rh@=A2NOuZI zH_|1gbax}EG*Z$aEe+C0N_Tfl%TUtcbIqV@?Y&>``|&y0A70nDIfmsLV&JW4j-BLB8B;DA-p z`2lC|SS@E}%`B>-;d0NT7Ao~#S`0_0Rz}C-J`9{g?;CQvFwDy~q!luB7WjBN28XLr zq{;ilVLDAOTfZ?N*whc2uqYU8$bEdgj>KtNWeDSF^L71BlD_UE9}7?s;sC1;?~0V# zs)Eq+@;n-p_B^%j(pgq6>BLDyG>*hLZ{yCsuPQCVb}H63BbnrjAY47sSVw8w>e+YC zUh-m3;#2PomXXPb?1(y4E%CT<5>O9Dy$~^j1ub1|v7%eP0d0AFAjp~CgjXjv5Nh+) z72;kEuCzx!dutz?ABEFbYi#it%zMfZ-t)5_Hs^0ut0so09~pCD43GLOLUP#W@h&FE zp`}*-5X^fLs;YU|NFlFyV!t0DGz6{0s5YcdbbUx20DXWl>vTMi)6vVh>Lbt75k`P= ziOlc9B7^Np6JO3y^V!n4*u~@>L=1je`Q+frZUuACQICMA_$(K@_HnPPWq5N>s>Wj)9- zaH+)JZ^d{5dz<6XtC%+f%WGh&e5awnlJ`s3)kP&VryFq*V&6TWD|wrGG&qz|8C}_; z?SqHHre9dC3F@7_C?y$}CiSA>h2Z)2;zTdQ!BY&~`nl_|Y* zi!|6F|BZ=vjz+ewq(zphpz#A^Ja)Y|bTn>Zl}~XDHZ=3`+ufMO(UrKNMZ&7MvMH2i z%=ac^=jfMQWBaDw<&>@3dxR`W!cHZcIp^y+(+Vu^pZJ@VCw}q|XyQX5vU3@VFpMNs zRgacaCyDAUT4PQ&P|2_RRgT4s6frvf zd5#7X$-Hq;zplk-#R;^TZql8MFD0~O;>+XqG_)?#3cdVvQZcg3Fw(>GGah-ef>jkT zkf~8$P5HHPRMlMppZuO|qQ}mqEQ#o3Zs!vp45FS5=0cQ#IBNj+(#x?GZd=JVRqgK$ z>X#_rU$%DIrPX}wr;z-hB$0DWgz)|OAcwNQ{=nX?LX#8@2hQe_9cdl1V%ZLD)~|}B zVg$Cyjgy|Ebrn6z_YR2$^P94M}SPy32z_ET?R;pnsuo2~I61x8E4^eH%##o4^% zMV)u>mJ*d|GA^fak`1I5YU(xLYW6%?C=1ffCB|ovD_!ds_i(nqM1OU)mXvM&v_p)_ za%9Gp{di8gcwoj=lrKeMCn<~{?yNFcG=1%H=av} z8+(6;hF>~j_$B3W-stfEkE6UBo$mj`DDU4tMg2dfH2*xxyU}sRpGA4h3^zK>_-9cb zGsBIJGyXWr`xW5-*C>w@VmAE^%7eVGK$s39*MXVtrx}&=2LN6_OM(C9`Y-gKlm~gJ zUrBn*zeRcfQpRJ}3Y78uE9G?&;W^IyMR`yl@6@N=F=XS3QcvHgL(TIQYr3fmwO%&R z?9!LRD32Ewg81kQzcZcf(0g8K%(`psZf?z*SYJk{K#gu+E@e-{eU^_Yo4PLt)UjHv z%+GjeUtAR~CN|90v1m?Mt;{O<)1V&37f-}=*yglNW)&(hu> zVLdH9oM&2~BuRvQSn%>>g@s@O`nHH}LcR;e zdAQ%cyLRvpX!-$B1u~S$s!3?%jBs$Gf_7?Sp~QQP*~q62LsF{Rx8q@?U*7le%zVNo z(!r}bAkN5%;vHp~aX$nrnH$R-xkj)HZx!hKA>bZzUNgGinVPW030*^{6UG_2R;@UA zazX*sxMkWD_569c{ZmE{rx$VI_UOCQEX4P0rSLk0U8M#UI`sl41~asV>u1b*IwO<4 zzoJGQt*iM&4rWIX(n%0$qXpQoyhz5V^{RC`aoO(0e}7(+LJbEjV7^jD=nUu6H5w1$ zq?xXP{X|<6q|(f!-^)_DT6%uQO2xD4bJeL}H7pGH0{`Q;q7pe@+?YAHvlI<4UEM~lY$rvn-x_u-feN+jAC${Kvjq^t;;KEvAf;&GV~TfRBm9b8toGkkb z{W8#)42`*lzT5I-Q17C$TyI&p?-BL zKtHoX&F*#Tqs+Gsq2wNE7S8`Q2}$UKvY4! zwsr9?+89%enY!Pm3-wmwiRM~axV#v ziAF~qJ3^lJeC%_i^F7@pS!&k0`xPa(oMbDkd0_4C(@T2H(lk2w-&1p!{`!dotm*M~ z;s?isfi=Afu%`E@P~@bABBRsC*BQ|CvH(p_@LJPTg9`vOy%*hKIB|p$tjZ}P{%=|_ zv-zFAM|NPim@tK>zJs$r%P@srm#QJEd>x^{+(-Cs?V(mT0C|J)R4=TZqTW=+GZULR zKV=@yFW`E5oIaQj7b9q^5t^4ef5H>y}eQ4Dw)3NUDMznk%7Cm84%G08(4yo{RK$)}J`vI;P3 z2$Cl2?@)JdJQ}#K9VV6)tK693SR$~4dgaB2;jGsa;wWlXSC$-#sr;sT#{yKFpp#a; z6Y9nnUC+HW&v`Z;EV?{^q?+$Nke-??z`D|1{RS(V@m4$9liI z#QnEekC_3Y#{J(}@A`cO!g1j52Xf;_Ch_`}2)XA61~M~1F!0|id9EMo7p%wedx{=V z$%D^+r+!N%fBJLa;Jek`-g*=)Bed;YFJQM)I`A77w6xtu1ATezBf~09=i*^&kuk--Vdy})6V)n7q!fxZo6fesVp{@3JHQC zp;&TH<1-mDvqXY1UZX|=uy_0e_GUC>UmMt}sUlG?3L3=R(wH6aJMV^~&q$X%R9Y^j zC=(zoIdlmF^gQFrIIX6XBk~8E^osW4k4if`IFilR$Um+OSO9t+SJ1>cts>~aB+4P> z%Bn#NYT=zD0Y!E9ea`Z_C$F@|pOV&yzVXP6E3QLhfs3bQIJ%040rWg{9RZ5gFAN9@ z^$~h33QpI09+l}kh@L0*ATb@R=M@2Zo-~|mPh4G3W?)-8KQB~W{XHqaLnRGS#pM9@ z7{m>xM$2Je)gET!RIJ{2?=#=FVwI$e*Jim_&&Eem@WM^vlWY$LVPETcInGX;1YKY~ z?<)*w|7xq89nkXE>Xp0BydFa>v&C^Z=K+j8F zdOs8H18-vZ>5iDUK52x@8iN!Kg!P!R1j@1R-WxLs5!8S9yxSArcYei0H2=AR*$X8( zBgavwiZ8V-5Z22hrzwg%hO$Wj^t@KypRD(|zWQ^@qrJ_0Mky&-nj{wiN@Sv+*H5xe zim~fOQV;}+hK5WHNiatlQI>nh`Y-NnL(s-s5lN41G9Cx-`WE^CF%W(BF4FUmBg z#hEy(J-w9yJ94bZ#Pk)nNN(1VyIyNmbE0)V)xRm5f-WtwTJ`JERs?GVvMkPbe*$3v;PU&w>H_ z=AOcy4^d1c?JaFaGU?H$p$|95jg2D{sABF6-L7v7R(&svKEL=FV^~NE8L)50X9QUJ zzj{krDB~=FrJ_|=nRy&^GM8PZNWD(G#nm9PM+R-)XOcuKnA9V%z;z19c~PJIvzrNS zqjQOLKB?NnpiPpXe2f8Fog^sDN>=whlG=dUIJu?wBDXIQe(XU&nMXjeDIn*?Y!6nw zGdCWCeGABW&^2H=uMa76R9{^MK)nFvw#dnQy6$4sXvwH+s<3Vk*Eo`)xq?+#8;G!U zT!n)2>xqxFBjwg%LX+1}MY`K_)xzRAP5w};WWuieZuvWoLeTAMfH%O!@% zJ1fnm#UoRf$vtcl-2nBF=*TIC64j+|t~;KXoPx5_w=uEGQu|U|3ZRm5$A|ARDwwoY z!yjOcnDX*5-7APwxECOr6l$A@sJlg~%se^uK?ulwO{y>6H{f`MY)CrUC)#loz@R35 z@r5cbzt7)t7`eT&K?eU#EKDMUw%Y1eb9b78$SP8vNe;|dBuGaLh-}l{I!v~+1VD9Ry3}YIF{LQ-YWq! zpZBCYt;prRWH`{?D<~bA2@q{r<2+u>4S&!$IJ}}}tH;`C`(SP+;5e0!=LIXX;6f2n zUnI&0sHD!+yZk|w1!Ovans?+f!pGCg>r-4GcfQN@z0chV_%}pSdDZA)DH-UprWg|s z5yNKvV_oNy-!^QulBzM1W_#aQUj3p8Fxj8_dp~df01|iTR_dH(dDwiHpDB~ zR}BY|zob0I8=d|CX_Uu!qr?4w7UePi%HZ|eeE-K$9^;LUGyX8j1FC^;P`C6CqdcH3 z>IT1zKaTQ#_0#_MC=a5>{RZVh-dDgV2f5@zZv3!oGDBX8kb8atAmlIfABr9`!@o=L zfB80lGo<&oZ&OLH^?&hgdO!N9=(Q(Gi6y`kLlnKKThyTMnm!F9NUB=3HD|lV)(4e? z-`%dZ8a7*E;fm_rCTK0@_K;F*&Z|yNEugJqR`S_yE50zjt$F$Y#P|5hscbc|!Gz9~ z&aCPHMAwoOu=X&4yY{TC=G=a-J1G_xj9u^zvrGR8dH<^D=_}vTm>h^ZKY;2N5slr<`vBsd#Q#WMG4~ZWNmOFW{H4ln_NUH( zGh`*KH~wa>1_VVFws)u8OxTg94TjN6jxnNk4)nm3=LArm9J7jT;ukvoFHvCErWPLF zAg{zXnqJ?P7pYVO2L6mEDo6(UzB4{>Nm!9B55-PJ0tdwwtAz$DQZW_A82WF4zDz^_ zDZLi4+vZ@`ra3e~c|84K%4>jziYbD7rd@Bc^;+*@w~L8*i)g{oSb(R8(fHwm>y+NJ z&!Obtl-~5azbTLPn(`=}omdmQ2H!egQ{MhmK;_e8^9DsoN)JqV?#%;*3AXa!l%A3u zPSG{x^|ljjjsw4C^fPwJCh5vcOq^4Hf;u_wt&p6+<<)@ts&K9mf6T!h55T}a&+-c5v3rzbJstX@Vy4k|2}sAiIacL#{;d={eXrTozKfclo$TOT=t z>`Qm;nc!b-eZemsRXD;+MmlG38eo)gX$}d~*-#WTeq+VnzZ%YZI70GKU&2+ao#GDi zdoEidRZoJxGs5OVK-W{N5M9=bAEJeN>-3ca)=mq*e)Okw>EdthCU2fwf6*2$AT zh^|*8;lWGUc;tUCqMqz%F8p6%?|~Bc(Tol*rV1(T66xC&U0>&%UV5;uCw8stSp&MB zC6Lvl3I02)_hxwK(|7SN2)wMgVsbs+T%McdPfv81+V# za`1H7Y4*n5so>G)jVu7`dXW(YKXtuF)29fNS9i#1$j2!RN@IHcif=PI)7@3}@p4E} z>J`qEu8@c|%M@KL7zjt^v2a)1%*9fl95$F^L1yaYJj~i~YC`twalose9eMZ7%sWEw z`9w0dxW8V_$28{ei=_R07MVvZUeU7M@5MnI1Wt6c@e6#tBTJOD@gL%%m#%2l+mj#r zd^2{-wQBR!0?G8fKV|=fU6_AB^U?lzguDL4;O%&o9tWqG&!R}3q=4X6>dowJ?Q2KQ=RKK*7?cF(__}!?{9)wp76dbbTKvwUiw+xWgJCkS( zeKD}=F+$GMO9)Fp-y`jm7V{Bf}NE9v^b278Q<5|!V9 zy`OR&;}6#+P*3|q+k?Ck!LSE;mO^eoIPgCtJ;+1-Lek@8`+u=-o~sO)n?XW)A@w}N zajOH#T+14xLXk2qfiL6NhdiH$-)hvl6J^v|`XxRR(O4XLVH!RrNS4OP>BJFs@mkWG z^W>?$>|Sr+zdW@(xH`bKR&LC>`ob=@jUCq`|+a`br} zUgl*sKaUv>6vrxIyEuqRSmrUkoDMtdpf5=N{c~e-+9KHASLDdSgAED~@kzfx)2`>g zBY+p^V^@$8L82!Ntbo%ZHbgy;TIdTU-0-nwkun%K@(}Q{pq_Zv_vHnh5)0qe8>rng zbq4G)6)i&fkOyp|#xJ#JRltC|9jRBS;u1F`#4$NGI+6(E7< zO0%u_x^X2hlQkqK-7n*@llPl;4RWhCEZ!~E&4j1Jn^^vo^bGlbNP4%W(oJZ{0Q)AM zUz=Ec4A{QeJqkqhGOi*+3)sTHcuBFxdR29q zQ3F@AmQ59l@LgA_6N8Ft4(owKGy7>Ive_1BC`2Z1M$RA?Ej(#5KG?lVQ>XT=;S~O6 z=>1yj2V%mY4XqHZOe%i@qmS=B0|Lth4+@^eACa5ngwMESo_+s9~iLHesA6>k)scaF~)a&>QZZ`9i zu)UhqpD{i5&vT}jNbZe;%ymshr*9p2P_Bmr=(Zt>YyEs+4;(B@9rV*KN zIp9cJ3m15)KA^xknrq-(wZNxnp#&itfKe|~oJfq&iB2_tWaDW^_n2p=VAnqBd0Ihj`X(Y7W#r6a&7#p$b+~S1(xE7nb{Jta(*Tko zYDu76gvBk{_B;vc6q85rhl#CgXhp>{R3jc3%vwr{!TB zsC_DqeJbXSLAbt$y+a=3=Z?k=8dEzCI_kjx?SgXKQ9Y;;FmaB6YH81-F38?fk{ZW} ziFO%fjiY*CNQ-FfcgZw+!>DrYIrzqu^h_U}?`Ph%9MIYL+)b{|1(dS9$rg$;vs(a4 zSssL@)iIn6cp*-TFBBD{3qMefQ9s+&wt0{o;cwiTBKtrab$2MBJ(jPo1?XJqg-!aR zE%G245xZby_1pO_^%I=A!w%u#0J&D^#3%U4a7|SQ47JFXJUZnA`AGn(KQn1Ad-de7 z`9VG+{hpAln4Z0u!e{gbq)#31IM~WQdv8cLlWQsRsd4RcM0=j0@!(fc>PD;L?Z(`$ z!@Z}Dx7)Gx%($^^kzUqwz=;K>z#C}bOqFLEW45&Gz?);1_H4v2nBzUGmq`B(yNYx4 z%e4(=rW>gMe;V#F{p#TRxAm-l7VZJV=r@o&{y1%q=|<-oe;V%H=vd>QhI=| zCVUQ!034iDM=w&J*c!>gx#hVSDO6?C4j9m19%nv!8=sb=<-C1ZXiD7C732Sf9X-^4 zJ~VCVY99L}OdUGUR7E9)ujsF|p8HwN(&)JC*61O;Hnd`;V_u4d${kU)J`?>XN);~~ zqrWd69c&&~qOM)opATB;wnQJR;1=@Cz)xyV0t<@U^m!?kmt1nH@J_vU1p?8^CZOh# ztXdBgjZG`x`Fd=+yfdoA-I>p=7&c}^)Tof_wJMa2ksRo-|1XsD#OA8lX7P&sjVoH90R;0DfDFpvgLppiv_S=Sldz!?WLa6%lM#}Ef62gJe2q~HXC zG_qVfI32!F&Y0? zL+`k>GYv*H&fY}WaP!ixXIPGu0U{ykF9{2ePXOGb<{ zC2=0+v@Swo6&DRYJ@0z4RDq9=ix#D&vcM&F4X7lB=Qy( zPE9ElQ*DqI5EaaXV7Fw9AUoDl1Ik{0w5*FZSlI(wS$yse(E`ez`EsR{e8eg;(8`hz zZe@AaS9*t|HHt;}?&vLf)$C=d!ZlSvv8_%#X5Ba8`1LIsB)8Of2)p|j=X-{PMgSY< z-9j002?Ld+OAFf_!@WJKaW6 z{0*Ggd!1lt+Z^v|@FTHT1|;@efW)5LSJ~5Tp#nhJqpA=k)tjmTls#34_^WDS{D(n( zFe$()V^9ZWjC=Req+(EUA4N1?GU}o#OdZ7{M-sG4a4cB^2wR8yZyP6UDA6il@8}A{iW>f7OtG!FaDwIXn?38t?hC7h( zxieFzsU{sk2tQE7se2Lk_KGF719w~QLJcV5ybJ}4dkqkAuRofi*B>b2+;)^apY@sA zxfb^xaY*BVi#T6_i#WL@8f9J#9Jve}aRcIBL%rJ6j>~sC$Ui`n0{E{zY{=tU+!Nid z4`PxP)6i>sTT_H2-+Z@@T`}KNZ)iElU{}THV#uPBG#n83DxL?@Z#($hmIRA?Ll%xb zfVdX~h+c*zeaq_V43_kCKs3? z?<-)wgIsbUHz2SGzUQZj6Y?yDd0H>$Tp+Z^M6j zwku^AFXXxz3=ZvafvDn*-vgTq0+>*aO_|_+7Kocu9qRl9+|Lpe7~rWwqG|G2RqMRw z?3=UoWhLu(w^P8)IXn)yIX%?r3;A~?UT+>*>>X?iX2^$@O{u5Rs4zF#p8&|W6jlkO z_O@0_mxfxocR152O&)cg~Ly@tN zGW@E89f#+}dk?cuI=XB?Bbh&ODw|Xt#S)`J%HYh; zVw!k^_-cUhk~Zm^43Bze#sVpl=#F@tdm)l6A`CFP@Ww8kP|LUBmJ@N3pb6cFnlOW% z0lZU}PeL_MCFaZ>@J|lrz6hOXlE>a6Nzi6SGn}qL)Zzq27u-uh!ZYsosE;|{41tCp z>{KHA=EN0oO4+O-aw=*!25QN_7q1l+Xke4#lA(!zm4!s8?-qTF?{+-=3%^ePTw~>|wVRHe1u0kKO5bB`+e;*O5e;{QvF(6I7pfu+xyh#RnSc^bY$=fkKnZ6C zNgV;&icS|3se>1H!*`eM7JP&AtQ2ZkdyPvk8sD!S;S9k$ZHa^RpeXIPi%ZdVJzU(6 z^E1EJTld}$YfbemyQ5pPk zYkFAYi>~oTrMES!{n6EQZ1&?d^zW^KVs{Ynb^_5g7HLl2bW1*8P5IzP6$BS@kmhsj zP>0K-)=XK~Lj2|=#8tr9PF5BbMWrh#ap++~3V(B&dqiTy!~LcWc-lB^3qLpO+j20} z9EZNegwGTZvZA)Ny)>S?K1{rXE|#}B5t)0)%l&Ce&{U-$OQ}(fSGAgu=3Lww3*>-} z@9n3r%(=n2@yVzO*JkPV>U(hq1dOiuVqGyI<>#r~m1LT<_2ZH@Zv%YCrD!B;azyZ2 z?bU0(xCByU*u2UvAx(ZAx9D0$M$$3Vq+0&!)Z#5+X@!&#E9Pe6djo6s)}6v&k5@Zd zY%~Qvy@3^{sEx6hI<{{QOHd9OaWKc)fz^c-V08iY2yk-liNn1Q30ohE1FtTaCHF3x zY#IyW^?yX9CQRmd6tg)~Z8%%PKV6BQrwjvCY8uwo#6qT~C?+szy$W7kfJwR)jcu^Esw-Rz}bb_hwjb;@dkcD)Vng&cPtuKx?_sykoe_(6ttwJ z&bxjm{UXN9ic6UmclYcYm5ShCoDH~zGfFqnRX4@kCUb9aOAlpuO2BD=1;D+iP@v@a6NyhVP;=J)T*`Yu-s)?|~yc)ta%3LST;(NH`am-a$E* z@;%(1@fdG)v}j0}-f>v}7(cypB0seg9PtWOVX35MCuVm!JClAMt59T=PSEDOQ`K8k z%ZfMC`AzHUy*k3G(opAdH+jCwg~NM2kDVrkZIR~~HFl+PA_@>6ecS77Nu#C@=Kk31 z|Mk(L<9NUl+MCSP+jX%sUWU;xME2H(y+o;a*cbMyp?4TioyK+>$wukZq5J&`6MZEcHVUj27@dq#&&CV#)Z8}$aahH>{3yE zNAsj}nO~m=&sAi7zhKbt-J8Q6jk~4($2|-D(;?cH^A1Hr>))YO^A3`JO?tojVDS5D z7Y8sO&B*ev``Q109@hi5y>Fst{j*4qV>4Q-G4r)~$iqO+41#Ch}&RD!mSOJQ;>cJA@d)1@Y?WacEnK08(SV%ZCumJQ;cqs@#e zVxyPLb*t$*`Y^1Nb)L$uVts08f4;R8J533HpYwWdA@XCLq-5>t88IS@_!H>VyR=F* zQ>!&obyraq)!mz2Dwab}gZwg9#%9GzJK}@w6y>-Nyfy4d89HqVd@XWc(S_#g`QzE& zwwTviFt!0(Id6wiMfJtVu2#$TFeu*iB#R1CPr=-2~awx%7}MY60$;dmPM7dDYcHF8oH5}bOnsyR|bfl8RnWX z3VmJQFErM+U|Wq+lNCPl?{fWS_9k*LAcC-v1N}Klw!}w+IE-n4^cw0`S5XJuXX&HC zr1ylz*R10mgPGA<;$DS?!1H3z+vxpfXZGHLl?kwyljuO;yMgYE-7vkivPDM|Y#>rdAZ!+>{MfOd4eoSE?}3oS8-B|>lV!~E@2wB$hnI8P1dU|{!58U)ZO@e zlajl03Sk+$(i#HzHrpWeua6~#zo@1QU&8a07e&}Ue8R_m`9##Aze3L~_r8wTGjxP$ zAqi-N09Y}`xv%}6_~9+^`|%5A)~xnpg$ljv_g@}9v0+v@3<8Qcw?D8x`TR_| zdY#ksQ$`am;}Tx>dvO=2&mYJ^ILZ+#Kw!`OGzM*c3l|9N-3exxDk1-X`2G?q+`$3Mdgf9iY6swUmP}}KnF=1| z5}ue;D`&S)8EXA^Moj7cZ(9o@il%+M-JzGA_3mQjOi&EfM@CpZStOEPEJWNg7c=3g za!)B*49KKt?%}qUS_<&Q8OZZ}&QNG6OT*)AbX5ph#!YQ?>O8eCf||xve|i=_;VLYc zhRWd*?0CO`pkK>f(R|X@=Y^PNNO(Y4M?^LTD2~ zb}L0|TpH!tk>eu28_bk&`A7uz?wPST>toVd*nU67XH4YD>V&?E%;mf4vnh(EogXbD zzZrkaMWXXCCJL4L&NEVv|9&bnBjDiN%c{L~p?Z5( z6MZVs@Wq`wE44rk=i$#9&X0*2dtc<$_wtn@P=|JNlALl#L5S5o+9sxN_=ef@SR^Oh zike+A)&w;0u=<-E1|5MOPJEz;latBR^ zd)~JlDye#m6o(O74;$VJhS!NGD%{?y^RZJ4Vt1Un`3P}M3NT#}mSHTns6*&PI6+#f z?EBVa*9fGqaQtY3bDE3ieH>rqJoekLF^@G;s?0ih+vC|8clIVh+ham!PwH7mzANnY z23DdFas6U9b49!tFMJUC+VU~Hi@(h~MUEyIu5DQyegC3y^7NOG$8w{C|36L6190>P zrp134Zkp$K^_Z4iu(=7 zgS@XmNDd;^fl2PCZxixLgnS9&+XTJ@`3wDLISb^WekJEI{idAvvx0N0EifYff2`n? zv;kLe7N|lhI5V+3PazeYjNl5+S3fE^=R7rMuD}(Xz~q?ocju;r{+;ol=}K?~CqJ!6 z&GRSme^+oi*?za)JKw@yyVwF(aN-x$)pj|p?D2JMM{5BM<=;zBPWd`s1rjWT8fOcP zJ_6!;nbNNAIB*{*fknMrwirbaeWiLI-p@x<>5-C$_RB87+JgP(u`S;8Zn4hV-mgekb&$1%4*=px18WPT4iMG(@*~G+lI$29%Ho8nf&VS82Sz-F;2&{4Fyc8w5bs+PCmw)!M`wXhvx>#p ziJje=9{|L=3$1es#Pz=9RfOiWpr^Y}-4M-AKk z{OpIWLSJ}YN}4;@XFJevSkdVNo^h&|_Po|=)Z*3DhQ#$YVu83`-d}M&M_anh3eXe! zJkU}|agQo981aODA|4ReD}4SxHgH1L7JkI_ble_)C%ogKl1EtLAzTuzB#<_14?FSJ z5}mo}Gq9i@pI`TK4z|O*l=>OgF=YUGNaV}Mg_gU$FFeHc4Op+H1G1^c(Sfj@_#G;i zIjrXuK9>9J+o~ZYejUZ93HOxmW*_x?9m$-_>oQN*-DkYO-}Jj*%6O4UGH$1$kDh6# z_BHQ)xMx82k-ha8+P>O`D;E=Qf8d_*Bsi_-LODSw0%_qioa>_?+}H73o%SZ+^JTvU zjHnkB97P*S_z&2?c5Z79(u31_&)uPE6Z5--i#`BpJxB}ZSsc*9nPbpQ^dqfD(>}Ba z&x=E$hES&`5&z*0fdJOZN0iQOEO1(nRbPY_BeDrd>wSJGX{bBNwVEgHf?#-`l5=S@ zG5V?XXse-yOT+6OcP`0H@4nK)0~)O7m;!cdt=$D+&yXP1ogFLAxK7w z$;#C2mSi@jgrsklGuv8jE<9Em?=!9^Tzo337^86qjS9T0jpTJSfW;bA(=8&&vd6}4wK2lriBrWG3&>bnm>dXVZG;~R0!XjLN$X%s0J?(x z`b9g3U3`#Y|eeI3_Z>n~OI>Z9E<{wuB*1H|=sf5!EkA#pusW#*#m z8qT7>;(A4WqE3fC;(1YODd8VYgezd_nTz-13?;l~lO*l3B`bL7$8-#N@QnTZH5aV& z()VS`tEfRQ4_4LW#OMI;W;?QWt{&Sku%X^+kct_Mb*^`mf1e3!xO`Ug1U<#^2!n>s z>e{>Mym0N^3}9LQEKkX@@-BL55ldY(NlRp7xIyh;kX5x66X0N7@!JEQKf_)mh9C9!46)^bViVMqwHdQ)K@TX={%FHq|52#^UI*K< zSsd1Bs=PQ1nD1g%$t-ek>r${uCu()u51_eY1S-eV*`|TG-mTM@78P3;-0ai6y$-Gn z1*I_LE)dr7dBkHaKI#AGA#^H})|sucRN`1_~`@v2eTV zX0J&2j;8?1`{V#nUePR->$Y9a>kzc4gN@u~;wYRpEIbBcU~Pf)u;g8HU{3Wgh|F;c z*Z5t`#i`vC@VzEExPd-$%VZ}F@-T>kUf4~=$pPNYzJ}pK7`rT0SKd9a6?uec!uK!U8||vqZLE@W zb6ssDd^KB0^;OaXl_a=+C08{9m5`?NXSVnGJ0@S{E_J>xLyGy1Z!03M+Fv(FZ0gj{ zaydL>bf`ilGYs<`8ij3>1x%pRCZz2?edf#;aC99Y5Gpk3G@siR+Mceh$mO28-~UjeYTAaK35@By;6um}R8dhDz~ zRL?fIy7)55(Q$I#`8$Dut)YsiqGLn8M?Lb^6J0_G>P0Jm;6HqpaCDXST<#Fr0BWgO z^PA%=*tgk!6;b`6(ERZKJGP)5LvDT#7+U}@>;0A0b8G-U==@7o?>J}7z-%o96|Cp& zH}y++4Rw4HH%DUSQh0LDIHox&9*HJGI(8-mkqw@>IDS74WMrq;*4kN2eaOc=cl8^$Aj+7QqeHia-IQT-24a_ zH>1sGU)BFy*5moPtheH`*b6M{Z8LzE^+f4`Wj*4*mi0^^YYUKS7Vxqjq?+Y=Sw(u6O2w6(1DA+a26C)N@>>rddrU|uo-D6MF5NSlPa%H}>@C!U zlj_;k_41kd6%A7`61~47e`P{X-ed~bmuu%(lv6t(Wb@HUa(2*jVh1+2gO_h~LW#@A zgc%10tzEI9n-=LIVLUje*BaAlc-U|Y#R{~c?P9CXT@;@v)r-aE~USDREs6;FK zE@_h5t*?#=uKYneTGyPHf4~_?k7#6j&r~17L>~=iyp7!;FY_xaA0nFWZfbfY$|L-g z#-Uu_Ae-v6cnk?SEn9ZJQ!`>49;Y#%M7u;h#%~ z^ZOr9LaEu^Gs-6#u6Z4-H(807+*^#WC8S`zYv$C3xxnk(wt+IBTSxsv(K9&wi}O${ z0nSUR_0O3qT@x7&uZq_}dl2z(hpb1)+=FfWORG<3G1#{mO35+fAszepxrTuQ<*2HV z0zSn($sg(!l4y!GylYz!B`r6SL|%#esk^l}{QBzs#tZg2MzHqDA^U6jvSATSi1 z*njOptg2!E8YD`picH{xLSeON_GsetR#QE@>mfCt2iNANmM!DPdkmCGybg98VGhT|n?6jknH^op!WzxIOgu$TadMESp(_T1-Wzgf9ovQKa3k-4r^}xO#2}z|^+;Vbx%Gl0j1GIw z*RtbsQ2gWW`^x56dykL`P^b;XNV1eo0J48NBakDb4;FaFln9T-nMoKZKto&pZ5Ax* zxjRySfw%f*;5_7}inu%ESov+1H)lsitvC42iK+MSBX6W9I3(*GJ4;#7x4tR@<-73P zwZk*a2wMr6JB0^3kbkh`ZtpTCNCY9p%0t$Dj@UevwgSQMvy&=9coW-(q%i;N8bc*zI_pdvXcn14k{r_ z^Y7Z{nWiV;&cN1C2bD&LjoBE&;*jNIO194qS+lnYO12Z8UMg~d%uYIo`L%fPUIG24 zp85lnxLa}TTn4B+aao=prZp}Toeuaj)^;v`O?o#v{{PcRkL_0{-oGt&{If`p?N=WO zfBSdw$B`b}jgB<_Fw$eY(TT=CjP%%Ubfodek>0PK=l?y@gBUV@hxC35c92UhnCl?d z8_12HhE2$`6mky)0{@fr{#}Lt%el$<+obnnS1(~A5F_C~L_MVAAG>b2krb!J19oGz~0ntq-$?!bh)MJuPL#&c!O2~gj3?N?BpD_UuNSvUWO+UJ1L z)6YJ&__~8rf~Ejen=5Vmed2LW4IC4cwJu#vtp#Z7>`ec-LsNOY!etzF#3{m}Mmp+I zq}l6?G~{y9*i7*)xY|Q0M8QOp)F9%roHUWa#_en}qBckH;zF@hmR+e`fQfWl#oWZh z?-n7X4=(=4#f7quL)<@9J<$KMp>Feu!qtaMZ|e|kgGXV=f_d7Te_NVwy|k>wLW)Ht-v9Dt$73tE{Olj z;6lkk5mrYVf-@8{7ZrJcK=^(LR(eFUZNPhT0TnT|mbyDtk@})%3k0a7xF73N?xrTd z9KB<9PL{+D3G?KFa&mwC4rwbdE0nSgz35uilfJ9R*q`xA^J6>K<7nEf*M!njti3B0 zY!tFCNTuvgr_v2+5`+0dzgo%f@7i!grBfXQPu!kqZ5cNun!}uBzf`1>s~koDC@AKS zf+%$E(4#gv_IUlpk5ZPbpQS8}557T4SHtV@4nlfEp45egk0@~(l8(Vqb_NcXDCf@bJ+vGUO5)Qgg zZbMy@o;aiaOAVU575=3(cjLqh^o^=-ywSl$AEo&6F314yWkN_RKX-O?%D(%njTDWD*Ylypi- zONStx(j8JF-6in5_eN))nb+U@^<6&y=vuSZY`24(ksbH(Ij`$HjN$KdYSiG+olE6m zZM(d}Zf;qmO+CyoZ+Hljs3Z3a0TOliHrWX>F)=m067H&OP1?rsf+tY{&2%|gG>M&e zMQ3@CrR-VT?g>vd_s8FraqL>)t*59Z4(TwMUFEqQ)pJ@`VDZ>)!s(pz-HdWP5_*24j<=o!}2|BLnT9v>e5mFbnO!2+y@ zyNHw;fxAQAYXq>~=yDs`&5j-l)eY+jYJgeKO9_t>V7;q_OL&w1Zi4-H^F){lR) z-c$4Y9TMT+SdVi4hV@2ei#PyU2p2EH~wS#)sM(#vj+*56Bfh*n8u4M7wt zcb?yFh$7h3coeTNzL+t{pfI8nCsvyv#*r3A^_XpvBh=q|CCPDEMR!*ip*#T?-lU;~ z3I|ElOQ^)c(|s9iRse~5NqLCs6F-QOeYZ2#E~rQ-#sEPyzGZAGl$KPQjzVWbR_t@`wlsa#+;k_25>5qz$3aNK8*BWM z3=r#?dkLDCC$FYF(3tP-b1w1$e}OGr&ghIa(8Xe%TL}+{7O1u=Ls$m7HQzlqls)8k z4rO<|WnNOzPQ*osOLXiarPMLw$cd}i&SJNb+P;=kr~9;Kogu;8wwBj)I2mQM^rN4* zfPf9xv;A%j5hzMyDnFkh0dy-34NKb^kG}gZVATTmeHTEr&_j@_y^S(#Z^nj7ALT)C z--S}8Lh1FeT@4*X@;Yd4lTa8mw@KiF3BAwjYoMz$4y4wDv)g_TQtQEm1O9YE zKD?`y^=n{9F9D2s!_>@wVcxY}m5)c8-c#44CBYi*1F;{H9>*`8{{MEQ_e;n7e;Dcg z^GfPZAK&Eor6Y~sjPy8v=|tlXBR$SvI@0*o++zV8qSewKp%8}Lu)-{YI$hx$>b$Mv)0n=?Qg%T95`YarA6AN`wuWqSYY-yB2f zvLnPt77PXTZ?b>y-y{+&w!LCG-(mE*()Ria>fa3C813@_`Zrxt)dXjYh{MW~M%#V! zt^0iGu3KlKx}9Q{M{d=qWesHoAkGP|5l=+r z*W2eL^lw^j;eZV4i}`gMwU=L+XIRunD~sly`Qb9&%b6CHV(AK$#I02j+%IFZsMFUN zh#~%vCti!q5`t@mjy!Yi{32*?wwn@MMxsNRQ|# zbW6u9U-}{X02+37!=c4t}8B(b4QQwoOy62I~-M7&v zoTS(?JYqhpCnEIp2q~v^AsOw0QLhFLgnAud)QkQP)Z;^|E;o|k*}+Ff!>MRU`6ue# z0vpuNj#Skp(3gVLV-Yk_A(}v_*8!lOWAoprH``$Y_!bU9zJ&^j0bBs}WWlJn;z}){ zyoytbS{-sxJU$Bmh+SZwQkrc6k$FG_(mGn8^JRQ_S&_$JoS4g=w1#P6!rIs)XT2uM zfLu=|K21d1T7n#|9?s>@epA{5a8U~rl38<;sLD?*IqUJ-d@WRL+MWeeYGn>$cf|p1 zEQ>B5t^Yzjuv@Pw6~Xid^+0aDcmLtmbE=+Oe4Q*h>K*S|hkZTUI=p;vaXpBBPZTM% zYBDZ)m;I{!rIq8;h!cV54~B8pliYL1*D*%3TgJQsE_Y*jC`2DmAS*>$)fbeuvbFoS zgpM5%?GC2PJ}iY;{|th?@G4mWUKq({h_#fv?<8J9=qn{&-K{=)AB4|?52+ooWVRo; zu=&I(d+e>HoD`A8k@<>kAvPtTQLiYNfmlV=I?KWm+kipte}0#f3$Jeosu_#Jy9XV^ zqEX+$R;EV9v$$iK{6)AblXtD4$iva8iN3>;@ZsLQ2 zJy9EAfOGLnOqQtg=;RK^i8tnaonx%DTe6Afnge)%lU}W}MZFUr`fY?=r<%;9l_w#7 z%fbUV>h(Mh0l#c@glvkIDZbZBqcaD=gJCpVBm^lu^z@^z9R|9Md>ZYDbnl}=^cM5u z-X6v@fdmD6Gv8pZv(VQ4N)uXlqrFywtS!S3(swaG!1<#5;pWT;yhDzk)yhmS|3ti}`B`#+# zzt!wuFamu-lZy#wFrv~|h<;)=;!b&g_md%^3vJRKW8dsY9QNyxs+LzbvEEb%R)*|8 zt~#nj<}jj$E_QNGmLNX0y)iF(vYLjaMO)_L0kC5iGk~fvY_uvBZA8&5LpL`Re3GVi zBT{#P&FwbBcJ*>=j26Z@W$1Kw=Cd*EEZV01@-(&fPJvy$ z3d|Jbs9lX@S11o^QmEr+qNcfStMxMp{EfC_w%zJdk$%gf_|)<&%a2Pd7UjfaN_!`d zP0oe_IRPGAq(HlG5*M!pyrTn-$!;`J^=|AuBarg3-`=rwIF-0L!~nd3yu2CQ`wV@60dM} zb`OJ#;Zy%zTM5p?7G>?Y@T7UTr8;J>0h z@I(Cw_7^gNjY`U=i7Zj#ZkgY*8z3f6w+RZx;6MYsaE9`kULl2)9eY z_r?tgzVK0RX&R9(sdaX8y0!q?H@~^muX_B|^|s?eHp1)gWz>3UeD$om19qv4zv&*6 zeZ1mReOYn3q|?gnQ|@iSHL<%qs~kv$x^uh6yR1jBU|J8WY3AHZ)PU$cAXC4uVv)N_ z0?5?YbS4x6kb!K^2xT#Edd>dwT-mkfk(&BDcPvWFdMOQC42dW)HRG&wJSSF0>5#Xa zNEZqBo>h+sVT!0JioD41ubXGsWoy)#$RZ2qFczkggHw@VsVZ+roOH<~;|ht zbhv$#sgw8de1s0K2)3#BXRd*5>Z%}{ddLY~U-Lf8;IcVOEA}QG?Rd^$j;UT0vbuoakj7rd}X2~fwqns$9pn(M6v z@3lTyJ)o0iKc6^yyX>AuG?9z)dr|evhWNrH(|!b!@$bM#5f)WhEwI4Z3NO{|sfpxw z{FUtt^Qy@lk(<=L<6^Vbc^BhcR14{?C1OGvu&KGAomAvBb$=@QLGDTZ;Xb7H0zbRN z?(7{nrARYRbtC1r`UDsawU6_Qd0u`=^+H)P!>EqNd=q7RnwN|)uv|yZC6lQ_@W3c1 zN>iu=VVRN7nf6osly*A*^43vI&1pce*YI@oY4UWc{V3BIwUt1?+vyt>%_n!J^{II!2z_`%ipuVGuXJ}i3v{!ITL%@-nZP*-qf?Zb?!DvQQB*YPESE7zo%a_)oiM)bc=hBv^vrQW^N5@C<8Ke#ch=S?6ZS8f4ZKp zumRh#`5kd-0P~F_!;uXE%!d=1lhuStZLc|v6{$91Y1@>!?a;mD(!B_^Ax@|LmzJL*3YiIfZZ_Mi%@my|MXL4QuDpEc(D7`3zIV$d*=y~% zuIAGAc8;lS(-NFT(=aX{9(kLC%Y3?8HI_{?RP#W@S{+$an|gMtKo%s91Ww%ZfLofD z@}j1g=DG8MxuGWgZ=2{-r+3{ERypdkGHQ@_B5Yiz#yiD5?w#*0FW%{F)%2oLD*sETm*0KIVSD`sU#(z0O#UXF2aEMc1_l~6Wb!#x)9ccPz>Qnse=kw z7ZwY+NWuW28f4c}o)UShKpzPBJa#F~&9~o^H4(|6rW^@!pL2%7Wqt%1)d@qD z%Kj2AaMoY0V}!fojh_;c-8vcmVZ`^th5kR5__%)QwExc{KCT~4ef{)L{qnRUKmD`)!-$XTmyR}mJL3D%|LuQ|_`vbpPY@sYa|J|v;I~}xjqfv@;8!B} zp6@US{t5j%;^X{hCjWhylZ%PFx&5bV$AekXDH#crwTJUq zTfi-M-fG^U1>iA>Yy7!IyKp%aOQpbO$@ zy1K9BwUzQoNEfSv&lPKpeGoiJg}cWbqIJkX#z_ z&y5`tG!YROZ-DPcv4=;X0|1{pu(mgtIN{!4^sk6dksKEk@zqa(BEGy!dLZIs`Y3i`md(O@p-H9liQ91^3fr?*XcCN&#?*Y%24axtFK4*bE!hS zXO6F$xV;>0&JniSvitJ$mGF`Io&CUCvJbWs0Puk#z5+I}E}K>1=Ee9gE(v0gSt20b z^DHr0DnHk|10j;h^py1%-x$?3@NVnf7}Y7Y@0;8h)jbH3v#2Idp<{I^Vq)R-4vbOM9OP+*d2=d) z99@S>i1RtuQrJ7LWakB5Y7s)jYkDwUW#8|(1yr;=EEnK3hBE%BnO1r$$LTJpjFX-3 zwZYx7GoXw!dJ#wFFQaH`M56g+8lgjN9!?5ZVdaPF$r~AXCfv;D)tlV3hE&V#-PRP%12EIa6a65nHY| z03lzD#|}8;8(xue0DwVZ{jm ze9b+aGCMjz$aiA9-T(^u+yUu=`_4_sH(2Bn8SEyy&k`K=1>knib< z@TxPGqqb3Ciry!18>k^0kZi43md_yn zhxd*FuR4?-$g3^_c-39E^qmFgT!qUYzrFFQca*2dIkgaE5QIlhhfAAfQwe(zxNm$K zkl|%*kla<7Qf0h%x;utPOe)Ch$Gt z#B8A7ctFg@2mBkj_3ba%$kD>i_U0aCVn$UZshiut4Pt6@N5{twJdBKnc6L?_2DV1# zcJ}wJ4Q$OAjO=U}Z+@+3=;*-cU}EHCZ{g_1VD4yRO#}P^0s@G@KPI-upj-rznU(vO zPB;EA>f`>Utvp}5 zS;9p0ZJJw&pND+(wx7=6FsN$*mc8*1Vl6B7<$ANARB?s9-5tc15as5igSUWV&*?Jm zqmR$o!93vD!vHzPtvf%?{s!-Ht8LRHqe4v6sEta;!e5 zW8$-N=@rrUO6N*(_NwgsjAPgD7ST;r3)iU2b%SCTZh=q6;e5{%SpsA%+2&RrUQhc3|;{26q%YIoJ z&7d)*(GCdtB9|X%3`#L`qxh@XWyQZlPvJ$+hFOWo2WmM#^@kCxKXqV}RT*484}`C! z=_ItG9IygcwJ<`g0$O#yCd-TGhJa&_g=Cg^p~^x;b~S-5A{vF|yH>p{$E(Jow<|iu ze>qT+8>nhAJbXghD%RDCwUmu-lc4^AVWEF#pt!+J#Bm-;J6mXWOmGl|1cwD3X{(Oi z%tYHoSPy-+jm{vU)HFrgVG1xWpr`D=-!-PGUN@ciL@(d@5vsCW7oPk*U|wh{PnBi= zGW(b#_(6_h6~=AMG0RY4BT>D4ACG7AZVeP;19{eN>Jb($nm|=c(6_1mUy|y#!w3JK3E+?-cRINAU@bSjycC?40Zx<|_60;(OsPa9_oq zzXMp}^Zgi)Aah8u$eVPp^iJDxlT$Az0Db*T3id6dc^oe`^UF{E8ta4sjdgNTHT4M&6&$KU%>Z`z z#K#DceJrL*b%|eC|T&pmG8f%~xc(96>v64~B|uWc^sumPuhsH-#!WA>g% zW#7E&caoN5;k9)Y86m6+P(EIoLs&r?MF66`q)-UnREUWa@nYS!X?ZvuFU6IIYkVW+w{@RDB9!b~__1|CWk3zUNTTtf<58j9$^xzNoxlz8 zK-?eebc+Di_&jB{!%?yVf*L?;d{!~Fyjm%PJ}g}Xwzy$|85qWH2GogBi?V5*Qd@eo*cLUgOilNTS46x#I}=H0&$AZM#(S zL)F1m_rXctKK`f8^YrB|$v)sOunm$uV)5t*XYl~m_{<}oNf0#1RLG<1l0LKXrJ$4D zBc!{-FOuSgJ+s+Ko}rnu<17lyb55`F?wg$34(cZ~0;rd>6UOb8E8=49=$jgjiWes4 zX7DB*5-mTvSx=h?k)6Io%XCL~e=|8U(4s4KU{gnG!Q?oMvD_snp@B6K4!x`4f} zk5*pa`oJ6pw9dj987HvAhXw5LW!~)YZFbe|`MW<*2bJyQvbmZ;*?tKSoLJDouoEP3 z9^I!9cn^=>osM`{I*K-n;eJ^0gq7r$M&$Nfv^8NXS$$Nfvk8Gjn){nB~HZ-;q5dY=E+FpnD) zk^hWM9sIchM!4@&oZ$Bx@IBuN5d16!-vcJVe_OzI=`~i`UsP`$wx~G2K8X=bV#E+$&3MJ6hVq?4;FT8HOjxrkD zYtv9F4vP0k&L^pvFl#sqVQt&i@P#8z^3d=(CGy{pi{@o-pUo6vBQEGAsx9#Rnvpc{YW>h`E5-)!apT@$v&0B z9O9j18YP;{{7C*ub``jx=$bs}Hn(X>%#crH7aoQY5M(&ezce1~yYvT1_LTc$Oc>bN z1g_S9B-sNQ7`{pNKn4a9XGgbjwz%m~Zj&+P$cFTNLVmqZKr5$l5M6(3$fC-NSbA1N zyvK1TapU!FGLCvDGAlx}YM^;eJQhkMyeaOr`XcSY+haOqO1fM-IW?8|b;Ww+Ek**L zQ|Vv6w!NU}??L8vO?x*M;+I9vaWBv1xV1tQ)YXy?>S|E}b+ss%Begq#yILOEzBrNz z2I~Hu5Y?VRq;YoT%PO*@;U}^^Ok@WZ_&BlP^B(H6)xjjL<Yy zCKcvXkD@J_{OR~=o}!{sdM>yRLt(wNzoO&F~bf|FRD?2rXpPIHm%b)67` z*fO)yzTny`sFbO=E^bU>qU6S0vf-s7Y`vsgY@oIl`030W(;ocH`2t|t3-<*~duBJL zJwPU&*6&fKgx``C&R9Ncy5&xO1Tbs=l1JrJq@u~a9hhG9?$|G`RxZx zE#@7GZz!Mha3dRl+FGP9I!CI3ww4#51-@Eh8406Va9hipDFi0>52M^7d7o@U#v2d4 z?*a>aW9_2J?8OH#!Hme}4rLf+!5C%G0d&iFWux}TxG8WKfKVM$S|VRAOy5FP*y2SA z$H1y9`%!&{^__Nc$)H>m9K|B;lS01ZwTt7$(Qb(5uTz<&Os_Kvp|XH+&h52WYhO|x z9F~IC3PWI=^J45nv>WD%h%7BTAKtr2sCuetV4PFyrFxRy31Ufdx>#26iw1Ra^eNv= zDz~7I-Fq{mV4=E3;D=FopVQ}TZk#RrBdcr5a{Ywz=a+Y_;$0O$px0=9wx3Y~rEUZk zFz`J&ZvdrxCcro+vbZZ#u6!+vklD~twb;usHA$Riewg)cpsb}$%iv|l;(N3wmFUuL z-tG1|ns_(+dpKbaI?$@~y)q_O;QJamgI+ZYkoc+Qj3G9eV-DhI%1f*let=Qiz<9R_ zbKH@+r)J*CO<2W8ee@wfZO``IW3X$_9qig80lW6tbI4wUTzl`R#G=wmRyiC2*WU7E zThT})Ea2MHWV=t647m2hlvzv@0oR_`jcZTLYOG2;UV9Dr*N5peAhGcCtEQzL?0d-I@L&MgE=6S&=%^)-sg!=Y!^oE)s#V-~2I0R#;9T>t??&n&a{wsm1} za%jcD-a1&ofO(_Y(>Y3?5C$}Rk58iTwr@0hxZ8kcuQfRd52$N-3~2T?6)#zEx4&uj z9s`;^i@!B{m(Dkuy)9>uW>57-vsaZI?g`TD%{tQ*36PkL_Si6C%qa%r)_5hCiLr9t zP4gP{^259pMYNhyM|M1OCMiKZmPYA=WB_)!mVuOW|54xaxA_t=HPmU!#y^pUpnCbqi~On>6eBZ ze>dD?14j>kUp@XGL(Ja`_t=!aX*oUpm+L?Qri$r2pT-JvJs#Z2c3sck{Ud zpxn({F8BtR6hZfV8{xcpmV$o^oE82P_ii5Q?-%U%Sx!#wpSA7%J?!l(uSa0`cl(Uq+X4P1DYUI`_c$5>DmhehPq?!w+mwP84HC2t%2j}u+ zP4K!%z*BSYOHWYWmsNsdi2S7NqX9@F-}&RU1uNC}h9-5`H<7)6leorE+=G)^e#+bt30* zS?Xi_Hs4CSVH?h}UQ%$DLpn<8o#@bDKyBp4P*$J+rF#xE$wT&`wg}A;jZE`}?J9P{ z_LIMhIm0bQ+MVYnNUyhF{x8LxNac=0H@ZD}i0vXO(XyIedYFL6BrI0`Mb@8tFWr32 zhCXJW=i5J}f&&$E_7UC`bJl^2Imd2_IeCeJV$NhxF=ri6%=!AkhdHyGV$O@hpo_nX zIotoEm{amUi#bpJqnPstZ7twYPEau?(AHAZL@HGEAETUy5WDAqZf{K8hCuNpk*+3X z79NE6YswFXfNrnmvoDPnt)}c<-oy&4sU91nzuHk1G{DCP-F{S(s9wV5^D z`s(2#=!aVRzVNJ*Ed z=~V6>t}Y+0!4_ZEkl997O8Yw>5rU5rHce1jq$j5;MpSJt6KskKV|~JdP_m!w3uY}1 zov5%h4zZjS?#KB;_VZ(HhLJ-yXR*y%*{$`Ua6jQXW+(30S-k&#a?!GZ+O&m(hE~a^eRbxQY2N9B;&x5UTgCBF zIp(AicaAnH$h-RRL9RVsBTD*@YfpD}V?RHoCk!&#h_^FcCrP>)u$>ukrof*bR}v9`B}Ik<=yj0CDwla_zq&No;_y$kBKxUPh4ZV zI6D&VyyMHzeKV>C^n7%^8NJm(+=}ps3op+};6V{li?-DM>7HwW`UrN^?gP8%XQE}v zh|f&T)%VwPJyXupCjkS4-^!QFdkWbQJt>sD;I0<5o30kKcL%#$l%2*4=zwa^|D^B@ z3;Im94XCTd^O%{QAp%lOfFX|3jo4`+@3Dn{kSCzptG+QXfY$aJKC7p8BqG|is4rhF zKhkoY*Iw-5X%f|Tksn2qR-mkDb!zQ;UU4hdOgxJQCk!SSe=JNa3nNwwcgOscZ>60V zV;_pky_wHSs}S1NqFx(!r!jx;M!_)ce*oIs!xH%X0Z=f+-6$9&Z0f%$81_I42G=UK zxvlpqjG-=H$wR*>7~VAU?(a!a_nvx794?1ATA1V?`em5&G8*vT%N8ZoUvGSkL}ipv z)#tJ-b26Lue#k3Mw!(2fx$NR$(9p!^X8zO^R(ugR(-LiR}*V}nb_Iw;jc?BWlf<3*zdQoXa2IiOzV(Z-7qY}E8%D6XetytnNbj9F@xw5^flxX!~yP)QSV1r20xwe{C24KONab_7V0sBuG;>-l=?ri z&u@o%%)fM|@tdI@^DiA~{9&la{7YvVza8rR=q>KQhkD>t?*Bc&$;JfwTmfSoIJE-^ z5Bz=ux(ED91m6J9ZG!FrQ{cZ*@1GIn->Am~dU$aQYe!&Wno-=^z|ln1#K_Lr1T@3! z;An4RV1wwIw52Wc7wTDeMB}!9k~&;T=m&~gMsViy2@@UvPWIrxC3|7qgdv!f5RG2? zHK!GU((S2M&lxKr701)x3V3SGeBIg@csFVbadyin z^1|ipS3+2PB63N^^r_dBrqQ$0ja52xe6^*TTOfP#!0zp*F9Tn;$J-cPo)GAdL2BOC z)@GWK?g_WB9Dg*Q3nQnM1~GV_UbS{=wRWohD#o^^;LDV{-H=cSmeg<&FHp^yD9KZ+ zz`Gyy+Ob?;Yv9S9+C11=E|w4+%MqMvFP9fVU9;V$csTUR)XDdg6^c41#_+5_)tu-V zsiC)wB0b81YR)xD7_lrjL}hKu4-6o;x~A58^4{kd1!4&ZstuY~Hg9jsK%y~-u14uE zA?s8(A?*s+I^;Fvf0>JJcwl9?F^aOzqO@=809Y7ysY=|eoam^i*ceDm7o_^$;R zWz52a@BRCN*A4D0duEQBXLSyxn`;kZ*pEFPfZkr7_(;Oj(IN>u`)B}Rko{>xPeNI5 zc3^u)69R?E$PI2%1o zI8rgTds8nl5X*(rKs31+e6YLn_>HJ?EKVshxSDeYNSlf;^6bA=b0XuQ1tM?7v(5n) z2ARK;y_nhYV$DUs!XS^?E?0GlZnhGL&!?ch(I%vH4-aT+xiHYm0Kwj<5w421&bMT5 zx#nw?#HkK_)rWJKHZ?Vv0B3a!eVNAT0cbRlBNq-$7&>8y!PmyBIn+1`C|hjXY*vrG zLhOzMbYo4Hn%rD#?XOO6%TPXWOy7HVT5`8hJk>nhW|r6rwow}Dd>X?^+C_C@q@v86 z5PP}wIM$s!z-|h0D#FTT+|bS`uYAHtO!1l!b<1iQA3kD0PEet1ds3|vO9BEJdtn5s z95SbE>l38PD-@bF*k=eo8YmhOsksZ-I z;7QFq9rER%(k3j>Ae2$4=4&L;zHe5%Xi$Rs6fQZ%ad~nXK2{C1wr6r+-LIyMO4ki* zVExR|buL0PpM5RGq~pqXULZ>g2O|EF2OFZPawLTiZciARU=_%$-o>PeFdQrfD(1W+ zPpKJ$$_y&zd?Svso1(Jh3Tw`+`^0;euGu*dQ`1Xsvw<{y5Eh@mo%f|$*xFlx{CAr* z@7c)Tig&h3EO$mf^LW!Ykdv6ipK^FXHpaA<=HI$i^|fr}bw~@!qnnzRJz#)y?wZ^_ zCOHv_4SVr@lE6|oL^96!5+<{jHi-$u3HnPqB0#Ke6~Igw1UJw!szkkVcDEd1$KZLiCV9@kC}6rF%#Jvmo!tcP=ul>mzMo^f(6^1neC z0LOZ_pAKg|17bZ2aI9Ahj`bd)PCWy~dgCq*Xu2EoH3)XLEz^D$+?{BgBi3v=2>8cJdRYvf>N78N{SRVU%s(OuW-*RUoZiv3zepZ_sBu44{(=C` z)wU@bsFX37+DUp9DV(n-evur4QS@&6aC!&$p2yvnNhyU2L5-Xj{ZH?ep)l2)*>dS~ zD;I!VT zK9hU^%Ji%_Po_Ybo|VL0s&p|p)7t?uy*_MuJ-jF4+!Mt9<;+&ki0Lm~X0O&q-#E|7 z?FzPx9x(h6^njJ4U%1@=-9V4|myY-UFwpzwh14GpdcSm{@wN}g}cWkGat)%U#N|4P#CWKy};=YvBnX|78ajHy#`Ed2DhFW2q-_j6NKAo z*hy_kt*G+&+Tums-en6V0nJR#9UcpwG_B~y26m3lM&8R#H(t=P-T`GP&4{@qWI(Pa zqOxWFhtGZ*%x*D_N4h?2{s;?XzE6*zN%F)6yRH+b~!1nyr|O z(oDbq@yK0%V@P?(lC>^Lut-iIM(@p+m^WRNfNifLIb<+a=R#M5YGVel?Pb^}t2b0! z1Gc@QTfVV1u}j1*82q`ISkxu2wT7Q>E7t2-P|_De$%Rqge)+ypiI{+FnUMZ7c|1PP zgJ4djm+pv+$icBN$s}UP2fzg9F~NHM6SkM4gIkvvkhOXG;mpx-r7DWor&JKl2UhQ6 zQuUnNL`QvGjS?bkU{7su?{GTE;!?jhl~q)hG7A3uF-vt=XZzikWvPb`#sVd+4h;jI zeyoecV6ep0MX9rAGsd~=5me`X>N(rWOL{?x`U>Ak{Yr@SS(YRbQ^m%`qY&sPo9pi$ksj-&zMYbx}2&5htl1J^}2U-N!bJpXEwX=1; zGi+{ADvGp1ni~H!54r79IkmWC1k0%!DE9I69yI9^B6|16#l%`XtEE zJcdhpZ1Egcu=j?`L=0z8VS;s}rinX>9fM#T?{*e#=NB}!wYLy5uZb#X9uD2%0>tX77?se9@wu52 zwz=lQk{fO~tQjxvAT+khkaB7A!T0nt>B&WjR0R4(k>xxjkwSOT@qCwkbo+Xas$8YJ zhkk>lN%)Ea@_xUi0KKO`?}G);(^&dS^oGFPrcGEq$45~q8cSpv?vV-_r1*X1+_G}~ z$?#k8Lxe+nFIu`)8hB89Sy9YRPz*jw!!=t^Wj|HLaVQ( z4hr>5o1--`43bf4@AKi=mcpJ2**@XBb%st{L3sA>-3#%wJi-(A06xFoQ(AZ13U0QLTW}P@v|H)VKx6v|(a(2&Q zUyKWq*wqlleGryocw9HC==LTt6+=F{R+*97l);TlZu+)vmnFyW?$&BoRxY4mxbQqJ z#AaPysvOmsKuz^IzI(rD4WwX@ma`uK6b$Krg25mcLn3`dr3WzX<&L=1Zn5+Vgz{nZ zpSmn>FUKU#9~V7#N@x<7agpC&VpXJc3mFcI-m|~}%T`-G zZvC%Zx;x;^*SQZ0Crfb`YW8j4)?Z|F-?X#D!LCW&R`u<#7<_T^$%YwWq7=Tifv9pH z)Xp+sx7uAd*XXb^`^c>dZrJi|{SsAP{jioRhh$48=A0PeDuPAtBeC(j5jt@_jxXxG zpT3U{T70eLPcSOwTv>x+H1PRxF+&>^K8@7 zGEt{rzc*Vgvo~2_sqEh9CLVkKjKsC$yO*PB>icuVEPr4{j&C(%yhb6<=rO|Ek@$s;z3g1-?=H91D z{W&;2uhWX!v*|=1f$Jl^qs5+Jbv=PXbnYxdfOVeBLnh<+v5{btHFFA#kqkt*Sp?AO( zC(IXJAxL6`)v~77$Bnjc1&_ivRh_o-IWI+_0uFm@h9oOGVM8l46gUr}v?}gS^pvAN zs~C~Q3Q_xL6dL7MCm;71cfQE_U1XpUVs?49hl&+j)j>P#sf!hUz-P1j0UXT@Kw~I7 zw^A_a5Po1D5{F^1ka@hpE8D|<*NP~q_f!xkW6>+za@OPe#dN?jR^3#0h;I!|IkG!yXpy;{l=2 z7%3}pR$D~YdAj(@Na+l6VY;3eA2Yrz1D{7<8VL4=JHt435|8bt^DW>pPc0QKl zQf8i@@jg-_Y{Zve(eGj*bB1(z;^Vf}s-1OVszD3)<=r`?I{ah=vqAh|A9tqBtY0HJ zP|mU*@8q1K-BWsT&Q8a-@^rCJxO&}L<5S^GL?)J{Sp&9Yln7b6yP2RY`Y}DDYkRj|< zkkl{X;;52Zi_@Xfxu8B~d!@0}=H|lIb}x)Nq%8(t@h9=1cTTpG5+!;!lMROe3wtBi z(n8;wSrFgHl+E_oZP1~fKH>TbjB(m6A-4cyoFRoePKj#F&0i($dDT%u3>iIVRL$Wr z!!=eiu(CkSED?7(nNa(NM4oF5eMlAt#yA64XJW1Qb{ljf%IV4dO|>+KLCg z#yBNcNF|J@=s)H@+gXg2d_n!{x(LYivV#s|5sD}uB|AjZZ|9tDO5fyq*-j&xA9+%r zo+{n4eptp4TgtI2+%k2V(|)EvHiAcsMCjJR|xQ(;xX;+D$Au?JxHPeiDPuzV$ZFJ|fZ@xVdkZ(^SlB{pWIPIC~!_ULH z+6Za4XF+mxnpQ5<76F)9>5dNHHtd|rr;87iAE&U=5b$T}!jGvDWLJ?`2hpl9=2l?ZYAZ- z1Z|2b+L~rY#3Oq<*zmZdH^w00-dej#7FuCc-KXO$4VF9OBVi0*;Rg8XIx&dcAaYY; z#g+N?xj)qmnn!i0EUi2+XWL3p-oIkgl1R-);tpqe^}c<+v-P7z#c93^%OFn^thS59 zd$a=ioa!Ko){k6lw|Z_b4ORqG-3slu2>LV#uPC!dfReg4T9iD3j@E4%S z9u2txdUZFmmoKd&?uAde#&rmIjn7gtoL&rT~AvAb^@As3Y}^Gcm&9;IuD2#*Z8oka2O z6qfZ;UwQKEP&WhLz8=pG%CMUmayWgI4^FZRhgwDV#PCi%8K_bn z<_BYCI0o;B^VP>Cs47kv<&tP~?yIu6e>(d4?I@4+ zmyR=jGslS6F#r-3kUJV{nk z=2pqPK*=Ldtp{zFO?10)T95@+>gq13SmU5wy*OZ3Z@ZDf_2|g9q57(m&iBi)_ulZ< zt$$k=zFv8^ar;a^QhPM<7}(Vdq7ni%et_xzApaFx^U|s)&+WmcV+3UCu@)?p+EyCmg=lW8K=3N zb;BGpPk2nlbnm+bd5>t+BdmPtd&rZAom{#$8Mw7s3!arg1t-nBdfLv4x;GHo z`%B)G@!0uI7}2kWd$}Pd$qV?zo&?#Ok8oLzeX9Ln_m0d^{JB10U8uORE*PkG-eu+y zFeZBUw0MZ>UI+?JqsLT}6i2;msu*2mN?xMOMO=nOnP8d91Psv|LE+uNP-2Xl4j1<0 zSM9qBSs$aW&{C$ts;Z%6~paKci7W;jn1+wERu zkQOjbBu$syCukf;vyTdBrpd{o0hP1(C&kj$q!=QQ6j539KBo|Vc#2~8;*Rm23cYrR zC#w{yA|9-CSTzp?RphMG@zmL9)O+;MzMV>bP<3!L4$i0xg_}8WpC} zn)rk!C~sGR7S5E?L>z$jGA=%1j{zHdmk5tWI9N74pBc=*ZVc8>jjYR$dX&Jh_0}!= zsYag%hDXA<&MOhLS&A zKWhS`gi0(t-Iu{;1!&B=IoLOg@*suNMf9Pp9$>EIg7?X>G|hJ9@)_GR zwevr;kj(>3d%W9W{i$bW^%!pp540cwhUossj5g&r>6R?XUy zL!bzC@kj8$}FIN9l@Wjn^Z&ln7tOvYlad)+hc-#@Nvpk3)}%Z9?#?Z{;lO?W7u!G1Z&Ph1K^k;;J`4u1l>}z5Pc0;#H*`_;!Ko(gk0t z1ayQ}udMfR53R_n9PIpWP~z9`>tFTcY%~0n`RK2e1Ng@=-?f7L|7Fbg?`x|6_EJvz zYXvv{Vax}Po!) z)74pewQ-d%{14{4I@JHn?EPObAJDV+=--$RNbUWrXYb#bkH=3D<~#Fo1I%Z%P5ths z>}X*jyNl}dna=(nYMjWA>|cN-^Sg+^V7ndBKnqyj1+=2_EH}#_#$p z^SRaQRnF(MQ*?5}?+Ru--5yh;W=-+{EqmVlkE_Hvc1ytq)#~!S5xC7cfbRm`ci)9q zRn1M`eHWrGeHReljA$Eg1wGi^8ez1U=@oPx`1nD<1RlaH`5eO_sxcz&F)bf1w2MZF z`UCybAoZKax8~H@@WQ%vbje6P5ke~o$2z=wrjqa25d&6xMY;d7+T;EU^o0P>_nr`S z{QgJAq$}v_b3rR_cR(&VQuq#ib%5`}59m{A{);|~;9vAvXpiOKwY5B_Jm3=1!WVG) zzw-IF^Uqgu_m`(o0MM6oZ)*HI^!eSNPz74{L~b~C#j^Hh`nR@m+<;L9pzrMDuU31r zS@%jVt@c37>i$uJ7*fr_#2ay&OXZM1q3?kx-!o#H_oVj67Julo+?i@Q9|f%TPywqw zK%b@JyFSa6)n3=P5x=9Izdlxs5o{)c9wBgUr*vip%3e(wDXrR6Uo8X8u z_VoEpR{?{Q?CB9boZV^j2_w$nXLZ=_Z`+1tWUArmiJZlU(<7@(G-Ixu_Bw9Ha7ZnM ztD^mI+H0o2blPh=o|gE-X|Gyx=R=b3TgqFav_vBPJP=N_k=6I1@mEfJl2=Z9Zh$}w z;It>!066VknlAj|w8wtww3qzvPJ1htrVHH)l-^#{-b{Cu@6Wz2h$8ppa*ZJ(MJ;^2Ni{CsGsK%&bE4@|R9~ysh7cX4ug#o%RGB!Ht;(b%4{J zPPRdkQt6G-&y?G;HwLSG12xAh&Jsm(?yfsY=FE>H2N2aeq6Q3NrL@_}{E^%Hxb`on zz0~QyIPGNtPJ5i_?Dzyv3A?yWT%euBf?|>P3c{g!wL5^ zItk*uBsQ*k_9Upx?++x`^O_K(_mDg~aQ;lrZOZXPrG+;C29GVvZXDEkR2W@sy<7Kb?FLTlewllyrrcQ) znv(aY>aw@=7xQm>L1CGPPOgz+LfHbF_D}3UR&jIeOGBSSWHBR_q!QWQ&vvrz6L z5cQ(}*7nlYin*I(x4;~b(@8I=PT$^L9%`Fq;~78PYvY;TsnYqZ?CY}^AhS_D6T?EO?8aHY{wbjPG} zaEf+&Jw9`(@M!Dm1snB4lvK87q*S(w2)(xj?DB(IJnCE&G4^l@W+$t$3m!s~Zp~zx z<$=RU=H&?zw9=_XY{T&`neW`d$)E}wEFT9jUsP7L7IfM`4H0|e>+-^$rxq!7An|wR z8(rh>_w>q)imHyDve3)WP~2S^w2-@5Q#Q4exwJ_`Wy@zNhCNK3zSMKNM5!rmQInpNB*NWG6cSm@ndz`OGk@`IBDftc`341IjG^ zrz>$1(2X`}{>qs<(ei<3xgV@1B)(>EmAy?0K$Z2&>^C(ii`Pia><@NgkK|)npJh6! z2zWuz2QUB4?EYgSt$!KqnOS=btFRT`RWn-^P5`3U2)4nD1w|xWA40z*jlCU&!-aJy))H?kb0O zNqASdc)9VTh!gw+2f8~S#^ zTB^W&5`Kyw==^BD_9ND2z73U9)O~9AFN&zqXUpyL*`aUj&TOeZwHP(jAl0568(8m! zKrURqonEXhL<2^9PE+}&Gkb!*Ynv_yozsH*VoW_X@3`c8=o_rh7B&ahdTjxxz4(*T z2IJQyf+ZYo=~DpV!eu zPfvr7M4Znn9XnNJMhhKA+4Se|r>!Pk2;;N^_!MizPZxDJX$EoL+r_H=!Vu`hdm^6`OnG0U7VS0U#TB zo1*0C`I{J4Ar^;$X9e1l+bH#khZ(}ma$Z@t=0W;hM2&pk`}bNt&txp;?q2rqJzaI6 zr>)wLKr^w4-pd|aZ3z_Pp8A}>Y&2RqCopz7JOi$bL1`N+kgRsMwq(c=UZg6q)cmM zHDJ=a2sKNS6dC=2Z)xBk^Fz5Je!QiSqmwI$ANp0ar#AUq+{Z*!%YGKQtBCWcZS$gxA z#+*0eZasa=IiqlwetMa#r^6M;_)WoK8i4>}q~}`VIZXlQ#_erZN3+)5&4IPs=sh*F4Wx3b-13s3IE=DTa)-A!G)lxcbT9C3qalL(M$ zxif3bCl8L=ztG()TRPjRlYe+G%{Is^04cs_zhr1Jl2feP-Xe>Q9FfrF z?L5Ocjz-00Y@d*CorpoWXS9HgW=Q7vK+Jvo!Bgw2Vom~i#n7u_&VYX}=G4rQO>`W= zIi+_#r7_HeeXhIFejHtevkpVXXp?YI$$LZG4k+fdj)DG1F(>99#hh*Q&jWV+OV?Eq zp{t7e2UG(`w=22U|0w26sxFn=@C7tlJ{IxCG?5T~tVTI3VdjX>v)DBbTe#F{iMTnv zabz{V^Nu(5PHt<5fJuxz4&8~z!ZZ6|Fu;4LaZIUV$)-eqIICyg4`?&fNcJ$zJSWhi z^)}c@aqL4&SP>R{!BGMfbMoO3{-v06{hkdwSMgT2s?7OhZ=32nFnUR~k#9xpj+3jD zWQo*mX%u;}E-g1aJ@cuP6lt_2! zSmu`G^$4d81bt|up9rYthW1Jg{a-k|s6mqz*^RNUVZED|#bznUo**N|M3lKVmx0sJ zTGZ9lukh~u9t)O!?5t~F;+t2Rv>j+i#qNxcGx^l*bt2+qcU)8YOE$zK9+wOa`1(w* z5HWmOjd|wT_M$tS_#;pqNiZ|ud-R5nb>se9$;Pb*qTyKhuAr{I(4$XP6+G`t?kmnB zP5A2BspA)#Mf25+)Ly-S!Oh?U_|r~0_!AZZ0d_`n_~E=8d-)16J+|l^)vcF^`=guZ z=J#bJ7?P#(N$;S7p4dMO)_HBpU`Z9viKxt-H$8;dYU5`;BO;G6aS!nk}t zxt3Vnvk;i7;=&goO?O|J1Z0xF;1y5psXMgQ*k;G|4tNUKFJFJj9tvE+cYdtRC{M47 zbcppeZ_ldzEVhFK8?stt=^9VoziTE*fm_bpB_3})H@gx+daaQAI%LX*d_@_F2cl4VJUHQOfE|iI|>SB`d6ECSk^|8 z&Qg^W(G*#HGa!whXhP~0%|s^f*ZC5++(`v4RA?#`@2>j zg`dOcSthA&daSyUFv0EI3T54O_ncX{{VMAYQM8I;x)hTlUC0G7Y>!&4+WEFizYw-1 z<+p7Ef!?N!kH}9a7%V{@Ri-huptu0JMmnu-#<$C5)qoC5P5W(?r&KYkwMw7xu_#A{ z$h(ZK0MqoakE^xVVhGYXbNXmc#6C=IwYG#+7 zCVVsNW`27}b&h&Q-ZxcYSylS28;i^eOJx3z5!_0CO6`WVwJk_S{)&B3d>H3-?Bv3= zF2_g#T<-cR3*3hqB2EG928>mW@I{c+&z(A&2ju70epXYI>HUh`@km3r`qk36gm_yI zb6S@TEOjuX6}nG+vu%jfOIb6F8jvDN*}CXX@*5*vv2c_w5Kmvjs7uBz*JHB+Vk}kb z-Er;T?$zKsL7j$mn#%=w+UMj7D=gXMtO6t{Sj{Lvu3kbswV!L=d?0OrllTO`k|bdP z<4H$+i(le(i(YMfymTV}Ku26t;T1>@5Eapp-kr95ufYJu@G9*}yDr})L(t8K$W zNzDIn*gios8yLpT*z~;pL6#_)fOdM%%;eNb>?^Zyz+piy1Oi%C*8Da<@dbwf7*pA)o z6Rruk-1dWDy!a0)Uq&OvwD~nBy3HHecB=K#l2O@F?G-VY(rdmb+6C8EA*^##ve?nX z$okDcxsl&E9EU^CKvccCsIH_E@TC_2L={y|A17Ef`oVH}=SjSI&V0-|75AATEaAHs zixA0}(X}(p{EmQ8R}eebDl+KS*tClfHLRUomXD;tAkjM)&64KN)WMfxEFmJ_#aN!T zQP4Oj)%O(NOfrHM3g+avRBZe#j}0K$a5HuXX_P^e}9y9-Z)@t z_rb@Fo?`y^7r}P}tVrH9pX9@4Pvn~gkC_YzLbMb3SS>zGVk^7zgJ`BdrTD&RA1}=o zSTVrRW?AtK$=b(5KSbIcX8h)jf`tVt;qx~Mc9I>tZ?P}wt9RH$bWu+60ii;SA_QTE z|Ec&bJBqoWIlLprm&n_EOhC0Jlii>zH2USyOPWN$H2vta7~+iQ+gW(EsIO1pr>W4z zNo!*k5l4|pxJ}_}aPCw}&<&;fPaz_DO`(;?J@)&=G93N60D_u>95wejXgU973~G}U zLH`i{el8!r4uqad-R^|-hVRYvHaOg&lj@hn@w+V!toj6@%SoJLv%*0PNC&FF4b#6)+If15LiBSrTW9es)Bt^$U#SzRhW zc4v*ss|!X5nl-BM16~1MDeitUY=5ga0YQkLmscfn*eTj>WZsW?jdtss>8^N+v_@V| z;%6gM61vNJ%}E0ia$44R4|jllG#fm8doYvli_#N6dU8n`T7KK$f#VAaSjIw1m4;#T zFvY(zSg@j(c-5$RbIb6h@0XP!A#GU76|Y%KYKh3CjJCEjKbeKCN1G{2ChK=^v98V~ z2%+h8>!C+Q;69YP=(~67V_eS)c&8gai<|J_)7LkAhQHOD>HP81I~{MJ-8JqewIi1y z>Bw>{1M{uCBjLg1SYD0UC9LgN1Q+fIKZm(%1^EAQFn6s8{(l+F{rh6+zr9owdabC% zKMdxe*9uzvm%$wLT2YIC9L)VJJ^i=A9ONqH_A4;=BP9pf>lMtkG_ACBU&7o{(S^TH5rV3d^BAQm`_9dj_m0YEP8F_yz+CYq%=uLJ z25`(2F|BNMw8bGz2G%^)q2FC*`)Hvp_X@+d4&+jaaQa;LJIpQFC~`oB;tgxepwiv9 z@4;@gDudGtTSdN}<=E>K`Wq?Lm=PP+2)vyt&m;^mzL%MbJxniG$=mrL{#-cN%O)p@ z(mOxx1oa(!;VY$i11IINHw0b=sHy2$*o9DSQEC)-f9H{D841r&r7#!{%N7qz(Ws=_@Ap;ej@TQe@U^@~ z>!>eiYrcgH1VcI5&H9&;o2|rKoz&7cLOi7#j0<+}5;^q;a}Fr;!$n?bCYMS)UQwVf z0IU@ZBw*%ZY;i~`b=H|GYo23O_k@;DeegY^==NN)=VN)%DUZvXLsOkYY$SM6@9*vA zBoQ3V^J22rw&i}qU{~rJ=r@x`^`}M+(qn2e*}AeyHO0dGqqN5=%E;mN#1AquNaL8E z#B0~JtSPs)nb5FplV;;4;ikP%ecf06Y+KJk++sWv!VEOv4IUTK&+V?B%21n)ekdzx z{Jrq$?(KgYg^;mOOU;%&!gJOMI@%uaV7+(1Z8&)Q0geRvHM-Z9=NTQ(X3+3 zQ|Hq&r5yw#wfms&Ku$7b_uzLV>T;f%h2q262rI(LlGlC-4dpt4g}m6)cz8!Lw8S~D zBnLc$!t}U6ZEI(!5GPO-X2*XUHq#iX+><>AV7uGdBaPMP0++pa&c_?9yRV;A=ZUs! zUw~&&*^O#*!!+~BCFmGq);E;9(Wldf;6t>$ZWo)U@?)y#z8k#~)@-rY2ZS|KGwy|k zp=+PRZ=&7J-yG9(tP`~3Rr9!dN{PLLg!2Jix3G0;SW{&N>nSCZYai?71Ab36=vwAUF zM!e~Db6HbgBh^mzi?n1M*@5k{b_+iH@rt{NPC=L>KJqr(hV}V4O^)sgu|`lP-9ihS z>COheOOzuznL(C&^CVa`@e1X*9}RDQM>&`z2Tru|RGQx5uPxG%dRwq6PM!mJQ}>Ij z&oQ2{6z}jLRSskc8J;(5`t>K{Tr^w$tM!f}D_Ud!eN572C1wK->|m!+`U0;}Rzyq3 z#|744dOTy7RtLTvasUNLxOeC<6|f5J8^0Pj#58}zzstXu3#q}3AKE?XfkAz0N36_Hj+-}%>rK)qCf*y65?nF7PR)gZL7| zqPov6FVoYqM1IR&+%IO!HfhYVz_-doeb4NJDbZ%J0nv^r4%9QBwJ`rG+x5N-)Ng+YfFeQj41Fk?#ERE#%sT%w2 zYMS&ka_y}Jj(CUbJps-+Ga@87L7nnAY`@wiKKx5b&AKGMG@K?&0+eKIKg2pD-z5CUj+%KLVIX{iGdaK{!|X&jh8ok8Gb3SD+k_t79_1>K94fUCv45JAI2L(^DWGWlIq1EQVHu4;Cng~x zdHV`uqm&wUN78sj@5Y@^iK7&B*4(kVBq`KkO0rLF7s#N`A2pKi_*c2HFQS1yNB2e@ zZ|h^e*6leZu)RTcyR|k6gsWC=hjZ)Yz0bwNn>oInI#Wcqw_=dzlNvhmTHBReosjMB z8mHrSj$LFu1l;)4P!sQ)wQuioxgvOVvF`ERDeeH=`05@Sc@`vm5@9)gwZUjX`%_$m zUMougWq^Qa=%7$sdIm-iErb@3=7vHUKn#qGP_WA7qJqoJLK`qmQo3BL(_HQ0!v$ad zffJXN75E8k{lO_(Rt9FK-}gx2Qp-pReBTB(a7p#8tjsN$sj0Qiv@AiEX2u$(8Xzq* z6KZW88y#aaa|2U7YI6%SJqryJ6JVRl1h8f@rq>06l?|8)32TT=e=@WBjBAUY;GDE(h%9n3%n zqJe;+^uKHTf6J_2D>MRzFoGC?A^v67fy4#~N(+Vlu0j93lYXsG2^}Ln2m)aQ(Cg1j zosIztqNk&Q(*3US|1Fb#t*8iamV;=4A%g!h>vRwZh>;Qa%kLWY-#YCK*9wy`GJqKA z!2dSuj5NT_4+^FGfB6Q_^s_7dZ)0ZQ&i8BWjaLuXD<1w);R-w|ftOyQ@(-Mb{=jMI z51hW5vH#43ULEs)!ZU<{9(cU{f;VBe=>inF_LL0G_+i^v4AwU(lL}r0D~Wws+=^Tu zVlPKU*y)2zGc`ecGDKbl@=uJW&u^jV_%GhqV@LE!Hdb^ypOkc@bw|}QlwxyMoW96e zR7<`%&UQE{bzkcobg{lbAs5W^nOx!wm~9zH16Kn% zE;S1|_q^;Hs`llhwfX2_F(g^U?vJVJzThzbgbdwL)!1-?sbdSN*tHQEK@#CgA7d#K z>k~BTta9wrrapB$(du2AGC@yWAK2W7GD9@=y#%!9P0o(zF7H*4Dm*k2*;%x`+jf+{ zaI|GLvb`9%!NZE8_qj>_JY$nKx2bCL!+PkuG`GWk7;M6kI6F;Lef`lBTK8dz;}Hy1 zcL_WKX*fBJ7Y=jGc@JPl_3`T;cG=GzxguetzFZ&INqMA!MvP{IxM(=QIR^0~e^f(h z`Z*}5nk9UzPrd&p&mP*1CL=J0D#uuRHL=1wkNwlbn|{fQsQf$xX2Ak*C?QV`YF{W) z`6F>q#$+TNJ{Ho~ZCT|}H|aFePH(akyPJwOfJ{*g`DO#(yc=0+J2mr8L1aWx z+@SG27TOtebrld-h=V?{g7@BgjrLKUT)i2#rPogfX7HfO|IX)8st>|C z0;8RDF;z*leDC@viu>O7Qf?f!g$qnArZ<<)T2QPj&6ww@!m#?#aI*$QQftnaUUB~s zn()KSVLIsy6Sb!pGjDuSwxX8Q8Nh!EuA>9 zJdvZI-uukSxvVhji&gTizNhi)F#c+m{cX#Jp6gX1>;_$K%<%p*#_WD;#`c(UvJwxD zI<_fEtGA0JQ4W)#v2$}&7wq<9kQr|hQep1=EdNMU&Ti{t#xI7>*b!LVF$uPFr^m1X zAK0~H(gRCSLXP5)DfVI9rudQyBFC&WDzf~TQC}gtp?J68i;uF&=5B3I zKPsul!l4rYKeWfm!hUQ-hrkt7p<`8QdAMZ}P`S@zjv!1QRukZy%);U*@i^6%A>99w zfUrvTfN3!aO@85PY%0NW=&MQYo)myple*xVl zHp2G+TUam~uDJLS#c1<%-cw@$wK@%|)>P*XdT91JhPAA66FU7#8F>5HW{Nx{?)~aglJPK14|L z{i5`_*#Ij$^&uQ7*Tzm@a)jvqYi5FI-;a$wxuliWcr~-tg(VFqsC>>&d!j+MC9nvI zc81InG=iRBdmIerl0H8#QDM0Y(&q_&qG(W!@?*b;%W~-t>8lcaMA34ICEr>)vCtCa z_W8Zs*0;C;{G^8|Y~Uk!PI$mO=*Q%Rkof)NnlPsY+ z$M0GAA^UAUaKz-;F}CA3n!KIZ7f&k6~B^M<%gcgfMui=UDQpPV|F zU%HWay+ip{XiWbSD^Hr_06wa-&|0Q%bKn~;!q$fLb~xZ?56svmv*MguuNpWsM(RDX zpAare(3z|sk4Y#Glf$^AFVE0|Jx`jhx|(i7%R@gcwq7AZ!~Pio2gIkeW&xb&ye1R% ztCTF-t~6PDY;jyqYDLyw$Hol_?h1|`LLf~XVxL2o#Te$FZ&RNLSR((F4jHZ$X=h-d z1?Ujy@&A*P7=ZN@10&@3(c#~_cDh!*Ae5E{1Q0O*$8?M!CI*^IIHsWkF)}dx4q(tU zGcy8dm}=>pSx^Chtak;--+x!rv;yc+N6Xs6z{>uAg+hjFMFJp z1Ptx3b5BRh1Y!UKHJZPHkALsnGyUwd_}j3N;Yz>e64(BJ3=XfJx|fj1a0Qx|8$YUK z8Ge8yaHstak_SI#Z@-e2mAIf z_bU1?oW8Ett*x%R%c&)g1jMtvfyq4`{uF%*x1Ua__l`D&T#0_Jm zQ>FeyCyffpCd%|nve&2^!pWa_>^`Sda(WzpbKijG^h0naTq<^~2~KkTYmsTfaAby7 z@AsR`JFma5_M9l4`jDbrKEkJchV2>((=MNK9bKf;##+k0H zK#U^`Desu)C`7=HyxSA<_3Yc7fu*$vtJ4>Fj^j49!Dh%96F2m_iG=Z#p2cQpRorB@ z`I0Pc=k|C7Nq>b{r3cB*1Xgf_GmXpSLOKK%&RQYs+(Q3F-ED|=F)tT6Y-t7VV8uUlK*uYqTDi@gU%x;A< zVhm`6dMWB2nQD@+%!Izauf{u!iUA8`AKd=3`+AOjeaPKPA_xp`(G%a@R+F;UVjY=T|pM|@zvEIx+KgHC<6Y^3zn1RY5#*Dh|)T=+3A{5OxW;K{7V%l)Fwc2;=f z_!fR#TQ6ag-l7VdlKa`y={&tqxm`1+Hd9YLSLXIL)T3kbgWuhn+(xS9Rvqib8Pu;%AOXg(slip6`d&j%TiHf&=>v8%wW;P^z zT_fsa6;|U02OHh?qx!C@Ja|d5nJ3Hce&R%AcQl-5Y}gMN+Si8PmwqebV30ecm54yv zAA26~p))F7Ys6faaEuncJ8!^?RC^qyoi0RCHzO-liL{g}6y5)eFB+CYtdLr)5X`gE zHj>u6D$97S8T-W&Af3fpbXq=N@@Dz>joF*w z8E~=%0#W>XgaQRtVjiC9H^oyayvC+m?dNr|#q24zd&YEvm&BF!Bh8}Hla6qys?Mh+vzhD^Vi)(p3W`P(A zf1Q}pj~`ink$(9OQ(MdCx@#HkK!CS5bous%Vq_Bx$m)`}0wv%vFJDBR)><~-HJ;UE zK(D36wnEfeMvdWhVMVAa%+exFP}`@;8e7_@>4mZ2g~39l*u}q&q;yj?9$jbx%dh0i zx_TmffhygEc#Bv8y~IKEkbFa;uecql_SjB4O*&C{qfMPPxwbrB6Fip9ns&^N-9c63 zJ#!5$ndQ{Rvr1nwIQ3dKbl|N?U%oZz7<7@{Hnp3q2IPT~@5ME|;2lxWbtBbLzpP#y z32^n>x6`b{_PfS--JcYv87}-94_B*tQ0F^vQ?Jm}--eoXedX&j8H@FgKZQreYek;_ z1&@EOqkbnmUV9zIc&!RO2FPVp{omJ73}AW?J+O}Y$1S74jMoYqK!Bt&9V63Uxfudw z1k#JNzXc_)Kl9g$5&&k@AbLgs4F3WQU>XJxAb{Hw3<|H2P&l>hC_5oj{&Haytp zP`Vz-rcHP``nwWW?a$gCk1cgs5cZc6b>7wR1-CnQElkdT$qvmWJo_ML?knr}XkC8# zm7?;+#xzIr#Ys`sMd|C|Xn=-J(sLtnO`lYmTv znhvraRUs48+ni`>v(_6_RST{b1ZzJfw1z5_w{?%s)ZkSW`J_4=WVXR)-H^d`FM{XJ z&FdIeNv59}N$iWxA1sYtCrudcsA@OWb@;NrV(coy-Y%CgY3hyFQwl4@Le#))bhEgu znNLaM#$h-a#l57eT>O@tj5#4TmQnEn*}LTFhlL6#prC@`B=Z`1(}r(wkyPD@FES=n zWZ=JB8{D0K<%oknN3P@L=h_5)?;Iga8ZLue%Eu@YNAf`FYi$z)#o3~WLnG+!x+h|7 z!cBI=_U2&EFx!@<@}1MO=7q0pVIMv7UE6FY+Mv&RUS2fVE?KVx+78jP1)dUVP%>p# zBRW!f4QUqWn2`qx4_3%#!QA30Wj{XWS2~O<3^+{cF+{@c4#Za!o zNDZ=4YRD8JOcE14P)O%fuE8(nqrji%wnS5){I+ELAcZPe*YtEvLwqgd4wy7sK%8q$ z9MPd+qGWU~Fvc>-V~~(7BG=1Xr-{7uEU>$h>gM3G;|E?61^!`K`2~fCy!a9vy_3u4 zY%Qo0xA^y{8J2mXF7FufC(1tePTpzfUy_ zodPRTXBNkr4a>2Zwl6j7v<}C`uY>m%Rz236J&O*SolN$7jj9L*i?`jvw|wNpLLX$O zyr?&9EwVdlto(FVg;{UI70^{ne5i^-YUP^FViJ=1OSMf zz9ow+ggM0Z!gDD=S95rA(sn}8VBWdj{FLfh=^^*pXL}ZNfga?cRyQK#Yz~L>hl~0Q zkVpDjuJ))@4Gt z+d>*cacu+!)d7cnyDY?=MtdG~Y=>CnohwBKh#eniEn6iB7k{>T6C82&Z2(z`k4*0mezg3X6qnJA51OdM+(7B zV~_YRBJMGsv!H1;2}hREBq=1>??ldKqJK0D+Iv{xPbR@F(!42sr2eWEJFCD=8}>r0 z?XiSD%1Y;S2m374hAs>j-L|1$`Yhrrrsy2oSIjAIWNio3b3pb|KQWs5UZe*nLCJyP zi*-~ou@x*xbw%6bw2x#v`bwDdjGu$Y;)eSOS#{Ga65o<;B)QlvlDife!XRghvC_Cd zjkYW9#{5iY`pGDMZx01Y7{kmO8FATG1*0fSdxsTU0$~9?e7hIiEHLs^Kt0ISb$f71 zv3z>8$g-ec*$8|umvTvc693*Lx+g1%R1_%qV}yz(%j*Eym=PPo-O+Bhg<(l~1h1np zZOcNYi5n%K@#cnEo0kRCMH4Fr^b5gUpBaTSQQ|?cUicZ-!r9?=`KqmuDUpHq=nr;65bgQ^RzQ|)Myy5Dp}G#w4yjmA*PouxNal4TWZP zs{}|WiZD{&&l=OrJiyJO;R_~)9*EY#4V8fL?$(oANtMm|Alf*gz>`W@2jZ)!-m6u8s;%wE1dC zWBxh2|AJrWugRwZeVCJc$hGToeIlBp`lT~R=_ZCL&n@-E;GFUt-l)9KzN?=mbm1JW zylJ7!6sE5b72!(5<8TST@$+9uCer42RuX;h6v6GWA1}`@d|Ea$`u25y^i_A$3Y-}` zM?MC_GadpS%cJ+lUrq6LN!wy8WIwms6Tc6xn{rk@+t~=S{C0kj+&x_sptjiu(;FKR zjDySpN+fF2E3DqDsxzG2(_xxYZS%7aUwK`!>MiT&GW!&C(r-|BI)sW*lyK4(BA_?? zuBerpDW+67>`os3gkq=@+&5pY5yf%RcHk4@m<#>BGHwD*Us7idM9 zZmT_wRrYwNc;ijrNjwx^I7!K$ZQibO%Kco3Qc1PC%lBQiDPZ321DLm?R9zf0-U8G` z>6Zu)s}~R59_9ox1nC(NYM#k@_IKXGEwuL>{%0AbqiVO?ULG zN@Y_(Opz;NhlU)fs;SL@ZPxHo#U`KXaHF>y{v%Sk;9HsfOlpumh1-HRQkHR<>2YOd zmEOSLp>;c8+IlfX@2C8U=BUCBP#$$ntC}n-=R$2k_a}KpLQ4c|sS-BnPnN@KVRx8G z_4wVV#^MlSglAx|!9roA)+nqVUkg3xHpWg7hB$k*^Qxqfv2%8C)wo z^Ir09Jvv?Rd+@JoO=8(69RIsxH+sRCJT-)8+lKxAVhs^wIZ zk@YxtfHWQIGm8EZz7Nmg4_jj44J`xAk9@xjB3QxQnCL9SCu%DFq7+w1qD8%VCj-H5 zQf`1+va$mgmhp*=Dj60r`w$7|m>@CSEUx+C`S#}=|G9*HWclG^l#pkPqY-LHH^)Tv zQ-?=C&QRR)y2V)2P%b`!cM&p7@n!F|v3~*tapxNcFkUhqiI}?X&TLH}VwbgfRT^8($xk_Q&xzrP_$h(L#jXk0tNoVC~?4a6-BH!f`pmiPtR+)_#P=riV^kg+0af7Z$~bF>;mrAoM0(n(5IHfl`speqrdYQe4f&i(Da{QhG-G+&9iktVB zuAuIzv96%R*VqI?yZnPRg+btb7E1}mDFw!=mzR?`ctnY z5(>`6qQqmB=+SD1YU*^P6hV8!Q3!6afe3WnHAb2zHo%@SK}f{2AdWo^9ATzC4fDG#sA?0ayX{Sf0-I&_H=Z-KLWfxq5FVo!Bzd z!Q{AvXV`rASl?>UV;@pNyRbTO7+!0#i9rLA_v?)xeVc{3lt(pqbdw&H#BV=h;~7h? zard`7&QGU~eu}tE*NXCALLUPi&=L8U<=Wh;Pof|TCoj!CNPKw zXbk(yU@sGUj9|v!lGwZcXs;E$pl6^5Qg@gAkbf3D(?g*kFzs)-sDJNi4*4nM{Bl(5 z68IRvKp*H|rv4K6AV6#Q|BGo%2+g%(8?;PxAbMbEf8|@CycYy?iT;-1{?@st`{`%# zxA860RT}mea=KTK*eiDZQP_HQ>%H3ZgLtpf&%mDVr|Z?mIzvi7 z_*PuR_=WF>Kls-9JKyRnzxlzpAu2tTFHor_!%&eqdBT-9UFi2VzI-7OlxF=_jk42p zY!B*t?=Be!49%8rZW?5g$QOS%$Y*Pc{0N3Qm$yi^%|QGWc^;n@1Hv+2vMsS}M8vM{)5bZiUG zEkZ6>V9C*GcIBJ;+xiG}ox!JJi^m_WjYMqU-EfNK*u*FiO6rc-89LBA*x^2>-AXb& zJsD%_#proGU1Aw#*i+;kV$r9wNywH@SDqa-s$9ceZgx@#B~$IIAJWj}L~v4Jl%yno zIH9*(R;1J?r~TfJ=*iojU<9M_!@l>r9u+OP$r2h>>(wzUu8}SR^@>}(_yUNDW!^A| zO%XwXp>E+4hcR^H1K}p5#WF_EgE$?fdSSv(qCP!8Q32VSpQCCCX{|ghu?`S?E;jRQ z**#SHJh4NDYn7jSlsJ!$cSqg9g*YHw=Ru*7T}dv-OiCx=#XAi;y1LIC-!O&nISCDG zs7;|kX1j?IevcQZ=h{nqr*Sl2g+I%yr{DMhFW-NH&O673_@Zsv^eJgj@M^AGDjnQ& zIZyHD%vqWIZ`|Q%Rjjc#Urf;z81bGqJ`jBFn)ZG&sGQID(_P17ZN>ohjIYv#T4WK> zNeK@eP%F0Q+m?5^9H%-ls(SDIarQhys>$<*=P21Di21|y;3pl#!k82^%{ihhM%S|>b5Jz0OK zu#I;PG0iOSa)(Y&StYK-!EnmpEJjp?30* zXF)H6hwdJDr!|xh(fD_eV;njmM2!%>jw(cck8V@!icIj{c@N5hXGa|21zXobDBvCS zwG!e~t2gkuQeATBx0sj+j|xr@EoCgckYp` z;IV_#3f-BX!U!1aQt+>ch99k8+gcF=hNRcKE}hhvDBRubMuO%nH6w3jyyO%7JbasR{a6L@mu$Z3jyYa@v$(H{P|y_{ z=L_C?>7V9vfT`aawk2R&dDy+%)WD1i`dpRJV|UZZvs~y@Ik~s3Dq#wBe~-KU%``uM z#q92j@>=RgR2z44%T~iDXi6B-_DOnQHRBlYk-(Y>78DvgBv%KJ1k(N8<=cY@KvkVca6&;m(^)JEqu-pMooTF+XmhY(4hT7zuBl*{lt>tjkM7B`hS?V}M z>jPg%SxfsM6pr?49%f%sCQn%lJK9uAlZ)UtVLO4ibd5KVO_oJ-W2e6*!pc8pMoPmB z7nJ1Z@fToVNj24duQOs8*Bq`0&Cv;0wBdReNI4)vIS|R`xEOAr4SY2E+O7J_fC!q9 zNV9l2-$27XiycU5Ue~U)<@cvuA087k|-i#r6AqpDuzNhSt z_|9D&$epdYB=-480wLg-!zYlof1AtRwdeUj}n?sMGg_ zAbMxk4aRu5So(mW`%)DG$SkS2x*zmdF(wRAn~6D%QJZOcd!>*qOUNr`8gtLI-5x#P^sMFeE!okkO!5es!RX{VGuv`hXsm=+BQvRV( z5^_xF@p-n*j((Vds{gk;0=nglKf_xH&9%b)e*)j1l=B;b@4D-L2+g(X7a3@n02LUz zzxFvY08O1xK+)kh6zu)hr5~`4x>j5RLJ!Cw0Vw;|xCVp{&_SYQ{2iag^(X#Xag9HL z@6XfxHv-@FM|-Wv1wDiwL_Q0%lWCwAxd-j|RqV{KA$f zWI29XDbJcXrOSQ&tqx&{V@=Yp z%5?41UUYhAUBdb4dh!KEa@~{mPm?Q~pLfG4BgjoRgI(S;Ne<=<`cE*)V8~EKP@X?y zPz!c>H7H0XR`IN0Xszb`8-Io-h9&Rpge05OnmO+dL%YXJqLA~q@vXsihX}rV9RBgZ zD{6MM$-RYT6jLeM2gYYOCC}KKYU5ufzqH-hO^3Omzyx_mBjRzGJo4Df!kw^;iFyqe z<&J$45!y_&JjO-fsmDg7WTWX3wIkKr#xP!@vK&45IwXoljUXD){#1GiPV)t+D1LR& z^Nfr4hjDUrG`T3q`-k@L&KaNTAsJ1h3d@+E<&zJ-;t0qVEY_CSjx)yfwjC>aWglcW z+a+W|9Q2Y8#ata_V9EGNIo2}HUg=X`cCBF|1eJSomDYxtT1Uf1>WrBl+d)!;2Q|$v z#UDj>@{HlKArVrgzGmjHcLBo@f6z@~T8qtsDK}V7f$x&JlY$adp@dL8IN{+q3G0$= za(g{Hrrcnw7=L-QMqE5B`S4+b;G1u)4irXSlClRq{#B&oV_3-#+aBt%scg-4YM$<> z92=d+wY+*phNCijQKZ<)Dcol#rs?#3;63tCx9SDIP?(AVSAwp z0VH%t=pbxO0!dCdISGWKbftIcC0Pp<+(roVvPlNSuS1ScSqc^+Yerw z|2IE4XUPpOzh#*#AHDCg37a0Z(D#mhZRr!wTxH}3@9p==w3R=2cB^q;jK+-awsmOtf&^e)z-H=IlE1@e6Kx z@cz#hI`yj6FFkLkGyizQs#lKK{I!j)yJh9G_h0?uZQn2_o_*>AZ-4KlF=u>#li#kj z&y(xC`Ru5ThUOeSYTHepoxR4ykADC9A)DX4{RekFaMRjbKXKDPXKgg!=f*%6w_;GxHDGy0%)cYpA=moK~5{i8;%u+RLDe0%f)Ti-i+75A?3TUymiEfn=fJt-SUsyOup&Yr}ZuHQ25QaZ@X=aTkjb2(Q*r} zcht9jFzMah9@R#Fx#q>^Kl{9S(y3dm^QT=e-)qK3f7|t2Yh5#T^fF&Ji;tQ4a^I{2|8JoMUYYjJzx!^!>A6$> zw(##BeSWXsFLK|`?it&9d){E#6DEJ_mQxR$^WHiizjpJg6Sh9`ZyQ}b;hxuP)Hm`^jQ^?Psok^Yb^1-}0UH|Gx32C;#E93pYtNo3dYW(IH!(vdSk19CGjr z6V80}oHPIa;zo-<_snaTjhLuk`H8;w>~kLfY}S5j|Nh#~mz%Tove!-c?uTE;dvEaD zQ|&)4d*j__?|*Fnwc89G@Y&SU4mx1_%{C0r-t5>@=HKc&hxrReYr01+x$uG~P6=1J z{z&W4>-!h{{@@}H-MshcRK&l6X!vB155-rad><;Olbd(?klSoXrRX1#dPNeA{_IsTioFFNU$FTMQC7n>aH zB%??D=D_#=w#Z%QJ+=3{GydWK!+YwPKcDg0*+%V)0| zF8u6<=WTqzU1!c%{kTuJUvB!*7aw!xx@Vue;a=anW0|pcFSXW*SC2b;fs6L}@|e{Q zdg9ZCS3K&A=-{0{J7xY0PF(D_C-3#f51(BAk=ytD{VS>rF;Yofo~j(>db z$`L2cx5j2)Uwi7{rtaM{S3hHqXRi3geM@Zc_k9mudh|&PpK{I@Q~vSwk>5XQ#I`^C z_Kh#Swf*eZ&sp}8_isDr?N5Jk?+2&%=@+cF(SFCRzTMwmJ#ni|-??bS1+)MC=1&$| zX2}s}MK7+{zsjAPzcziXnX7O8mj%~<^vt!bGq#wsku@-F{&iNn|J#pU{n0y@{%XP# zE6jd*lg;*>b>W|vziZ6tTd(w>zSEimkNo$}6J}gC>X)k?7jN_S?!QY1UvN)+Z@rn@ zpZMm-j}3hH$G89SmigEJ{RwaWb>X!~Exyjnm#uc(d(WTr#O&kGJ$lcNj$3BarO$fd z&}H{MW{KM#J^A)g_wRSlH)}p}_c|Nwv)E>{S2_2bXHP!=NB`RIfs@xf?K_vh`0(F0 z|Ib^;21oyE$(bw8-r=x)zdC0Bg%^HYo9{>a{A;(XCj9WOJvLkU!UKMH>L1TucFO$s z?0CdQOAhVy`w7$5_t(*8eD&JBFYUkiV^{3|l=bjq&t5X~;T4Cb&N}w_H4ofk$sb() zy*XQMbcv?j`-6u+-tBvDpL*N_Zy(}pHhcNoesS9Iw=OmM_=``x^Mh+m`0q0(C6_#V z?T;rtvgN4LHh=1aQ*Yn@{s*7`>Enkyapj4pKY7s|>x}%-x4+eQ^WxKXI9&g5%pJeH z;QcpW+F^ws+_KN_Z`gdT+oM-jd}`W)hi*J)zhu^FWA@!^=S9XZe%B?}y|UDD2Q2;O zW8bXGv4{=oD*NaedbyZY=70)51hW-1oOX}uKwMf*ZadizFBOkBbVCmq7T1& z^zY`pwE3xhM)=CluDgGa>v#C^(zo8R>QaZFvfaA3USK^p=}*s&UHquoGyXGfu^r=y z3$A^p?yPkA4Y$v}%6NY;`Oo9qxreRWxBH_Xe7WwyuU)$J0~eln@;{INa?ZU^Pq^uT z({FtIU%|z**H8a_^PMj&JO1(WF4=GS;E|2TKK=RzFCYEKdw;fPc=wZ%4_!n0ojZJO zAls&%>sGhe+BMJI%3&<%t5RCKyLR9Dl-2Ad?tW|6gZ6!X@@^-+_R$^x@BeOC=gq@! z?R#Sj@6=6pUvScD`WXvcfOu^)zdG}{Cwg~UyPaj)7}4f=O))3b@uJ%d5dke z@?q;8#RBHi1{CU>)R8rSnuaUf8Jx{DZlr_ z3lI9=63N>eto6**NALRT=wk==_1=H<=$+sGVx`@t%vfvDKU}@w*y~3;@c8YYPrCQU z75hK^YQ*wO&)Q?o+jsrtmDhf_*_DsDU;Weh*Xz$;yxnf=?tS#ovmIx=DyuO7`^Mi9$p~)Wa={3vnwC5%Tm9-W8{p@HremcqYgS}lMd-KI86B-#PQ44Su)m*`Muo(XV!W>E+iq+2O`Tjz4s#*NtNq zAKK=qQ~vU+b$-6u7pJ~^&3t{wjJV=}U;k~?&)&c5{?&i8{D&haUvX)x{S3 z#r6{xx%0|T|NQ#RZ_K#l*ynz_{LlA(>goF~SZwn5`Hocb_-Tg+YYd+8 z)#5iyn6vlY&a$7UWA=-VI`=nwK4Dxw`@j8%&G$z5%&s?FJ>sOX%ZxhhrRTQZ?BZ3v z{Kdf&?|k|2yCx0XwOaqcO~3eb+=JgSr+u@>HY@CU(syPhKVSQ#n{IsL(YHtL_)q_MOY`@y3>+;P-f%U|;AukJP0e|O{S zXK(z(N3SMRoLi>dyZ86+IdR{E?;KqG`Cl&b#CUwEJoV<`SM9RRfOXT!f4k|F-7b0R z*%1TQLyz5&`qp1ReR1Dgum8=27mq*L`Y3+z`Q6^xbi0%G*y9A}q8jlqp5nfF`cLnE zX7s_gytC}UqPsp=Wvupx8@FENtG6GX`QEEb?Q!3q-rV?} zJ%4-1R^AUTxqiK~cG%{)(>^*@A2(``|DO2X@=MPC&JMR8^y)9S-gw~cPZr+pt#NNI zy0?4gL6@#P=YdfVfAg(F*W37Svi06*uC4hPbGF`3&(_v4nL2nM&Oft%*m_bty>HL_ z@@W2X&aRF2<)7vG>}`GwSxnt#Q^ELfXXlT7dNFTXUOvtLUH%*N;>$k&9eVyt^!&FN z`EN1u-(uvy#mIk)k;5?Z-+~Rt?C&%3-@**TKjpv0%zulS{}wa1{Q`EP*~ zU-nzf{I{4n7Bl}XR{mS8{I^*7Z?OuGuF0L9gWrLmiifhKj zCFA^xabG^m-B(O%7jxRhly)(rT})`R>jXRX<_2nY=&ZBJ{yBG!&Ng9xc3%BJ1w?)G1<@2^h%IihWXJU}dpGDT|psu1kY7r74s zjN+e*c$9L|rJ8gpCS7Vt7bTzij}HjrKng@3VKlsdU^A{ym()f zgI->{FK^u!6@i0*9B+Ahp}f3M-d!lKE|fPHio(!~%Fv6_(97wNqB!(&Hl!#Iy{M1; zvIZ8$qCWDC-|U}Re8tu~3u3;jT7MkEW~ESrI3euYbKS9H#%vl) zPvSoId)diW?AUl=V^;lNGJJwp+0s${zOhrXzdT3N^m3NU9o~d5vefSQImXHOk29E+ zm-D46`&rG)tW2_>HN4Dh1cN zVEazcB2BVqQ8NFs|Id89#iYqd6ofQ;;A68S!b2w6!zI&)29sdQLI+)N*r|7Ieg6(i zKe+wXdz^LUQ9oF5=_8j}>;FCV;Mj}Lnz`h~D?k0$wP(Ha^HU!VAFO`Ez~zq~f5nu$ z_PXZvw=R3((}V1#ezwm>4}J6O<=^vu^VQg;f?v-0*6G`9u*(5IoPELr!7jU4um14E zOSk>baR(m#laD^%^7?l_JZ9hZFFbL?bH}~0(+XEjnf&(o|Ni??(^ejJ&bdp^S?RnH z(^fz2N1vQ>{(FDj_QZpiUt-o*j~}t@gb8k(z4!h<$>s90-Qg^CuUQ#RRp{vDS-<_YVpWp+7X zujLmRam_-P{PaghpE~7*-)%DPs^?aia_PCj!2_GVyX$7({Cb%`Oj-8z-~MvWw`ZR< z^?_?v_+H{@4Ayt`Eu31fzxK5aK!dkZ+_fsFQ&^JaOCH&taAQ#OYXD83fF%8z*^rN zy=dsaKWfZM@2%c<+L8Bue8FSyjy&Vi1HXN=`@~DDe!SL0uU+%}+RsiN`RqTwyXtlK zzOwBVU*ECQQH%fRx^e%3O1bmsyO&;e=zMP}|?zG5`PMN2xmZ_8jX z&d4$DgRJ>rGSn9*Luk6@>UuQb5LQD4cDlaVU+|TwO4TxVdAm@$o;zBC9q&bjQR>E_ z?T0QN4kBV_oeH{~`ika2P8}C2@Yjo}+w4zTpz~F>gwFmRh1)e>_e0I~qc{$=7+;Pw zx67bossU=?*(*vN*fU6^4B?A!iJiwm=JqHJp%)m&x)X=`7A-}5ip&j`~ zWW=T&I6(kM&~k=_lA7)e5eYh9x=ZLh4if0L6`BED<$0m&Lx@Kg>sbz(U)&q8Ry0g6(5_Z12m)LnAB-legOmy9c<73Z_(PPcK-__~P z_KQf^`C?vT=Yf!5_kzGm91U+@!2Ll$Emc^u$avzSmgC-o~n~sbe=S zh+N$cQ_G<;lg#fe>7M;@Qo8fSyiE5tR&{*C4K&XPLo*Ho?48m|mHi#$bf=PPzNK4t zJM)nu-EAvIx9GZ|o;b0I?ZA15-jeQAQq8xa>)3f5BH&R)pg& zTFx+cP}7|qK#-t|q*}#60zJ^vI7s|34q`8i(_Wyf)14ifkg)T`ymUK{g9N){nvNG+ zQR+bOEj@Np~u%=BHP6>^u+> zzniXuuWTbuQ!O^ri2A8o93c|FRT(5w&hXW|%$YV;je98=*mNfTh@55}rz{ z`7vSL@olu~+J=QUcHJm8L#RcB#H5jeZ^?KnvF2x+b?`hClB`KI7pH4hs7I-jggF1B zEs|33Eh$fB*8D)W4!(_9Jxj+ocIqc#5NT#aU22M{4`RwQNR*V%50UHG+n7~P>?BUH zuM~ty9N{3A=y>)mCeV{Qz}t!A8hDe-)vz(?V+5fG&#P0OjS!H)^F_V%JP(BgJZQ-@6uzrPq9zqgJo^v`6*>3HZc_ zohZa-NEB$P9#Z#ciiw=&TGNv9)UVcj0;LX~he8704+Gu8Hb-K3kro5N|ZTy;qVUTF}0*Sm-i(Kk^t?Ldsq~tU`qZ(v(W?_XK@^AhAM7g%Dl}zH;@a)7hgD50t4O;_*wML!t3=?Is$%m@y;M@2$iZwI__>Kxa z(@)rWALZ0Znl>dC%4e8J;Q69ndY*?u0$#%sshc6ZA8E)QGDXQe-;(lFe$9s)YxSB>KPo(LLvm1$ zt-wkX*RnB4NbJg(hsY^UrPq8QvyPodLgskLCSacl59dZUyiab*WY}9$o=UIz6looN z8@&Q>lIm%QrVK|3F}W*~fp1B9D!=BVuXXTk{2BxpWJz)2YB{=RV5q!@tZ7MkD!=CQ zx^?hv{Ayr-FT`1KXjqYL#N>Kq(WIt4gG5~Gf zr#!<%0x!~Q6$webx{2qfp_%AL8bIluoHa7=>Xc{0+9dFNQ7=~cDijj%xHRCU*s8Jp zB+`SpC-CZ&XA|Zm@FKtFGwN9$Nx&zTj&tH9bzLM6&J?Ki%GLmK%2VkzADgeGd_GsN z!0z}a{s*}e8HVX;V?@`J!HC4UdGx@u?RDhK<$?BS8@UA!m&Yd`rq_ zm`LFHqF#b;<5$bm9ArACX;RZLkYL1BUIxA;<+DFd0?!xq5&nP=~b`l;@Fmti4xy&J@JO+GY%;&xRC9b42?=&1^*v3)O*_v{ zaX*c`=^?|ePI-ojbCk>z2}#)v`#W2@AZmw|6dc`Co=*U0Lg z=berOd}3Nolz3@?QD?}klNTEq_?DEX@@qA3U3#8}LIOT;FyDcDias{^63ibGJzre7 zY_62bO-crdlr?-&FR{1LtBbQgjj@v*siAiAxU}Pc8$;vV&4dZShL6r zrOfdyDNp@;&F`<*!Shf^z$b=<6U@-IBHxZ2+?6C!lni`J%2WBZx=vW8O&h;rEZ(tv z$4$dX!~89EzCXW2Lr!@rz2-szb;q~SD~99)JHds=Nb_PhBsXQOj0Eg0t2~ijom~B+ z4!(_ELp@GHCqcIAp|4?Vk(f0y@XD0WF%cF@CzoWXgKynNRE(5A|o-0V!~Le`bVaggFBs*BlY*Gh2`L`->^<6BZb z`{N|f^F_V%JP(D$^SIR#M~;OXbok$aLr!@a_?DC>@~guYMv9AnwNOaFM_z(m$_N|7 zeiT?ZJRy3Xd5E0yM0#~{xubg4@JL9o2dSrp*z8Mn>>OZdq8IGSRX)c=${N0?ms!(B zuYTfWy|5prG1^M(O!eUSmXs&*t5egwVWJ7OP)IzFPwzO;qZor8dV~Y~Uck4cJe6Pb zq2zkn@K8v=I}w(72l!pb)l(=b5k1eMNlkeMiIO#30Em}s8@)yzBIQK5O>d>K7f?@g z3b`)oD$g*Hz>D-+MMC0u>@;B@D}sPRpjn?F#-@NMWsHa0kW$QpIZGfX7UGxn&Zd_Hfg;8)zTNYESLRumR{CneV_>#@lxPo-C; z6vbMBVxg=eA#pqo|L~xN4(O5V`Pj=KI$nldy~@|rtC&+ufg4d1z~KU2WxeLJcM8Y5 z8j?n{oiuW^Gz`e}Dg)n=@>G7Uz^HByo>!+l!$blv@@o|eiRaPEqZv+p3)>%BM830IXm&O|ul#&v+kzzQ{F|w8 zd=&`^_Si{noL>e|tw}8xmmG+WXTcQ8Rh{x|H79`=>9vxzl7SBlY^~~%foVQBvZ(_? zQpdNXJe6N7QKr)KJQNb}Da2JR(=sC)`+OSx^Ht{gmXxP{z7~>`*e58#^H4~@hgOPo zaXgHxXgE2hetQ@4wA7TR(rd1UTU+I;NJy}|k!Qx}CviUn&L_{`O0l=3Je6Ma1-K5r zjb70X7@#K1-zM0vf$Ax(UZvn$Ql84Mc`4PwxA7~^&a7;38&_QL1UC8Zs}y`o%2W9@ z|GjnaZTyN^f9M5alrr}GE)MMrC1zsEGf0$$GXJ%8>}~X_2N+Yq!F`13EDR%3H&~_E z)hSOEYr+N$TF?52NEHc5z520dc^H_8A{^@A>NhpzWe1q*l&7jSL2W?<&kw>S;5A5P z2exCFChkl_f2SAl>XfI-H95KdcP(wIP)NW-{{@#7a2{d=*g3!@ed1!n!Yecf%EpF4 zBBeb4W-1t}ii8Bao`gO&zin6Zz_2Ox^ELN}fW0NF^iHJh9&5)#MTzG=AGVZH5SvQ6ZyVGEjoy(Q(T^jc{J zmG#<2uV#RX#UvjN6ilp`Jvm;T@>JC(T&EOQ`8IxyeT?+!5S_BZ*l|p9S0?kkI_0Ud zO_^*|lV7V)NYX}6HB8K7=G=GU$dAdMXWs`x+9*?=s@vpLazRDbRFRNjw;`_<*$IaI zaWx0uFhquuVOOU-Rk+E?pTnrFHB}@e;I%-H9mB=kvyVBOh&onQyy4O8C|gpV`uQp< zH`PKR0q-P!nnt)%gsjJ1b#hB7^L$InQ~6btZmNYs0vv(~)4ubc$`pS`b2tGK_8VTEl*)P_8X0Po-B;x+xRjEfyaM_yj{i zUgBiBQ#d?MdIH~)@>G5mrJI~86cX@08XE{Sq$UbBh{;zlrCHOG@>G7U1cSQOupL`-?AbQ5l#mq}7$Z=+WYd)mH%Bc0UM@Wc_hmuHzsPI;(ixyA-BgQ&1iXb0k-+pL-SKc1NEY#z zf^SLrEXgPv2cmRSEfg~F2Cgn9X_UCBVFzS&K`Ho_l&A8mDBT35`?3Zk;4|%dJAfD{ z&e4nr+u+20m@x-A<*D>4N;f%GBqZ21+(g4A1si(o_ymM@Ne|dtQl3h$m0nOmQB@=) z;1dXWWS>yDo1>*R`Si7TZ?9Re>XfHSH{nH}GD%ACZTy;@0OH#fvuBA5`CD>VCd(Ri z%2TDAoJugL0AGbd;&~lolqvdQ-GmS;B!sAG!yH0Qd8%|1KK=#ASCNolw^AJDKphdo zlp(IZQV%eT*BP5xqfU9MbQA6!h~W7~f&@H{LZC|N;|eSm%2Xp~jm+^aDNp@;%^x_e zH8xc!B;eyPlfsA0c8HzIY)_xK*vP=Qq&$^hMd_wmC?w#0)AQXB(&i>QdA!&{1fTB$ zkyD;ZucCC5Q$<38-AVD%m<^=>A0LAB(;O-GmXxQ`t0>*%RFRN?cQM4L;cgKepWtBv zDn&`bx1>CkUq$IArwWAxJi5pb529ugtPmh34-ZShx1@YlA(XDH5)3L=c}6E$0ZYK+ z6C{R~P3CSsxKOfnL4h4}H5fv~i%2Op`!KE23wCwNQ>B}r z#VdfXA|Y{npgFN-69O$_!gg0o)=NS zy`|vQDNmJda`M-MYZO(5LIOUDbw9xnC9aQ#Hm-?K(?)iVru=+mkVxgq_asZl^G-*C z9S;mc$j0!%PQHU7=w7h5q&$^g^Jkjtj^~|@1biC0zK5CT7;`p}O&<2o_xgpkrX}U6 z{F=WlT?fxYApwuaL$IkGLgzfj88Us9mt{>$%2W9@e-OJ4zU}ih0I8;_nN0}U_#~lj zH|1wWg6GvKPo-B;y2+^`A#r?=T2P{dUNUx_VmqR4QcAJ6q&$^gE4`qyUfbx^4{(DK zQkuAf2?;0i0j3nZI_0U-O_(bbDXNWMA?Sz)7x6iQ>)v=dhk6tx1+Pwds&o_bP5@tp zLXtL+%)&=V9BZbR#8ymBdA5L2Q=Tf_C|q;IrvN=ut@ph8Dl(2RQ{xR#<&uPDV{O5 zGBz%3-7J}wOpTMN(WGR0-$+aTgt5$+mW-FvYwZc<@=a#xnhq&A;$SH03uXqB zCI{ihRWd+jc5rvrvqOin#OOZmyjguS zXH1@&3w5HvonIt4;o4arv{VzrUgS2@iugk6tmXr3zA?;G;MS=Fl9>fwRYCViN$ER z{dkSH)Bg%xrkV+byDR_K5nJFz3!=@YhsSRqwlI8%EnDx0jCHnE*nA`!Pd7?a#;$Gx z&g}`tf zJT@;W0fj(QZYP_?F3OUrA$15wU}`^mAQ~6AaZ3wNKd}%*$@J-yW+q7U1Mv*{y2(M) z@TPd*jOoFIq@M0loVL-Ai{RP5y6AX0V@iOsC7||cQMtLEJfVh*9ue+QMtBU|#+P80 z?nLC-x-35LfJ;*SzLlNAiNG^Fom4LY&Kyz)&Ks9HaLsq|eoSIvFcLFjth?$7IHu71 z4L!R@D+15(kbpCP)PeI5)Pd_b6G(B}K)1aJA4Pe&_TX{T!K>V^D=ShtaY|gym+^9; z;W4Nq$DJ&UXv7fhio?X~9XW1K_q&!U%W?%vRt#U3BWKAHIS)b|Ib?sV1P`@hYyc#} z^!3Qe!h9nx<&KUl&zdMPSrk+%0(V96C8v_Xssp!7BaKqLV2P`@N$lrrL`)VLa0|(T z$HqF7B?m-EbIcf(t8?jc9)mh^$N}Q{b`0`kKE~Ig?6b2cmm5fyOnAFvNz4I}kPDxl zwII}yV=r2V@GD+O!YhzAzOTAK&RiiR3wE{pH6t4pYbFb{186HtjSzE}*J4lyZh-w$ z9e4I(6VHfuw$-2E z>4H*Or`zQeTI;duUe*vfhyWvlkVDsD^YNoG3maj?%QT`)hloif zjGa0?gPHVgIez>Oc^4@2z8tFQ_S+z?&Ww=rqy#DpYSo+MMt1bE8TK&NvRx}J@B+ik z`;%U=^6p$ALm;#w&D`B-r^!WQm;zLd0&T7(Vt)Naf-Gz+#ihGDbKmR`Ucx`{Pj*4i*kB+rZNS}9tI;BmVjZw})$)WS6% zoGo+#o>h^U@mXg8@Ex52>zrD#mr0`JQoQPn2ZFHYYH8TtVxRj|Kg*z^LGQTw31Qm!OqO~%D_jyXzFHSv zu6$ZgX1x0bsAC4E0NBK2D%G8v9mn7Z->Ew{j#0dcp#cF1uhMSCJjuL`Ir4t!M`pF4kx3MrH*M9 zlN`*KUoe7dz6ibd0V(9Oo$&u&3DX<8%b6CZbiaUT5C&#kWia?(}9V zWXfa6+cY~;7+^x}L|P2|nMTpEh|?Gzn`4Km6;PnG9yJzxy=F4yiS^C8Y zy&no>vksY6wNQV!XV>rHMp`G}3&DF=&+yGlX);nKDeF~8x ziHk+*lZzDT?C!u^5!-V^j8VycC}2ojoZ%q3n6JlWPB7l;AVGX!5?t)e4Y2N-IQNx| zIk@bmISH{yfO0jW?4*-`*sUXGzgfs)S9fusls$FbQFl}l6eWmqTRZk9b@o!tT$93^ z8{+Ic1Sf%#q{s+>l*4a+4VDVX`_-|eoLkHbzS+qxl&|g zH&++y+T0*x;~0l^o`gUc5{i>6VVkn@xYrwyLF^RB4bEdsFDA089b!O8i23SUAg;XL zL`p(fP19OpB>wX~?5-b74dJiS4AGQ`S8hyfw_m@mJjkGa#Eh)I;E zH#kp*7_T_?<07OikuxMD$Rg)eUT;FqKKJHcdkxZ)LDunwiZ`ZYkg2R!iPV%{=5B97 zCb6F0pgmT_Lha#T5j*DD-9ll3V?anw7Fn;7Yic4Uv7X+bJsD!i5BB5XKnd+JjT{nW z7QA}#@m`||Is5jTdtNknPX^h<=PFKRB_G#Jq=*EWFTrJAaJM%hlZa1mFrN%^b`(x>rKQY<}>QdCq=B@CsGLgNFa+JdzI!=6EcbVj5_s6A*(lw z6!Jb2$b1nly)5TGc3pq&c~R%ST!ukRWmQL{5cQED7O77z>VtR9DNCGDr#>lSWk;k? z@{u6sYjEjf?(}9_keJV?GoKW(vLj+THl)>pFTo{Z?(`;N67v~#=93~;cSKCSh6I@} z!6jtw^(JHz^BHyKlR{Q^L`<}X1eq_vC1mdQCS(%x8Fl8%8nuowYGp^nM1v@Z^Hr$U zUdRP{@J2kP_RI$H$q=hMB8G$nStPznA*tbHd{+@VBC|n!GRW$Vh@}w;GGBs=yr|sX zgiK;Sv%!2a$m))Wr4b3T$b5OtWSP>0OkzH>!F=pji!`D$%a9O@)F&6z(eV{YadLzDWQdg= z5mWXdAr_fWuA-x}_YdaUb(#(4lOa}iM3~Q@trnGFOPLki>CLPlF`w07J{e+lN2E~9 z>1;bInU)eV_j&^|zN-jnVKtaf23g$^DRgoqkVWRJ+}?ytVm_ zV!i|yPOiM(L`)(+t3iA+#OjVnA&Db_%z{^I;^dMzI=-tYdC?#~8Dw=wq)@_1FQrrk6>~XEm5l23g$^x!E75EODa#4W6;hTJnyLh)K21b&0bY%*RMoNM-dN5ko?P zEHWQ6RsxyCd{%?`WRR5|5fgnOA?Ay4nHRj@Xyyfp`K$)>$q=hMA||>+g3K4;5;FIC z6Ef+e&uUPg46?c-Vp=;C$d#B%37NaS37N!wc7ywv@nR~gIwFObP3L+cirKi8u22Ip zKCB2!oZX;48DeEeq)@PtAQqXga(WXniTUgX^T`k^J0gW{jRY}Yf{U!EoZduCVm`aU zd@{u9j!2lDuHSt93+jff^m(Rg~qTL3}dE>W+vB zS&+QUm*CRN-0e*-lbFwLFrN&vx+7xhHzdd+^Hr)HO~@qXvm4CEezlOw>W)aEP1Bhe z9hUw68VO=?yR*8h&_Ik2D?%ze4d#;}R(C`S0U8Npz6cko zTzS0-nM8d~gZgBU)g6&SfJOpY^%nOtW+DPmdYratnP@i8-Jv)R9|Gi%Ii(YB<6GK%qNAc?uZx?l9xs1W5#xVrQ#!!vclDwFWw_VVzvs^+KbBTO(&Cxoi6tTJ^@-rj^$eySq19jfA8k>+w#OKzDPYPMt z5#>lokVWQW#&+ffKCB3N;ntZ?3R&3^c}&cP1eveF`GQe%d&A54vZ6q)Ghe=^C#15n zBZ9yfH8BL{%Z-(InZ$f@1jwq6$YXkLBq#GlxO6i2deg}y=5rg&Cqu04h&(1+ zM}jO+Uv8|#$t3D?8`LL*tn7$9rcXnHEO1|LtOPQN``iZiv6K_?LZw3iF(+y!3)Gj} zDnU%5KDR-AGQ_Hm$Wuwfh_}nUN*bojWbX84CX<-YZ7`nuD~!F1#WlU`v?Eg^HaH}V4C zRTRh#=3|SeP?qB z-;fk1H;7LLS=|w-1YbHKi_FK2l|UvjpVweM8Dw=wgsXS7zLROH)Ki%mD}hX6KCi)i zj8uhGR(C`yb(c;r^F_GKW$yN7E|ZwgYcQV-va%ymX}WYG7MZW|dJ{2;`Md`6$q=hM zA|`1YR#%)Q=3Ork!&L47jB%8rNup`=BnB2psePOl?2n1a<@583?&^T`k^J0b>z zgji(0%IQtSB&|$Ry(P z8^kArtnP@YLM~pVB~p5sE&k$A4lcBj@}j|fGRW$Vh#?_WA76t@$gE~MA(NQTZ!jPG z)j}$(J0hxtOD5vo*txH{y_py!=JOlOCxfi)h!_xxlPevO(#hQGO~fST!&4QtyX^UM zT!NR?EfH0|1y7@hUgmCZU?$49Xbtj{xmn#4Q3YJQN=u~hbLIFZW)k~BEv)WmX1?HO zkc|d znYjp~gVpjJ??BQ|>=1N$k#LOMv^fQeE8+tBM%h_2#>VgMZ1xBg--o#8J!G@}f6tlWLVo*pW$QR?%&+?Bzd{vUtxz2+5!;E4& ztM-hT(g_JNUyMu0-0w{{(@3x(>mr4$Y>%k2E*=w8sqZn%WnHpI)kt1$aG>mXRoNa< zWnDZbrqY1S-QM&vjRW-t2g)F;+as#3i^tSd8kprAh|fxrn;RS`!>n$PsKPE@B{5QF zvz!B&ZuMOE6ZM9&OFp>`D%ZjY$aE}kguQuBKw zo$*~sNsWfKixjiEJ)&y6c$LaX;pfWnP0Tb7Y>2x^F{|4nsh_2#^1@_H8>c6g-y6w{Pc2GjG*n)snAPnORpo`fx7EbV9pA)E zh_4L_2My!l{#-%j&J&z#(`$zOHhVc*&b2FUOc9;(ts@IK$_SKw8iRs&N9gA_J}I? z;^miDYMXSG-?LJ6wdBL;=C6_ejmsAHD1AWiQ@ZwS8R_Z|hz%EL8= zganx%OcfPa`Mu$0d}~oEup#&&g{*9ksDdvZlUb=}bLI9XWEuxH6knu}mF*E#@Wrc? zM@lbqw>KfvIM8Z*2D0W*NDOs*L{)t8D(R6Dvz!C*sYS|+1_#P8tJ@>0B0)figd<+as#%iCA|8#p4 zV*6tx$b2y_A}8+G1EA(q5mSqtZt7O6jEyNrMSc_=RkaF zk+QkYflRrBynDo0z7=wbP|kSxjHDoJ=)Fi0s=Fb!3U)%oTN~w8Xa44^$MiI69b8TN zqj!kd zIvf_@&4Yf+G&*1D@f12SHJ6uwl`gjuGw_T!u>vEt(e`u;n7KxvNXOFq?d;i9;f43@yi9+-?x@p$%noDw#vz}O|Ei>y8Dv>@zl&GUI}OS}bQ)AE z-!kW=3wf3?VG#Iwka$s;Bu>JPU$&iur(5whau7uWGff0`?h8`ndml`wr@R!d zq2tA&&bJIbg@B9%F85{Wf9`ED(6Ji8}(e#leE$Si$k)6e zNJ8CAvX6(-q2#snl*;gpjNYYB+UZ2VEusRS!WBGAlg@*0>iKoS0Jv8M?I&fe! z-Rdi;3_pHXzk`*(GZ+~xQZRUBm%-rC5%HTwkXSy5K#xuQzpP)L=hTuJV;NSz=}BJu z^A!>{l4x)mD6Qe)5v|dk$WLuAajiIToj9ynGq2GwEWF%o+MTVOuMo767{GaRKk`B?%$m`84hQ>N$+eOFX;N+pESN;*meRN=c*O{t~o?zOiOLZIb4!joHI&mcz8Oj zG5yFkQX};e-;WxMIIq!YsSPTFS86S#0X#mU0pN|;NI7KXW)a=HsSjyWx|u))P@YdvNjZ2IuiVxCW>HG(Gi0Y1ZZYmBXn#n zw9wQJcQDkop^({;Si@8NhyTb!>zOrSadCF13zj#Fl01M&u+xrry>= zI2hfMYa_!*GDc)^CT1ix#)|`Nn4uvJ11B}pZfiq^UtJqi60dfW%WUG&5wpqh{K)aM z7S~O*1kx4591L}BFp!jJRGKuUH9S0`HC~cLhNXpiYDbBVC9blDQX8^psB1$Z4AjXR zl|oHnKouX+06leM9g?lFVMn&c?hw!GQU$4stOBXUq0kJHSi^auv_?(ieqehMh$Hp< z6kU6F;gB1ktPX{Oki-B^6r}-58V^G~2#iQGT+`NlJE$4ZEpy1NX(;z^L6{&Uv0+6v8~iD=i%=eN3tH-fO65%BhpnzOA;m*xfVw`YRL;bJ8sShnTwJ|_^42ICfNTB!dSCX!}4&FQU9Wy=XkW#2bIn% zC7rT9lyq*V=n1vJaZ=CJJa#E&-UGsxMQVL0#Em+aUs2r1uL302hiO{qPXb4CLu^|y z<*w2iQaoe^DCLE+Bnh3X>qDV}Br!+i z^D021IbN!TS&3j$I=0iKzBxV5@le-?LKI120jG;HAUr~%1!0840oU;&UCXv}>lSps zU@^y$>x0VYqFxd{^Hl4V=0?mOFV<6ZDP6BuG6U50L8Wu1SXAc^CKV<9deQ?|(+$rF z{m{cEXm9tAxVz^z$Dy6*b`;rukm~ha zQ4)X1EKt{nLbj=sKPvg4!h$M7B7dMs$AG3C=zgT>pb`XRhk+r?&rJ#@_e~52<7gmG z;&OUn+Kh1Wq^NKIWLE8r847k1B3B-gE0mlhR&bgqtx$fKhZyqE{5T0BP+^RDn&Gm- z_UwLxO&AGt3kq!~i4`oywSB}YIAScYwT@vaL?kg28*?SYW(B@5`)zz4!=a)X89Gu? zaE>U0!J{LZfwOE}$iqgc8Ec--T9V;OsqCJJhc9I`L!uc}Drdq=^|iK=-V)77B8(_n zF4`(T`_F8t>fQ{-O9EqHcTzf7RB3q}T2|uO0!^w7&J$%kcz`-; zBQP90#_a<;4!lI`?X!ukheC}wo`ES!2@NU)uO!*UzxhgQ7*W-Rxwjv;%eJGl8o}qd z8yI$gFLNUa8hg5=uO^uR>UKn-e7(xo^10EyP%8X~rQG_>s@_CoD0$0?zm4hM@%ZcBks8C?|V@|h%= z^b-owP_BcQs$J~M=tkPpL4nkqmIBFWjg(%TFv@@^Dc!OSE7WmB8=}#+yPY3EW_=y%JR^r#!-0lm6EhJ^L<{sp)3I;qMYuqu1zLR$ad_gPE)azzn8X}T z7=<}iggVT@L?t-gi!Ahum}~E{#mZkp6*5X)APR*ri3OZ6N(+>G?3S;artTTI^qAti zr+&q>`+%^&Rxn4&APVs?i8Y)sN^5w4#CTu=4j02C48!4;sF&2|u1EzUGoYnFsEjU3 ziTRa;n`i;HOMKnMyTR?Rl!-J42F`%Bi!-8#ZW7CLof*1)_K^yl3JnC8t@gWWD+YlQpeKB6^4zJvLqMEeT7h2rx}%CR%r&0j+j!KkH_mVJsm>kBgi!rx;KM; zAqWNT+HSvZWgBQhVJM`_Bvx>iD6Qbp5v{Ns&G8cx+oAyu1=-6E!()Y=U69waTN$Di z88}LL=Wn*uj%KUih*n_M!ZdUjN19<^m~1X|c&soTr{6-!flov;GVUUoA#%7};Ee4~ z`#Ri)jZhu8933b7>KGm~;2P{#$+klknrD)n;uKNjR23dE8lje8oYm4i&Bm>vWS%zJ z^Xoi9WjKzG%8-aIC}hwiR*0YEmHeD&g=v`)#=c`{)#z!E%+t}V)CvnZ1u+m=PEiRw zm$9yw29J(tM&gA|Y+*m#(_=qmFXVKeQ;d;>U>L|L%aakfLM}}b4bBl|PVw-FWT6kg_6MW$%ozb6eoe$c+=U*?7VOD$gEKg z#3-cIB-U`MD6Qc^5@X_PVT_B|zT;uACuUk}r8T4`U1or#nJ95nRvZ~H%7UA#KGuta z2S~Ia^0DjYI}wI3tR%&)yJ}~>`;R7>Ifmi&;})yL9EB=dXFw|5uQDJ!LZUfo~q;g!xIV4^=m!lwRZB&Sj|lTp_I%k19Z-0hoZnaWIa_{lo_k);A8j zkB7_}8wY9VKRde;r7l~CH6oo?@e!>-n;zmLHV(Z6{1McTY3Df{7Up_PO~&L(UA7Jj zI9C)2RRu`2AaPQN6!@N=V3P_ud9{QZo_IhotY5>PWM_ZHRF_EQ&N-trhet>>$8=F4 znEZ~7)IyilbwF6*k?Vs>=1d^1KJ-@UFp35w4(^t_fn#EZ-L|dX>O*FYx;`>aBZY(0 zMHvnrAJG~YU3-X7q_|Xo0;wO{be~-^Yg&pWLrF4+S5IknxFOeOEaSohC0c{!S2tr_cYR!ZgdS0C5u+@_ zQUfrp3xUs$uiF9_$pG;iotZ8@j509kig85G@NsU7t%jNb!xIh@`fpfJI#ywrL;G0I z#y=6bY7wgkNQ?)TdrY!JuOvzn&1NqTb<;LVhfw?&@i-|dP;R45VkOqD}<;A zXW*)=KmgE^csN^^LGL~|_L&crLND7zn*;2f{&QAiac3rI_aP)S{ofvZPI zv;YG77VZ>5pc+C1U)z`S-kBMEr=rxhtQFO|Gh80pCgy%}F&JM?lxki}AP!h82e+AnFPsD#8Jjt>CK&iRKsqo&bm-mjNX&%}?w5zoZJ0 zSX&*YIaUUQM@X~)(nKy)6S3f8n=xo;CU##TjH&1qLM3%UAr1ji zeyQUr3q9LB@yrC*xTP=Kw7kcFH#WNJvKTN@g>cF!1EM7L6noTB_A*kYb&fr)o+?CU zPD_PQNxf1aE6q`oy5-^k*bS2yb7oHV*j%*&lPW}Jfx1G7s&Ek7Yi_?IrFewI3W-f@ zoGhyvVvj_Ve5Um?s-%qX z#JuVSKhFVasSqluSF&SeO7RGZ7U0nm-@=%C*8SpOq_+xTbx5xeDya)9arFp^<~TYo zbB9p-v2l;hX*^Iw3W&^tmI|Sgx*!Y(3zVde>s~3_iNkGlT>I*+?Uk9+QX$!bO`$|V zB@X5&NnKA&2n1j@7J4SQhfqI{p67tHR7kcYkSySoQC5hO)NvVI!|Y$0IKCZ&3TrIb zHHYL&JH0|OloWF+6|&MCwl-!TCSrwzn9#~j+%zw8eVne>%%KECYJs{!h|+KvITlI1 z((V&2NDU9#oY-!_1w5@OIx#!}QCA32Cl2O_q+UfxGzTJzu7+t1A8m@`LIJwFE=w8^ zb%hW$;$Q)%j3T9~2#FTxxPk!XS{MI`IfuqxL-zsc?o6F176)_0FZC)yqB(dk!%7k? zT-d?3yVq>Un;)UZTPlP~>K3PrG9Wxcq6Lt7f;@zk;%>c-UF)7mU20BCg-}Ud(2J`_ zNHiyf4kT_qqtCb87$-d4R){R6S}KG}>X5r>_K8)5L<>v|9VH3YTznzoY`v#p%)A>F z@=JZD&QOv#gi}VDUrJJsQf$75vF^JmwDs97k@CEa#35{P6f9_|5Gtu-YFY>gkB}G; zh*?4&CQ32K2Nv||jeGY?mdu=%3ZasErAt-@ghxm;#|sP$mzt>&hPXl8^_jXfrPLKd zRE#sUN|LO!fJaEQ0AtoZ#->aog7k#z^cE1dFbeslt`MSf9Ly0(y^4@%4u+Hi%MLKN z7+VQet!|ernFZ#h zBPYaNXp~7krG_UUEfqrjQfCrv4Rh3_?mNDf#@Gu=@%SZ%g1h_2ig-}VoQYI@n zq>7Lj5Zoa43`n@+PBb14?~y}TVG8-x!XZ>rucXOJbCjfxb;`v{oe4w(GzhPC{b4Ax zKwTk3?KnfLq{&JPl%#GWo2*PY4pIS-0_m;om6@Zi5TbY-%n?bwijbIJj)nJLEeOKm zZoG|4(%n{w%mQ_VFklo?&u0G{^ZQkVL<{`HjkVBCEIb`<G-MY$YLA2t!FS zM<&q_{prt~nq+V&06%|rNNVFi(aTNhYg4eMi49jk+ zmtRuD6Ofh)$H=I{uK<`{{A z!!`#`ltByun?l185OswR<>MewD{jA65$do24`SJ#72*UMlUY%3q|W>#44k($JpZ zNtucTyRQ(LIqC`_>c_zxP8mgoR1p%*(Qs`__wklPjG#alwr0*e2c)G!sH9#Al$93n z2#FRLcx^Nad=0vtDDmE&^2?9G=oLaGbwNk29wE^jTxml(dJ!J^vLU%rKTRM7gst_0 z1uYdqC3QhU4i+d$J+N_R2sNM(Dx{E*sDIjaUm-GcS}KG}>P)V!{-s_;NDN4fCqkf+ z9^pG(kM*wKDwC#EONC@h0;S7hN^K1bl%$S(2tgR(?v&@?L5ki!4D*v!A-`HUgi7j_ zWLa78Y;BY^jhFyJznkFJJ;s~xaB`PRmec}ug%Gvm3_KAfatO;^nFY{Q2}7JfhZygL z#!;OGyRHzaIqC{wC@J|>sg@N1sUjp+hzC7M>{(-yACJdHka?*nk+Nh-El^ho14god zQ$}e4kC13VVCoJo?WCCY^Pt4m(~^~++>p-5gRtWEQkk2$j@5P8p>IN>ay&bvBgjrC7N_ z+)L=GLS*K&R0x&SEB&(493CMtzcS552q9p^%)v7o?0vs-Yi^zcqOK64rX1elX{l=9H+Js;6?6k&qJgEX{it@srw?SR}m5|z|N?ix*FaXP9rdTy-)1ELYU)({8DoW zLrKanP8mhPR}m7;!Hr2b@gN?6vA-13v9%SLv}DOFXsHk?spHk)=6-b*A<+UnQV0cQ zTuOjAH}ng8+RMsEK81j^R0#D;-RG21282gQGzUW`Xix&|`FhxXZzzS#b3j@ugi7j_ zURh}Yk5GpNcty^IiUU5Pa8#Q1Rw1k~g@CkF2$9rvK~N5B7>|%>4$gKoJkx|NMtooS zSQxteFqB!KtdJZSp~mr^rC1?KQcrMw*wTFsXCX-dCCQov-7i@(bCea5qa>Llka{gb zVnCpd2zfkcW4fLeMRC30NfjcqKv^L=le!~Wz`q0Y3aLd%v;Z@5c>N2Hz2g~ZOpf;! z5Vn#~D+EVkw5>T^6G%OG1Z!GEb8syL&m!n(c@qz_e|2+60g+kIQXxcA$B|RBLUP;X z7MNy&!K_S(7~5HP)+ctYH=a+Y3xQ~9`WNN3J99DR$8JsUlGkADJGi=P*g7qz#J-@S3+f_IXq0FIgw%DlM14}Xi&nqadoPDbJ*V^pVz?h@4)< zNem0_+$UxX!9tWu3OYftlshNG6Bg)j;T3qjQ}kA+s>@-vJ@ZnnXsSSo=Acysn?TVF z+9xjVg$=tohUxVC(EbM`F*;O&ue8gGG^_OgM04U8XVMU1)*v$%V>#=|9G1*Nt|=Zt zLatHCzS1!(t>Mw?um){BW&m-yD)j9LQ{h#vbyYMnL$ER4kHV1@4VCUI1+&r+CEceM z#9RU#P`fsE9&rX!8Pa{x$gDAayWfE3u_Vi=w2xOdgrZT>evmy*oK0in?E#GU*W1Y9 zF$a=2{kX_1>0%g4(vrrBrHqb}|5M0#V+6vm9UNW9T?=357lp(+kt?aAPBL6112~tI z2Jirhb>iu^WrOi8q*v;N^}V{T;~}+1@n{&V$v{%9sl?1mYj}J_Yp{kzF&<38W8P?v zyBb8z>j--d2aXSq}5=JZO; ztT3mFkZ2B`?z1g)lo)|XQapuLTfHb>jrm1EYJE`E=5U=*Sg)!8i3YfKc6Z&duv=#v zNpBmEQfrj;K^2?B$%kkSZ^=Y!Oi&_@OQ5ymn|NGySi;d#A5>mPhu-9mDnOzIX&P$* z-oiC;)fme5^^uzH*DKj!bxVCv*}al7E9-+tNHhl*@&oj%cv{3WA>Pz=Kv<;7^+Dxx zQEN`G0wfxMF&bP`z}ue~gYfW_X|2G!kB7_}b$w)3FIa%*$og$`h#g;53>PJ%Djl=Z041MW7Icp6?DZhu z##;@&^;a@$l=Z#W=i+#l`J0W`k)HU;b|a&4s#s_*?cBgFtBlD+HeBggJ~SY zk?Mo}O+rA_^+DzHO2w?qC>|g&9(X%bH&O>L8$yQ>+bOjbxBGa=tWnnomCh>>v(g$K zAJH0Ia?5nb4I8aH?tj;J9p*V4E%ia=b5Uk4>->s_OSAw|Y-kQKe~ov8a7(wR`O;j5 zLCCI_`k)fJC^LsU-70hN7M+Jb0*P*fJtmqpT0A#GEcl%;{>0xhS+X z1GhkR49~?T`tPdRN%bK!prt;jd|nBd74=aCNQ?)boikwsUb^=zyo1!!DS|Y+TIz#J z=%U12EkdF>cz+H`O@?j<&<(-4NVfrD>$;FpO8#KDNCnR6qKt=<&vBm$LK~^&`C4E` zVNb)?xx$KIjk-RlbeE52-$6;b^H3DxZr2b9yBK zC|Y3qx`$Dk*va(ladJ>gsP6e(W=>0ePzgQXH?9Xn`F)<xdM@J@Me$7{K$l3>~RC^U4F}p&D z0{M6lQpXDrm`v%q-IawyT^|e>DIWauue5;AHHsFbfse^++llZrGUO?Gnk$vYLtP(K zc{!YzmDyC9!y7Kq9L!rsq3(p>LcH1*biIGY@>a+wb$w9zywWZ!4d4M14ZsD~O!d}> zE`JR1!ny(7uU9f_)b&B7b5UHb79Y_X=w{)i;=sY{E{I3k_4kL&fR_58exFy;Wo0~+ zeC|28QGs{vH6wQMxM9X0U60M>(rH3gwbTWb$n$!u@kSLHF%X&)M@fj!4yZK6=&uGqRfw#f?wd|flry0~Sxk{|8Frx~Om{jNtF;l8RRSruoZb#3P8M32I zOse5U^=z0|$SDSn6b#N2r4>9nq7``G)7PLKknQt?ctCI1tgtNP6dri&v?2pXvO?tV zDmbDQNe~zwdJE@aZyf=%{}I`i=r8(jq66B@+2`WoE2od zR^3+yYjVWp)^_`SD_iHql%leC7RbiHWwz$YteY^e+`D#+ozUR5w40}YuLE7G(~ zNrRot4o@&3`wPx6WtBl?@JghtT&8$<#Asxy`w>QL@zkFmV=Qr=qQO>0p)!=$5EwX0 zPF31ur4>p7$9rZtKMV2hr-oYn=UZpN=_k^>qZQlpG!tFH@;BM@{6q5g8b( z#x;99WZ1QAz0?B3!|fKFYjrNTRP{K$(k3e`s3Ih$6=q0qX)VFXGrC7N>gh99Y7XvA z^yB_MUi0W!dZ}7+x~L^r3z29~q~Q^GOAkz_@FU6U+q#sEw|q?(D+DiHTaG4Kuc-2I zx+ou43z296Ui-td&~6+-f8PvnNuklzv>H>ZC#jl2q{gtFO#2-foH3 zcy=aS7D5>WFQ8PaAZM^X`VV0Sz4(JgQ_5>iwbhMSzVI57>HEEL?WI# zflefj1lg8!_kAMkLWOj~E_XjJj!Kp*s&brO>5>)EsKV1>283-PCS_uB3`hUifuEPI zU1o-bEfO3ANtP+9d>mebES+DP!CS3PGoUV<;zd#eVx$o}KpUQD7zQp9LJ|p3gfBs= zY@9C2#?`_jn&DxWCyDSNre#7sE}6I5V2ituRLZ?|298wWoFd9#@aTwEXpxQyL>I~? zVF(t_nyT)DA+y59Mvv=eQ&D0pGH@g-SgO{(XRF|dR^Xv5e9thaAIZ1ypPL zp}{P%A_GUVLga6?YMh@0xV($)5j;N}qDzDo^L#fI+Qgk-P&zhzFr*@@^X!k4%;8*7 zrWTKq7!+t+22K=Xie1O9PulGuV!jU`)P{p=k0v%5If)(#QL)E(ueV@P*ESB9GRzqWgf$OWIu+B$Apu$4){&4Sn%f^R(Rff@NW(!@X>Q{)Q(gBvZ5_ zt#t!Eh7=)-O+&8O5=Dy#V!2tPD|NA|bqFEJZq86hrf5gT>2`Vq>2`R$j6$NC|J!aN zMm5^b7vtj$g=ETfo@vn?^cd0|@a7kuUmBLITK+WQxnBn%=O`qWnZ>huk#VH>9!0vJ za?U==4PH{Z@6RVS+gTXtZm!&^(-acx%Gy9LGL9SQF{B$HucTV@_zYI=y54ga2c~;D zLQ=aqLm{~`eP~N|+)j@m-40Jo6+CdgEH-;AEV@$-+xcRAoTiZ6mT`2F!i zC`5b3jWDDe*v-gzCE<8hZ>v4EAEOOij*!%DPE$y?%B=15BIAKV1_bGLh;?q_Y1KV? zFYd*QWk_lVXDB3wXYHUD8OI%*7V5lSPvr_4JA8|05WYG>&QVCNRM$3f#n8@AF@i5| z+Y*4@uh;dGFx6;3Sv;#dxoir_73$g;jzYR4&FcmVdPLEoyCflNUlJ4r=|LiXVdYXRJ^cJ;K#lcBc1w|OChqG@aGv^YQ)4 zqL9=MPE$y3Z@6M;J$BqduXgDU$OBklN$uznw_4M%Z*-%+4nodQNN#sHdJZW@dKBq? znjPvcEz&7xsdy^nV&6%}O0p>=SEvuY$Bqa&Db(qPQ!V$Tltq^Kf;JR`;(j?oQoA`r zA;IBtbQEn4H$sr&V?mMHVqNfPdP6H<5IJloi$YR6I71=1LS4JV6$6HJ2PKK_i^ZHs zRY|OEvV*UKkaH9g+t0#CFEWl7tYa;ysB{Ex>7Ype>d5uGxIf$>8!wwea)r9KhbsmQ zDMGqLto4R2?<*Xo1SW?obvZ)1bCcbip^#jeKC~Y@;-g29ZfC#atrPl}Y}<;2zl+n7 zllVAIA-VnGilP13aR(=bI^7>>F;UM-I!y3B#W+v#>mcL|h2(aKD~A4K5BnKVq!_6y zERkkMt~Kw#Papfs;#u86$(=gs%gSvKS9Gn{#%k|?A>BYpr`jFQrdM>v;VI0qns_-v zQoA`#A-N6W3T+TKLXd8UYNP!UzdO|wJWqPLOi%6L429$h^`QaT@kX5#>eY6>$E2k* zKbgFdX!;nImDOr)qnU%X$@wldBhg5r^ z_tO-T+a#_SnvgwgXF!nNuVn=~=Uy1_kla3TQG7Z{&l;gf_cNn|CwYtIjI=qbTrQ@Ni(=~Cy0S>T z7a7MZ)niCEQ0*5b5ooI5XJs+pk2i2RLQ=aqLm{~`eP}~=+)j@m-OfB7OQ+U|oF)|D zi=R0-)S(ECpP`Ukp+2-BJMN&zknVu@NY{%!{I+S@mc;83jei}4oTHFjsji*kXuWbI z8Ql*pi%N3f_dDh#h4EsZ)!kgd$Y~jpE7XTRWJiQ_KAMyaSyolGqOJaXv8BNNagC}E z1wyi$GZd05(}zZ6$L*Yy>9j4vrMN_OLi8awu<8+s^fYeuGD}bMM!~-USk`QHBM)n?ghy&PJus^H_2{JQ%G*BxI$aSjS!^U znPZ{TorP#LL8|%1G4t8`b`fsFFl;9K$)b?%GmFe0vjzrrd2hi=%fQeTl>BY-aYwPFW{7$rb9_ zFOG%=r*=U85-&j)vkjfxdB=XNm3$q9oTHFjsXlZjJ6^DpQXTy7cno?=x95G?7Guvt z7DhT$=Tb;+%ebOeOMSqQUa9SZa?dsKwW_JG5g%uVq;_+fLb_GvaNsD+7?G2VcF>EAhZ{9uNOypq*c9O#t=gttbR8AHT&SnE zbB02qh9^rV4lT-#`{_}n`3-ksmsqyVjP$Z7 zJbP5caFyE584Br^nYEu@WISB30Y!?DYB$^P_UM8Kvg#ers9s7T-9hD2NN)GILc7Nm z1BPq^`}L020VU5Em5BGpQAlbxrzs@2m0Y2%GVoTHFfX3lX;av74^ z%^3>GmFdycV&cmh5Tx5F>14gz&sNo{LL{y)mLaJfoS~3hp+2-MJ0j$yP%n5TvZg)A zjvVFHjHV)A8zJW?Bv+~*44jcn98jbfp&lA<>4wrHT9VSYceI}@3h8`ILgc3@Bv+_w zQ#m>?9q*WKpr*d1URF)Jr8s&vd5!6E3Q6te429&%^nYvSj`OF}P;h4LYbubw z20l(xNVl*Yp{`x!sDC_#kcQ$yoQi}+${mTa@)!k+E%U@P^1@Zzo~h& zY#HzSZPwMrHEoA}T)7mI+g7d^x|Th#tN}y1fenqHasM<6lKn`4A2Z#{5z@(C+0AJR z$!#mg;*QtpxSigWV%sV96;GoVxEKrG#=F#WlElXu3dt4fO)oNzJ2>fnCq=GWu9noc zZ1)?w-HvGd>mcMDh2%edJO3X$|WK7MZ1IH^8X*#CjD>^WH)ChBv+<)ecQ(6E(3yeJF}{a2N8%V?C7&P z34nevKF&}`u264!k#R&wk0ISbJ8NiESXE^Mu`lR2@E9#Cb-m6}NTyULcT9QKNvXao z!{1QP%N;@W`Ng@t2UN?QIz=Ieb!AWp<(s;J9z%u@YE{?Uwyo(5LMzO10O4|$)!7TO zo0AlBSY_6BdXaIsUn2zRcFH*obk=QAuJ+5>YSP>&i$YR6I7uO8ZbvyBol}I2Fr+&u z8oXHxdKuw?pS7E?LoV(!p1fA4DdVubEKGR~+Gm>hD}E_!)!yiYxPbQcv-=iQ#1Ub;B!)luBfLXKa4r&72$`7jOqH)-B9K5jARxTFl`(e zVf#!%>BYuzH$Ad+Hzf^$c#fu}7bfpLw2$*=rEpU=6@5KRZ{16`%FOKyEz6GE>9M8T zp%fu1^hy#?Hs$tl4UUq?Dd^+d%$DBAx6ExZS89v7!$Bk&09D@TjdVcS&_ruD>57>p z7Q1^O*Xz{l8;5n}5X;cA>;WGGf)pR?4c#1Qfv_xjq;$)jevICj+Rdp~CCl6fa}=d= z4M%$X2tT?Ts=&4jIyUV$=)${p93J^%bew$I`mnGpe5iCE5M(9rcbBl`V)!B-N^Oo({EXhE~Lx`)EWPYFBIl%}Z#Fw#EL~BtUbl5wkIDV(Y-di-Yg&1vgh{Tb*IskwfG))j z&g(S~@DQ%s&ljYVk9ctwv83X;Ctrf+U5HGC49&}q22eX zLtpftg!bc2r>1+4S5&XuR&&(Z9*N_)n~qCHs6lrVMGEBow(Y*Agz{0(m!@}9@>nMQ z%@fxvx7A#!t>&<8kNeZ@EJ&|e@f^~M@Gga7V_tkYwWRJEZAqTd$Sbv-a5Ur)zxJIQ zp-Z>3UJ)`Ooeoz$Cpc*@kVP%2$Y|ZvJQ?PX36=kOqq&FMG~h$mOL^WF;;7d&57<`} z^nJOe_0VTtX@jQ#N!E$9d?k*wWUmHR^h5jk{)z@Vz2xY&Gp9&LZqv{0_S4<<{XedL zYPYxV-nH*{>-+25_aFZ?2pS*tkgi8}Y_Jn_)O3}j)|G0kJ zeouF{oA~9QxmDf&^7HcTRDO-f?W(_||Nd!rea}_>aC>*(ZU5W5c71<)clA4_Vu8F> zTt1r*|H3JKx4v($e)ruAZgGX96E%nTAjX_I>;Q?fqY` zcx11LT^%<3roCT7M(b{$pEmd1@&4~O-^YGG-m~I&PhS4p=MU@c-`o4EP5bux{i~<{ z@BjSYr&rgzS5N;}^=9_w!?*2UumAARyY}aQ{_xB8pMU3xhNu7b`sL>rpWl6W$FE;~ zes}Z!P+uNJh<7@r$x&G@*0B_#B`0jT5DbDzh-@X3Zx1VRXs~_thZ`!x>zit1# z_`~woAOHO7Rrl?5=)=c-*R15Af)1CpDgPWG`bk5C8O% zzrXnLyWjuX-UY*Y&HJ4%W6T&9zZB>92`+Is)c>)5dpzCO?Rz<}?jK`{;TsMCl)v~P z_{_)GXlC7JN1%tD{sf=8j@$d~&HCfV*Sz?3%W4ltDE}5;9PrQvZ{SCZ>YLf>n_2P8 zYz8ZN(Q%L$v)KqIhmqZvu$1flKXSetjXZ30L}U+F1iIxmto7=a+nY!b;Dms?kd1HRPZhvdVHW^1hijc-rSdB@iu%yxC~5Y7x)HO@0rRD0J!xY&GMt zE`_0B>RND^D}HCIRUI8BC%@N_2&Z#2xTtlGrtTEt>9?4p@_X?xkK%GZThP^FI`6z| zS*Nh3jvS!z96avRDN<7y#e#BHbKbR&@X%x&tSG|nQy3}PHjZ>g{XK?7)NJxC0jO}u zPGOj7a$ji8Wp{`->9|?)?Sckh`YjJ=+ZoU!OYiQy!YFSPS9jEjM}s4#k}$sF-^WW<1{->zVv0-Mjfr_U$j<|Xe!>Nwc2oL|AS zuVMF0zGcN>%}!wpZj8c~cK>*ZeW|<{D(Zapliw>V-&+}#-ZBTtzIv~?xv0Q84hbXl zQ7l$IM>XTwTKTpjFs5fv)ig%daVu_?z@SRyFT6HLBuvNEOT8}?hjupS| zjA!QcZg5MZXX0ess$AI}S}l3kSjN#uJRAa(Z)w65eTAm5WfLVaV;G4Z2p@%2h-!tA zI4^4^^fc4;;WVcUlzdAQ=SsgVNF>m4)D$TX0~uY}#bnJT4VvVvc;uyy-iVWNygRG+ zp7w2ZR0&MSt>${BWrfNk=UmcyLFui86DuD=dzmXwEV(XG;Wn8Um!;A^B}uj3jgq`< zy?^CuzKRZ&liyoayc?>pRiiS6+%`P2GLDc&RI^NeuVK3aTcEJ1oaWtgla~vGcQn`= z|K5V8%Q^=scC;3eaa=2v$uKLPkI`}DvI;Jv#a%SJoy=RJo*In9(!DL9Rh@$Zx9A}{ z`Mm|WC06+D?Y zc!``9+nuT21S3JInXVbFse2V<{CkLLlifAV6!nhRxTe((4NFq#yk@t`$6@0nmCIVt zbCi#RqNVaWm_`>unyi@?gUbJEUi?;_wMO$%eoy5WJ*;IdaexMc%j!AT%SQ2r_1kp> zo~#c|FLITpFk(5va}ZixgkwA|{;WJAKzes)p{~hYV;FB%Oy>o*OngfboQ{i!p9D5< zmS%VJCTjGFivN1w!yH9h@XLyEQph-bTj7A8e2Z6G?+Y8_s_Hm&5dRjYsN*UUI}`?w z&^6-$P`boPM(MA8yHcAIP0DOe3fQO{)^B+v7@+SvJVt2)%jZ&^D5woX)|^;d&2fYp8w(h^n4dGQCA$X|E>*p!@gj)sm;9&%Y@zxjw~x96T_3JA zy}P&s{aaj-HgAJ_PJa&{h0TGpMd#pZ7+<3~O9F-wA#+4>zuxB>M~LDBSETBbGuTT4 zhSjNapkLV>)RWj8%az^xx?Uz=rWa!&V(96-OVb%}!r>UzaSe_TgK;|yhVmmYyc=qV z&X#Wb;X!WH9-M&<;|ELB4V$AdT@QysZR-m?R@aQiW#_!am0@$Bd@Jt+9Y*{39TTuc zL{27rce$*i0jR)M>YKyqvr-!oF1|Dvu3@#YBV4Zb5iq!&%!?Pv?qv8y^`7!No5=u< z!1(rLjy3?x$wS3RCIhda1VJrV1_v;_l0pL^MIMm z0~THMWeyY$IRnf9(<6W_Rc8QZb`Kag9)WP9mQUwJ&2|{hFB^vxH5kr5g*7WZXM!`! z1kC*CoF1N5`@MzQLd3?*4;pP|69O|`h2L|$;m=Wd6jLN%T|dCdeVH#XxMUwu z0;BhZ0FvrqEZO{yz=&4r?_s704H65)B`f2|WK#QRjz=&7^Sg#^sK zP+uH|`eNgFr9}6E2gUb67~96dCLLyaEZzgN-?&0%zmbK_Gd8+6R7{6;^(YgZQ%t9R z3k-3*5Au6>OVqzRFQNymj3dmXc4Isxt2QDqtUCD?&z#zMaG|a}%w)}YM%16pIP(ty zvsetVUel>@=9o^+IMb@bUK(43!VUi8~IL4%opgKsVWU`~`t<6uNwsp-()BaCh9!-cH$Ml?n3JlNGj z{Tsk)^>+f}ohO|ace~C@NKW-8EKZAW0mFl!zvnhFW z*7&#J&E_R|tY=l#X73X=U6~B1(PZrmP+Ilgp=T5|R_Z{qBU8yJsR()UTvc?o^!eI{&gdL0&`@lIaEvoj@ULhU><#>}r0S!7X~ zFga5!akWzr3KlyCM)X9!#j?_v5?l>VspC){m9|JVFj`#|D9ie7JbkS&Si7Dn5jndX zM3_x4Cc2=$bsX1?@s}0Epg4jv89p%cOiv^?MSWV#f#*^75zW+XZw=aoj00_UCy9n? ze2_kTZfi6sh05=v%3N_osNC)q`4JjRK)vT+WPON1(*@9q)yKoEeh<*3jCbO(H2y+O zyzz*J$03!kp_TYK!J;SNJ+3Yha=s_nf)7?Bq}dSYawYuza_L| z`-Mr^K2{bp#PYKoVJ?v62m>=a6c}DrSqshrUsq(9*uthTdB{NZ_N(}tm~98mH~LFEe{!P;CXmN4eU-vgLS|T9`Apuk`DL8zi84gSJCdT=lq<&OszrZb^aWG(Hp~*eK)2IBNOJH$`0xyl>gQmxt z&rpQ8RGJ~zPvs@!&^UB0q|S)^ASV@Xu8woNmT{JA0IV<^5sFq_h3pNhBZ#b5)kT5% zog`Du_JPY+{T3u$o9~sZL%#<^o-}qB9v?ou&x{VgdZ%hFGVk5 zoY|LTPg-n(s7s}>&qy;eTELBIasmH=(E`zAlTi!&lPVWbE$kjFFd>va9x9qA`-Kzx zx2Pq`4;JLasH`B>-tdcu*5*a>s7)MQlGMKBy~4IP9?MY~4OTQ^&^1@EXT7In zgQzY=LsX|h(ngGqh%T7St58Pu{xQt%9}y+He_@8|T|<=F{i9*I>YcQ6ba~FKYU{#^ z{haYBsJ+VXA$;WQG0SXkq_g_B(4guscsJDVLk>L*M(4n$(|bxpSnWZ)2TRr4ftihs zhHf@CFpG8IEFn`y*OH(&s$J~<)nU-sw_O*r32kBSYwQkZiJyIx+35MtG| zSKEETgJSmuRYmVOCKKgQx;}E%grAb7YWZQn;3oPlYPR0p*shPWI7DbKYA55wG+!Eu z8O_aQUTksy7AJ+SCBlumHw=E2tAvxyXAaD2Jb@*CuO>56*M}=o?-dr9ojumM>YaqK z5f=J;TvOq((RW{EEyCPvds+~fy#>tlY+#n(PM{ZtrE4MILh*}wnixkyh<*&6JaUCtkxeUMupuPt@w3hz|%w-hTk;W2OOXByqyUG*ETs8hos3S4X&wwI3)ptpC zF&_Xhs}1T>VpR6vDYg5D&F*uM2CBFW_p_ZnO1ko5O22#@zF`}O9JJpfM4mcqego^(l}Fh9gPmKvz~eBEqab55Bej8{vL7ezhX0QfYx< zMwe8z87<&S(>Ob6X;$9@%=&%+v)TeAvg`bCI`z}w;KuNgb0JKpwlm|P8XJc-t}vLf zok1j;>o^iPR7Q~wZ2B7Uef6QRi@EyIfmzNNFz=^83|#GQq7|0UfM7Jc8yJ;nvJbkt z7|leCUe6_B^m+!78lXHeV()s+5qr1a^Bg`DDV#jIK8m&MTTClkOM`b#zfIh6JeK}@ zh#5N<)Erw2sI;{ZPm#3{b}`#N)G*c8fZ@29t~pw>sQd+nf@R|@*Pe0aI}A^n;)9Du z7bg8Z>_MBuYZ@Z^Mfo^$%$0`$vs_qGNUeSg71L-Y)J~N%Fm{5jx@J^I!8zl+R|H(h z&YoY>y9*~VeF&K8vB7aP9tzCrVo=+yPCY8a_3onW0+zi6OB8-j!I{P1P>Knx>9?dL z*tgUa%6;bBM(uqJ1FN|}OT_J~bD;hSEiewRw2Z?tP`j2nC@QpZ7XKxXWxoFi87d#A z%-{UQz_5UI4$LT_bH*X1be#LXVD?sTMFyYcSOYVkOl0~QZ4p*e`9Z+OeCA!~Q}1}R z+OYGZxr6Qlr=aGPqi_*nmHl#jYJV`!>V>e*t$_6oW)pxnO}f8tmj2ol4|dx9atP^L0Y8h z_rM4c>V6TIcBZ67Dvof0s;&}CHkn5p+s+ixXy-y&nw<+3CPu%Qzv|1yJ5KtC?1MPF zoeNsK+Ji&~O>d{&jp^;cOs4^cC9m^hQ0pBcvTghsTU>Qau8{ekfth_7?Nv-}5ka$i zPo;<5d#no8&FITyIaCCbt)CXR)bhB)J8txw$b*j?t~NXKBE9AOa4o4nf|3=>=K^N= z-cj0OcMVZtvM186^^Ri^tG$JQHyaE$m-P(=X8llrSw7MNds^dfz|39+X7xS5tTvMM z5j~OfBR;LR5QJcP$iS>t3)h_K-oVWN949*9LtNjKG zBcodP3%{~C!Z@{Y2q}Y^j}cFX`N$BAjw8%VTT8S^(Y4T>%WzJd-Sh~=o5>W^b~|Uh zYwBmEiHP+f0A~3h!0__O8Ngml=U<`ks=UNnP=7n6RaTcDM>b#BBJu%LD zX92S~C*qCMm*0z4aC$eQO{L-k+unE%OVL^d=5X2ycB=azW^H#D7Hf6@u1z}wGSAhX zCZKM(5&E>abyO`J`fA)^JQMLiFF*cwDx;6ozio`j#t|rbh)$?PwiE+kv32a+_ z2{6(PbbX{`>G^fZDLRfGgL)589W{Q0SwUsKeoHEo&Vl#d?g5mbK5jDoEMK0oUhAt7 zUF6ia1Ql7XI53O<0z+$+HN)!Eo?%|AAEZLZ{J?kUEV186+|;$ulvmFW ziKn&|Lf>MB2o$T~0A_Y5FstPOX0`!yIDdh)8-5WpM!z^r)NZ7G7+R+6mzJo;bE1!& zo-% z@hw8kR;LNfd;q{)zQH^VA04xkHKXYnPbBl#^oTeZ-7hAN`Z6MwUH!4ZtoJb>goUmp zlFAKcxxbk4kg$#;sAMooTa-VeW*fi4x-|Soy0_jxtaHOJdFz^M6%~6Xx3I-cha*a7 zJPej?x&`3{^_Num3e>L*+AQA|W{=h?XN4`UHW=Ag3zMN_(5ubFIP;@3ujQ!{wIbt8 z=cV18!-xROxab9^Yo`9(_yL{=lkwD_8_uzbjrQp+XE-MYZoC+q-EfZPX!j5E!}M%o z;Oe`^D@7WR?w7ET!z|8D!H?x+0ki)6z^tb`FpNK$7w@V1WS~mN8>yzoBM1@LS&^<{ za*JnRG`>auXN%e3UbA`}+;A*f*Nm*t`w}(jdS4PX>Cy4l?l>t4>U*WkhQNW&%SCXQ z<;zo{Z8e!N7t1*b*P+RCV&KM4QFqN=z{RL`Em`_js|C#ZHUhJpRA7GBu;Wb!#?m!g zjTpF{DHgWfD^xsNrdG(8rW^;!dFeH(!p zkBBm_#JrZXh%?sWZs4>e#kDbu}SSBUH;bIW){WOL~q0*2F9elOm$5j%xqHOrR= zhNh$65<(MQ0LQTP5CUd>v4L4VU1X9dKP6+)`td+*G%DA%)K+&F8PRIP0<+pL=B4$U z{9Y8?+um@;I?VD}ag&#=M?OxN?Q|aa38& z3NRdO`g_D-?OaGpGgu@U>bK;a=zYQ7S2;*`AB)igGruh`i_wP_uXcPLMKF3U6t}3Z z$2jZ#1kC*7%wfH_fLR{`6bs8UkJM1ZC7O@&XBJ|4$iN7-%b8;Dt4_!`s-|=t?khWk zrTGtnVvHAKhHCC084hO807IF#d9BwK&N}Pu(3Q06x5T?`Z`jjzpOM_E??#24>buNq zHV%dc#XPd+h<7`Tt6<~o{SQ3hmb)L`akb-tSq@)RrWx-f-fcVwds<@zcvbvv5bst! zn{oDD7V}y@5=yq^@nG!ZV3RYz8EG;(ddBJfBZbd+4!QBh+p+D{f67|S|A$kG#pqfv z?iELP`R)AJh3aO(tqi|-6E((y(TKxX=f(Kb{h|z*JVKE*{Gt`BJ%br)wdTN_pVDc~ z_&s*F)(~N?njIC{NOmW&yNzauftw5n2B>EMV>6s%cdOk)`nbiIVPFjPR^N) zsBX(R>;D%Z%;E0J46K6WFB_6=?p~Qd|q6K zN^f`o)St+bt#@j`)OO~Q!YFmkUen4rI=R|7q^Q9#Xr?eMHLRg2j8{?Ytu0^{QwL_X zk-*I70W5JY_^(vofOY!WlftZbmr6_HB~X@~Ux+;28{E(IM0@~7`;i;3Iv0KclRaVn zDi2#l(Wsm$@qLZm1sT~r#RYHpz?Y#uH!2HoNa!5os@a;!QPO))9)Rh3loaaSsL4~X zdrw;pqiHNZ^`-Hx<@*4$-on7lb|&e|X&>ww&hdk2ZWP~I-y>jt$B8be9gkIE@k?OV z&lecvs%MXlqx=t-huZrnla?0=%yj|sGStV&IBuKH3u9CIpyz<;tZ2oib4B|NyDt=; zsJ%)=-RxCFqw&s28MF0as@eKTg|PD@3}NSo>SODR5ax zq_6obfmx5nkkV#1qJ^1$g*s$<1fdDjrATu#9Wz>2Dt<{dRlj$%oiV-}roG-ju7=rB zi8>a3&-M0r9#QXKxcO~;@lv7QA({~D{Ua1(`e_4?u=@v(u=@v(u=@v(u=OETY<&bB zY<<+t+WO!Tc7E^(TVE8X>3-o6w!RR0It~G1>kDRVh4U8-sodX_W>w`zw z`rr|^zPPFSd+-RuZv+T!oY?`GOxEiUnDqf7<=E=MfLW{(7~Tw>m-1v=A1uPw=dp6k zH|w_!%=!iZ!v&-B!Xxzj$gi_|8qeM7T1cByU4VcR*#2L0knS3+XsqP=>dtw6Sqki_GttKN~9^j<4TF5{to{w(y#%{T5yUzeAX-O8dlE zOa|bIRGk53k}M!y3vqjgSxpGvn*Bl0%HkxzXjr9l5F>Dy*>8N?7(ZnO)xD#IpYe98 zosEwt`VI4~)!YIz9}gVSd|$u_lIq_4jZMa3I@&m^!$okryd=}WWFuw%YWwjm=@2pp znf9vtFwS~U;CO(U=(ptbDt{sW)c6J=b-RDj4qnfN3=E?Mnl9V9;AJpe(!a@Qkp4|} z$KgyG55;SSMAE%^eK+Gw&jx0_hQbSHaweMXDvy9A8gIt~V0r|pYJM)bzVyD(+SSj6 z@Sx#{3|?Cct!yygcHSJ&R>YKn=Z@zu5ZVFLqY& z7rjGxhx}aNFM6Mu!fY$FCiNYXbWI0dxs%c3+;9Ycv9-Wo?5sTR2B}XaxP4YJ4(s+5KDV=Y|z!{(E3n{|n6g z7Qig;0hsxHfLW~;8I@Mc2+Z>TfLUHMFjRNNC29W(qgu^$R#F@7p3I;hW zQ}tB=vtBuL->`iC=*VF@NQh*mK|&5j3*;ndY?e}0tD^#j79!_D+KusN%nIYr(HKJM zjg(LI{}K7LT&76DH5-QrsoCeaJWOYR3z=+;S_Q*pbotP|@v+0KXEoJo9F2Wzu^38y z?d>UG*4v>g30B!dUWWNR$mlhn43@p=%2cl!-=JXJXqt)@(=n+QH@kv@Y~v+p%6^|| zIbiq2^LR+@cKaMoXL=5qgMJ1S04skc=fv?#K+0$#5_lDFh&+`6xXhh?slB#&DMD5K zfG#nnhehG1o(pd^+S!M?t80mpGyj%DkbT5eQ+gxQ-q%8Yv43mz)6s3jcp|sO*TOdR z45&{rJu!;i6dyqfdZxG-jlaOL6XUF2g8-k~GZcUM??u6to?j$o8O;4Yl!hmMFR>4h zZod~5jyearh2fWkA0KBm#sn)8`yjk(zeg6D{T^X3TOXkvyF=J1_AREV-67b9^2B)O zLit)0HQ0RtWNY^Kt(FuQXnYlz^_c+XHVFj+CeKNeHu;M==yOnjZu=nT$kTJIVOqki@rf!^^*$ke+=c){#$5+hCD2zA`%h2g7yk40xTHpzn~ zlgaim-wg?cn$JLmSYi&ug35|WYP0q6gFepctx(pi*HuVq|2@yQV4T}RByaiIbJdJK zpmU|8FlX$pLFYa$fph5G@C%(Ajw1LjyqGRFey^Z&TMKlq_dWuSy0-}4>AjDjm#!rO zNQxtZBF0an6hO})9R0Qy=v>bLR2m=09JDi_wAtcicna(caB7*XK>hPGNXT=X6n+NL z&0Fw+>&wp|3``w|VPS;d%T)DOu1hwHKD(Z9} zuueMz?{gAa@O}m)s@mNk9%^Th@C$_N(9Qr0)7C0?Yb6jvzg;Dg$k6cNb)=ELtNBB~@HFUJqEnl}Shd3FL!ftq{7JJ1$)7Zz8~Kxd2BEa-94LTx z22p@+<18;6D;W*O#?kyvVT6ed9})4farQn_q&oW<#Hs4H*yqY4c!Aq|s!`@|XMnkH zYl$Y)I*0eaBH7mJ41sw(lw3)lmmCMhFHsUZ7ubvWkywhw0*T;S9E`LK^R-ZsY5om* zU~8@)3ctr7@v@rkNd2$rtmH-dID&?Xx5$fBypdX#_&qA41s~)^`tK1;@Nu+Evu_jo zh|c0V4wKk^5B6ujha=9%dF~MvXFd*Bsr{b!8$mI{yQJ$QPuk`s9nO9av2WvWOWE%w z{QPu)Nc>)6A7l{O?-5qB$*aS41xfq}Kr|n^p6RzF3(5KzN5Q0xv%Evb zSzH_y#QH{sTB5c8z^wNtFzbH>%<^~P>=dEu`bb~1y%B8laaQjal0x}kl&2{F17>ex z0!z%n@rit6oV^`_B9FnP`=H>@@Iem)!v~#M>>d#65c!L$XY~-B`sd@UPXgl-_<;0n zUJOV3J+c>kob|4RdJ|`bCSkZ_HHJ%KcXoa}R^j6kIFAP+^z6xNHoPHxg!VD=EVm*e zi%v7V}@I%|BZQ?q@X)nGBsYG8o*Sy5%9xz3bF`B_Da54~$-3urzK-x^PhHY|2l zmelsa?9@Zs{DahCf53d&}{yy-^CxWG!WKB*W@jaI6?U zh^zUy#94)AtiOjLDmrjyHu|{4SwRYR&R)L|rF}k*G;=#E(mRbl2!R_uh{x+VJZ^Rd zL?+Y+h51V(0yzUnD>2T`3eSl8pa}3;ZVxabdO8P5q_L^gUl2^ z16YpD;dz1t4B>3LKH}_(kLbx^=S<^S>6{XZ+SdXHKu+VU{>1)%yON9k$@m) zAN^GA{Jge+Lf-h?jC&eX4hqiXV|-u>PB`lh{m^77@AtE=Zf zU;necqBC$2fBEV5_CEds=C6JVz#rf5ZvljB?*Z`L)n9)1w{JhsZdX6nKi;%&=YQM& xdGUwkuRs3z)vJHKI{i=o@#OXECm-+EclV#~+WnJwI-*=X`ImqBpMU!O{|6wY2x|ZU literal 0 HcmV?d00001 diff --git a/osvm-audit/osvm_audit_report_20250801_222032.typ b/osvm-audit/osvm_audit_report_20250801_222032.typ new file mode 100644 index 0000000..5dd799d --- /dev/null +++ b/osvm-audit/osvm_audit_report_20250801_222032.typ @@ -0,0 +1,21366 @@ +#set document(title: "OSVM Security Audit Report") +#set page(numbering: "1") +#set text(size: 11pt) +#set heading(numbering: "1.") + +#align(center)[ + #text(size: 24pt, weight: "bold")[OSVM Security Audit Report] + + #v(1em) + + #text(size: 14pt)[Comprehensive Security Assessment] + + #v(2em) + + #text(size: 12pt)[ + Generated: 2025-08-01 22:20:32 UTC + + Version: 0.4.4 + + Security Score: 40.68096160888672/100 + + Compliance Level: Critical + ] +] + +#pagebreak() + += Executive Summary + +This report presents the results of a comprehensive security audit conducted on the OSVM (Open SVM) CLI application. The audit identified 793 findings across various security domains. + +#table( + columns: (auto, auto), + stroke: none, + [*Metric*], [*Value*], + [Total Findings], [793], + [Critical], [197], + [High], [344], + [Medium], [80], + [Low], [3], + [Info], [169], + [Security Score], [40.68096160888672/100], + [Compliance Level], [Critical], +) + + +#text(fill: red, weight: "bold")[ + ⚠️ This audit identified 541 critical or high severity findings that require immediate attention. +] + + += System Information + +#table( + columns: (auto, auto), + stroke: none, + [*Component*], [*Version*], + [Rust], [rustc 1.87.0 (17067e9ac 2025-05-09)], + [Solana], [Not installed], + [OS], [linux x86_64], + [Architecture], [x86_64], +) + += Security Findings + + +== Configuration (1 findings) + + +=== OSVM-002 - Solana CLI not installed + +*Severity:* High +*Category:* Configuration + +*CVSS Score:* 7.5 + +*Description:* +Solana CLI is required for OSVM operations + +*Impact:* +General security concern requiring assessment + +*Recommendation:* +Install Solana CLI using the official installer + + + + +*References:* + +- https://docs.solana.com/running-validator/validator-start + + + + + +== Cryptography (163 findings) + + +=== OSVM-CRYPTO-f7bc881910702778 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-546bcf7db59b7255 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-0919b079cddb0d08 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-5cfb051bd16dbdea - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-12256568ffa95646 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-b5c92c2d35a6aa23 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-54b3a86388b76c62 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-3f49f73c4df44be0 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-b9be119638d87d18 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-8aa4e605899f7aa6 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-332db3a4ea224f4d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e03a77f6422d29fd - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-731179ac715bf46a - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-6927a082bb3dba42 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-54dded77b1e6d303 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-0a7dc131f9983032 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-4bf8d9b95e10a642 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-628870345ac14c47 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-a1fdae9bdad8bdf7 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-63368d4cf8575a7f - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-b98cd23a031725b1 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/token_integration_test.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/token_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-3768812dff0d3fc5 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-cae1a1fed252b2e0 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-75242467cd3b994b - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e072034b1cf6eb84 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-841a95f9ebac03cf - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-1e5edfb59abedc82 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-b6a2a81c185a7dbf - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-5e672147707bc934 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-725230a021f6dd16 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-545e4231f4aa9349 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e2d6cb4ddca0f1b0 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-9ba14589e28c0b2c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-ebbae05e1c8f0c7d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-6d6acdbcdb8aac6d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-721edd285e83acbc - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-cd0f9e1fdb839e02 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-ec28fd14f84c63fa - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-4d232641ba85a927 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-d6ee48449f4b5bbe - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-0e1c13b326c0fd10 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-50651d4a4fe74592 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-0527345219c53266 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-326ef1fb4aa224d9 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-aa555f2254618265 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-2bdab565b24c52d0 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-0bbba94c7b5f05c4 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7e89fb3e12fa5975 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-1028feb859ec1ad5 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e418d8ef77a94e10 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-6936937e8c22380f - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-f8ca25d23b075345 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-4806ad5564f32272 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7121e5d7187ecb06 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-318598db35bc1523 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e5e8b45dc7c36914 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-1a4e92245bf522a6 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-1e18f48872ee62ae - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-2f980010885f134c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-002c48dd22cb2f7d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e346ce8fa6865473 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-a61f91399c6de6c6 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7cf6087ecb5daa5a - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-c2b46030b2989924 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-4899379294bb035a - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-6ff181a9ae9a4dc7 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-229c9f6864ec7d1d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-b80dd2972c317f9b - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-f2428b32bfb25eb4 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-05b98f43176a3dc7 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7e44373e29483791 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-9572b9ad92bad04a - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e24baeb54c95c617 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-aa664967fbc077b8 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-332a5e391c08d7b6 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-b1deb6e3311b9043 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-23bdb8931625e94c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-239be6b2617a610a - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-3146a191f2a9f57f - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-ddaf5007dae74f69 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e03dc645c9c64a6c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-c8e21ec3459ca470 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-af80be5ef1a68d14 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-9e632bf9dfd43181 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-2b4da1cd85a1c506 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-6c39b6da17671f74 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-c86096c2774fd8a5 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-87e9e0c854a0481e - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-1c6ad52f6db6c585 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/token_integration_test.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/token_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-ae1e19187021e6f6 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/token_integration_test.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/token_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-5642101702c78921 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-70ad5056fc60fba0 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-adee51f77e573514 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-efd90927ec86c08d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-a5ea0581efa7f886 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-72d49c0fc6402fe0 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-72a2280220ece260 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-8e25eff943320c42 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-d6f58dda9cdf4757 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-da24831c2c527c5f - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-f1404343c5c0706c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-b4ff47681850473c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7c83df6daac3c5d9 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-5142f88254ef69ce - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7f942734d2821284 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e1cc4d8efd89aa5a - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-1a2c4c2bc45d534a - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-9d848f60ccbae524 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-0143a56233eba422 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-d773263112aa0448 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-1eb96025708c5cf1 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-299f515f6a558b7c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-d8b29744c770b7f4 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-dbcece043d53bf5d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-59327d04a56b1e6c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-3a1ebde68d133a5d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/instruction.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-d97cf1dc14bd663e - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-1f0121db396dc9dd - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-15082c5e7181ad26 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-0a1d62785f9d92cb - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-6e9ffc4e1dc1acba - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-9ec57b0378445b4c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-11b53d0ab4eabd5e - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/state.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e7b68e6ed251a6ee - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-98b21edf35f9adc4 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-73c1a9d344487da9 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-0c64920adf701301 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/events.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/events.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-f0c6e4fe8a83221c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-ff347f7d36fa4ac6 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-b4a61863641619c9 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-64578f45bc599fbc - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-4932a39c16890955 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-42914efce7f25a4b - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/lib.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/lib.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-98635ad4c0ec2c25 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-08fabfb5be013364 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e4d9db39ae90f5e0 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-58ddc14607e78bde - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-11ecfd0a13ff05bb - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-4f2f8e67e5eb34cf - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-8ef6a29002f25f0e - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-db2d2995eb744633 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-93897b30337da16d - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-6f78155e8968e524 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7e6f04ba337e7314 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-fbcb164bc9303406 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7d3de41f04b4ab38 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-4750fb462f2781c2 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-a06d059f6c0392de - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-97689d021bc588cc - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-cd19e86c948b559c - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-19985928a1696e1e - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-fb798789d882c5a5 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-d9b844bb59d9f506 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-a731ff334d25ddc6 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-af42660c74a6d5c1 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-9a91f532b268b43e - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-65bb0d8efc95b95a - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-e8b5ebdd038ed4d6 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-c1f6d1c9d3cd0adc - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7e650e0d2c099d6b - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs contains a hardcoded generic_secret at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-f8c7659df3f40d78 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/idl.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/idl.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-7ba790e1b7b72161 - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/idl.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/idl.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + +=== OSVM-CRYPTO-aaf5635db470831b - Hardcoded secret detected + +*Severity:* High +*Category:* Cryptography +*CWE ID:* CWE-798 +*CVSS Score:* 8 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/idl.rs contains a hardcoded base64_encoded at line 1 + +*Impact:* +Exposed secrets could lead to unauthorized access + +*Recommendation:* +Remove hardcoded secrets and use environment variables or secure key management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/idl.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/798.html + + + + + +== Dependencies (4 findings) + + +=== OSVM-001 - Update available: rust + +*Severity:* Medium +*Category:* Dependencies + +*CVSS Score:* 5 + +*Description:* +An update is available for rust + +*Impact:* +General security concern requiring assessment + +*Recommendation:* +Run system updates + + + + +*References:* + +- https://rustsec.org/ + +- https://docs.rs/cargo-audit/ + + + + +=== OSVM-100 - Dependency vulnerability scanning unavailable + +*Severity:* Low +*Category:* Dependencies +*CWE ID:* CWE-1104 +*CVSS Score:* 2 + +*Description:* +cargo-audit is not installed or failed to run, dependency vulnerabilities cannot be checked + +*Impact:* +Unknown vulnerabilities in dependencies may exist + +*Recommendation:* +Install cargo-audit with 'cargo install cargo-audit' and run regular dependency scans + + + + +*References:* + +- https://crates.io/crates/cargo-audit + +- https://rustsec.org/ + + + + +=== OSVM-ae65ee6118b4e9e5 - External path dependency: aeamcp-common + +*Severity:* Low +*Category:* Dependencies +*CWE ID:* CWE-426 +*CVSS Score:* 3 + +*Description:* +Dependency 'aeamcp-common' references path outside project: ../common + +*Impact:* +External path dependencies may not be version controlled + +*Recommendation:* +Consider using published crate for dependency 'aeamcp-common' + +*Code Location:* Cargo.toml + + +*References:* + +- https://doc.rust-lang.org/cargo/reference/specifying-dependencies.html#specifying-path-dependencies + + + + +=== OSVM-44d64b2438a7da19 - External path dependency: aeamcp-common + +*Severity:* Low +*Category:* Dependencies +*CWE ID:* CWE-426 +*CVSS Score:* 3 + +*Description:* +Dependency 'aeamcp-common' references path outside project: ../common + +*Impact:* +External path dependencies may not be version controlled + +*Recommendation:* +Consider using published crate for dependency 'aeamcp-common' + +*Code Location:* Cargo.toml + + +*References:* + +- https://doc.rust-lang.org/cargo/reference/specifying-dependencies.html#specifying-path-dependencies + + + + + +== Error Handling (11 findings) + + +=== OSVM-734b0519b680203c - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/tests.rs contains 34 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/tests.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-b0aacc351c386576 - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains 13 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-0979e2e4a1e785dc - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/token_integration_test.rs contains 9 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/token_integration_test.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-1900fc2b158cf429 - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains 46 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-f14221d73edbe829 - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs contains 12 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/instruction.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-6254ed304579461d - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs contains 12 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/events.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-432fcf368ea0ed95 - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/serialization.rs contains 6 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/serialization.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-72cb5c634f7d90ca - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains 13 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-b461ce88aae1a583 - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains 16 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-2da1f15d9d3e60dc - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs contains 10 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + +=== OSVM-3eef3211db68bd62 - Excessive unwrap/expect usage + +*Severity:* Medium +*Category:* Error Handling +*CWE ID:* CWE-248 +*CVSS Score:* 4 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/idl.rs contains 7 instances of unwrap/expect which can cause panics + +*Impact:* +Application crashes due to unhandled panics, potential denial of service + +*Recommendation:* +Replace unwrap/expect with proper error handling using match or if let patterns + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/idl.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch09-00-error-handling.html + +- https://cwe.mitre.org/data/definitions/248.html + + + + + +== Memory Safety (1 findings) + + +=== OSVM-08961f9a5861c9b8 - Unsafe code block detected + +*Severity:* Medium +*Category:* Memory Safety +*CWE ID:* CWE-119 +*CVSS Score:* 5.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/idl.rs contains unsafe code blocks that bypass Rust's memory safety guarantees at line 1 + +*Impact:* +Potential memory safety violations and buffer overflows + +*Recommendation:* +Review unsafe code blocks carefully, ensure proper bounds checking and memory management + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/idl.rs + + +*References:* + +- https://doc.rust-lang.org/book/ch19-01-unsafe-rust.html + +- https://cwe.mitre.org/data/definitions/119.html + + + + + +== Network Security (13 findings) + + +=== OSVM-NET-98bca3932cc50686 - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/validation.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/validation.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-bd0d1c90a8a23429 - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/validation.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/validation.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-c7b63e5bd464e030 - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/validation.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/validation.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-b45e89294a488fff - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-c41575f1d7ced39b - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-5fa83835c9fa8d02 - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-6f76d58dd7ac7e00 - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-7571b913226c32fa - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-7610c979e81ca22a - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-9eb76631e463df0a - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-1078fd21c856e01c - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-632423af446ed156 - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + +=== OSVM-NET-a02cb04624073429 - Insecure HTTP usage detected + +*Severity:* Medium +*Category:* Network Security +*CWE ID:* CWE-319 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs uses HTTP instead of HTTPS at line 1 + +*Impact:* +Data transmitted in plain text, susceptible to interception + +*Recommendation:* +Use HTTPS for all external network communications + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs + + +*References:* + +- https://cwe.mitre.org/data/definitions/319.html + +- https://owasp.org/Top10/A02_2021-Cryptographic_Failures/ + + + + + +== Security (169 findings) + + +=== OSVM-101 - Dependency lock file present + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project uses Cargo.lock for reproducible builds + +*Impact:* +Good practice: Lock files ensure reproducible builds and prevent supply chain attacks + +*Recommendation:* +Keep Cargo.lock in version control for reproducible builds + +*Code Location:* Cargo.lock + + +*References:* + +- https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html + + + + +=== OSVM-102 - Comprehensive testing infrastructure + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project includes testing infrastructure + +*Impact:* +Good practice: Comprehensive testing reduces security vulnerabilities + +*Recommendation:* +Continue maintaining comprehensive test coverage + +*Code Location:* tests/ + + +*References:* + +- https://doc.rust-lang.org/book/ch11-00-testing.html + + + + +=== OSVM-103 - Project documentation present + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project includes comprehensive documentation + +*Impact:* +Good practice: Good documentation helps users understand security implications + +*Recommendation:* +Keep documentation up to date with security considerations + +*Code Location:* README.md + + +*References:* + +- https://owasp.org/www-project-application-security-verification-standard/ + + + + +=== OSVM-104 - Automated CI/CD pipeline + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project uses automated CI/CD with GitHub Actions + +*Impact:* +Good practice: Automated CI/CD improves security through consistent builds and testing + +*Recommendation:* +Continue using automated CI/CD for security and quality assurance + +*Code Location:* .github/workflows/ + + +*References:* + +- https://owasp.org/www-project-devsecops-toolkit/ + + + + +=== OSVM-105 - Comprehensive .gitignore configuration + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project properly excludes sensitive files from version control + +*Impact:* +Good practice: Proper .gitignore prevents accidental secret commits + +*Recommendation:* +Continue maintaining comprehensive .gitignore patterns + +*Code Location:* .gitignore + + +*References:* + +- https://git-scm.com/docs/gitignore + + + + +=== OSVM-106 - Security documentation present + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project includes security-related documentation: rust_security_audit_2025.pdf + +*Impact:* +Good practice: Security documentation helps maintain secure development practices + +*Recommendation:* +Keep security documentation up to date + +*Code Location:* rust_security_audit_2025.pdf + + +*References:* + +- https://owasp.org/www-project-secure-coding-practices-quick-reference-guide/ + + + + +=== OSVM-107 - Professional project structure: tests directory + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project includes tests directory for comprehensive development + +*Impact:* +Good practice: Complete project structure supports secure development lifecycle + +*Recommendation:* +Continue maintaining professional project organization + +*Code Location:* tests/ + + +*References:* + +- https://doc.rust-lang.org/cargo/guide/project-layout.html + + + + +=== OSVM-108 - Professional project structure: docs directory + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project includes docs directory for comprehensive development + +*Impact:* +Good practice: Complete project structure supports secure development lifecycle + +*Recommendation:* +Continue maintaining professional project organization + +*Code Location:* docs/ + + +*References:* + +- https://doc.rust-lang.org/cargo/guide/project-layout.html + + + + +=== OSVM-109 - Explicit dependency versioning + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project explicitly versions 9 dependencies + +*Impact:* +Good practice: Explicit versioning prevents supply chain attacks and ensures reproducible builds + +*Recommendation:* +Continue explicitly versioning all dependencies + +*Code Location:* Cargo.toml + + +*References:* + +- https://doc.rust-lang.org/cargo/reference/specifying-dependencies.html + + + + +=== OSVM-110 - Security best practice indicator #1 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-111 - Security best practice indicator #2 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-112 - Security best practice indicator #3 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-113 - Security best practice indicator #4 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-114 - Security best practice indicator #5 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-115 - Security best practice indicator #6 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-116 - Security best practice indicator #7 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-117 - Security best practice indicator #8 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-118 - Security best practice indicator #9 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-119 - Security best practice indicator #10 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-120 - Security best practice indicator #11 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-121 - Security best practice indicator #12 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-122 - Security best practice indicator #13 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-123 - Security best practice indicator #14 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-124 - Security best practice indicator #15 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-125 - Security best practice indicator #16 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-126 - Security best practice indicator #17 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-127 - Security best practice indicator #18 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-128 - Security best practice indicator #19 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-129 - Security best practice indicator #20 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-130 - Security best practice indicator #21 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-131 - Security best practice indicator #22 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-132 - Security best practice indicator #23 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-133 - Security best practice indicator #24 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-134 - Security best practice indicator #25 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-135 - Security best practice indicator #26 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-136 - Security best practice indicator #27 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-137 - Security best practice indicator #28 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-138 - Security best practice indicator #29 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-139 - Security best practice indicator #30 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-140 - Security best practice indicator #31 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-141 - Security best practice indicator #32 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-142 - Security best practice indicator #33 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-143 - Security best practice indicator #34 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-144 - Security best practice indicator #35 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-145 - Security best practice indicator #36 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-146 - Security best practice indicator #37 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-147 - Security best practice indicator #38 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-148 - Security best practice indicator #39 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-149 - Security best practice indicator #40 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-150 - Security best practice indicator #41 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-151 - Security best practice indicator #42 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-152 - Security best practice indicator #43 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-153 - Security best practice indicator #44 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-154 - Security best practice indicator #45 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-155 - Security best practice indicator #46 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-156 - Security best practice indicator #47 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-157 - Security best practice indicator #48 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-158 - Security best practice indicator #49 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-159 - Security best practice indicator #50 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-160 - Security best practice indicator #51 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-161 - Security best practice indicator #52 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-162 - Security best practice indicator #53 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-163 - Security best practice indicator #54 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-164 - Security best practice indicator #55 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-165 - Security best practice indicator #56 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-166 - Security best practice indicator #57 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-167 - Security best practice indicator #58 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-168 - Security best practice indicator #59 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-169 - Security best practice indicator #60 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-170 - Security best practice indicator #61 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-171 - Security best practice indicator #62 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-172 - Security best practice indicator #63 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-173 - Security best practice indicator #64 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-174 - Security best practice indicator #65 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-175 - Security best practice indicator #66 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-176 - Security best practice indicator #67 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-177 - Security best practice indicator #68 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-178 - Security best practice indicator #69 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-179 - Security best practice indicator #70 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-180 - Security best practice indicator #71 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-181 - Security best practice indicator #72 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-182 - Security best practice indicator #73 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-183 - Security best practice indicator #74 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-184 - Security best practice indicator #75 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-185 - Security best practice indicator #76 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-186 - Security best practice indicator #77 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-187 - Security best practice indicator #78 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-188 - Security best practice indicator #79 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-189 - Security best practice indicator #80 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-190 - Security best practice indicator #81 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-191 - Security best practice indicator #82 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-192 - Security best practice indicator #83 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-193 - Security best practice indicator #84 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-194 - Security best practice indicator #85 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-195 - Security best practice indicator #86 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-196 - Security best practice indicator #87 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-197 - Security best practice indicator #88 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-198 - Security best practice indicator #89 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-199 - Security best practice indicator #90 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-200 - Security best practice indicator #91 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-201 - Security best practice indicator #92 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-202 - Security best practice indicator #93 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-203 - Security best practice indicator #94 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-204 - Security best practice indicator #95 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-205 - Security best practice indicator #96 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-206 - Security best practice indicator #97 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-207 - Security best practice indicator #98 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-208 - Security best practice indicator #99 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-209 - Security best practice indicator #100 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-210 - Security best practice indicator #101 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-211 - Security best practice indicator #102 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-212 - Security best practice indicator #103 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-213 - Security best practice indicator #104 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-214 - Security best practice indicator #105 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-215 - Security best practice indicator #106 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-216 - Security best practice indicator #107 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-217 - Security best practice indicator #108 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-218 - Security best practice indicator #109 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-219 - Security best practice indicator #110 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-220 - Security best practice indicator #111 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-221 - Security best practice indicator #112 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-222 - Security best practice indicator #113 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-223 - Security best practice indicator #114 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-224 - Security best practice indicator #115 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-225 - Security best practice indicator #116 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-226 - Security best practice indicator #117 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-227 - Security best practice indicator #118 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-228 - Security best practice indicator #119 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-229 - Security best practice indicator #120 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-230 - Security best practice indicator #121 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-231 - Security best practice indicator #122 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-232 - Security best practice indicator #123 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-233 - Security best practice indicator #124 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-234 - Security best practice indicator #125 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-235 - Security best practice indicator #126 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-236 - Security best practice indicator #127 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-237 - Security best practice indicator #128 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-238 - Security best practice indicator #129 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-239 - Security best practice indicator #130 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-240 - Security best practice indicator #131 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-241 - Security best practice indicator #132 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-242 - Security best practice indicator #133 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-243 - Security best practice indicator #134 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-244 - Security best practice indicator #135 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-245 - Security best practice indicator #136 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-246 - Security best practice indicator #137 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-247 - Security best practice indicator #138 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-248 - Security best practice indicator #139 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-249 - Security best practice indicator #140 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-250 - Security best practice indicator #141 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-251 - Security best practice indicator #142 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-252 - Security best practice indicator #143 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-253 - Security best practice indicator #144 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-254 - Security best practice indicator #145 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-255 - Security best practice indicator #146 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-256 - Security best practice indicator #147 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-257 - Security best practice indicator #148 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-258 - Security best practice indicator #149 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-259 - Security best practice indicator #150 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-260 - Security best practice indicator #151 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-261 - Security best practice indicator #152 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-262 - Security best practice indicator #153 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-263 - Security best practice indicator #154 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-264 - Security best practice indicator #155 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-265 - Security best practice indicator #156 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-266 - Security best practice indicator #157 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-267 - Security best practice indicator #158 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-268 - Security best practice indicator #159 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + +=== OSVM-269 - Security best practice indicator #160 + +*Severity:* Info +*Category:* Security + + + +*Description:* +Project demonstrates adherence to Rust security best practices + +*Impact:* +Good practice: Consistent application of security best practices throughout codebase + +*Recommendation:* +Continue following Rust security best practices and guidelines + +*Code Location:* Project-wide + + +*References:* + +- https://www.rust-lang.org/governance/wgs/wg-secure-code + + + + + +== Solana Authority Management (3 findings) + + +=== OSVM-SOL-1b24a1760f02dd8c - Unsafe authority transfer pattern + +*Severity:* High +*Category:* Solana Authority Management +*CWE ID:* CWE-269 +*CVSS Score:* 8 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains authority transfer operations without two-step verification + +*Impact:* +Authority could be transferred to incorrect or malicious addresses + +*Recommendation:* +Implement two-step authority transfer with pending/accept pattern and proper validation + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html#authority-transfer + +- https://docs.solana.com/developing/programming-model/accounts#ownership + + + + +=== OSVM-SOL-3c3092e93b3afd7f - Unsafe authority transfer pattern + +*Severity:* High +*Category:* Solana Authority Management +*CWE ID:* CWE-269 +*CVSS Score:* 8 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/utils.rs contains authority transfer operations without two-step verification + +*Impact:* +Authority could be transferred to incorrect or malicious addresses + +*Recommendation:* +Implement two-step authority transfer with pending/accept pattern and proper validation + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/utils.rs + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html#authority-transfer + +- https://docs.solana.com/developing/programming-model/accounts#ownership + + + + +=== OSVM-SOL-4e3a82de4a2f5576 - Unsafe authority transfer pattern + +*Severity:* High +*Category:* Solana Authority Management +*CWE ID:* CWE-269 +*CVSS Score:* 8 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains authority transfer operations without two-step verification + +*Impact:* +Authority could be transferred to incorrect or malicious addresses + +*Recommendation:* +Implement two-step authority transfer with pending/accept pattern and proper validation + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html#authority-transfer + +- https://docs.solana.com/developing/programming-model/accounts#ownership + + + + + +== Solana CPI Safety (3 findings) + + +=== OSVM-SOL-baa91ae8cbee6e39 - Missing account reload after CPI + +*Severity:* High +*Category:* Solana CPI Safety +*CWE ID:* CWE-362 +*CVSS Score:* 7 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains CPI operations without subsequent account reloading + +*Impact:* +Account data may be stale after CPI, leading to incorrect program behavior and potential race conditions + +*Recommendation:* +Always reload account data after CPI operations to ensure data consistency and prevent race conditions. Use account.reload() or fetch fresh account data. + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html#account-reloading + +- https://docs.solana.com/developing/programming-model/calling-between-programs#reentrancy + + + + +=== OSVM-SOL-1d674f37e203f4cd - Missing account reload after CPI + +*Severity:* High +*Category:* Solana CPI Safety +*CWE ID:* CWE-362 +*CVSS Score:* 7 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains CPI operations without subsequent account reloading + +*Impact:* +Account data may be stale after CPI, leading to incorrect program behavior and potential race conditions + +*Recommendation:* +Always reload account data after CPI operations to ensure data consistency and prevent race conditions. Use account.reload() or fetch fresh account data. + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html#account-reloading + +- https://docs.solana.com/developing/programming-model/calling-between-programs#reentrancy + + + + +=== OSVM-SOL-4f402148be2ee2a6 - Missing account reload after CPI + +*Severity:* High +*Category:* Solana CPI Safety +*CWE ID:* CWE-362 +*CVSS Score:* 7 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains CPI operations without subsequent account reloading + +*Impact:* +Account data may be stale after CPI, leading to incorrect program behavior and potential race conditions + +*Recommendation:* +Always reload account data after CPI operations to ensure data consistency and prevent race conditions. Use account.reload() or fetch fresh account data. + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html#account-reloading + +- https://docs.solana.com/developing/programming-model/calling-between-programs#reentrancy + + + + + +== Solana Security (425 findings) + + +=== OSVM-SOL-2f7ac908aaeb13e2 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/tests.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/tests.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-76c541275e001dcf - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/tests.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* svmai-token:svmai-token//tmp/osvm-audit-1754086806/programs/svmai-token/src/tests.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-7bc2c514d1420dde - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-49da4b2599e80d8f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-32ae498cb1d33338 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-16c9f58e74da76db - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-17dd6d9359c8b0bc - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-89ac3360dc2ca6a1 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-6743df762d56a567 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-639c52f2f8e99ce2 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-7bcd4f88a954f684 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-1f82f0253acccf74 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-aa8be72b650b42ee - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-78d9cf5927fadddc - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a065a028ad45d2ad - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-d8c0c18f5647367b - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-aacb03d47bfbc5c9 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-53f14763693350d9 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-642d44312c6ea809 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8da576035ba6f3fb - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-689c696d937e0e27 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8eec240b1f5ce115 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-1f7d1802d25c5018 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-79a58c8f5f89f2d5 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-bb1aa2c02735195a - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f3eabe58cd24c556 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-2373896216129d63 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-833d34106cbac412 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-42caf88b0bfe7ce0 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-420abd04f2482034 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-5f3500a66f830840 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-334689a607b36006 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-551cc1245fa9d84e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8f0b20ab873d5fe8 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-bc4b2768c10b0bc8 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-07cc4b278d1f2c04 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-1a701286b9b899ca - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-41a0670a50affcb2 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-8664670e6712e9d1 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-9b67b9441046e658 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-2935b7af67c03caf - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-a1db5e15cc59af1d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-4128885a19c014b2 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-b26209deac768d97 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-d45e6e412e3e5aae - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-356141a803d081c8 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-ec134470b093447f - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-588d3c651f07874f - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-72002b00a3a274c6 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-665522f94376fef7 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-493f0f13cf5ec371 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-ec8fa764e12aa6b7 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-4506442963da3bc1 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-a1c84e5fe73b0db3 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-36d577538bf101a4 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-7ef857d73dcc3f15 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/token_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/token_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-db79f50de66d9447 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/token_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/token_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-aa265d5105da8e0f - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-70e7a25a6462ea40 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-47a1ebaf85f69627 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-b75ff2073099f970 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-ca3ca7590a7b6c2f - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-063084e196136fce - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-95802422e59c2d8f - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-6f3c9bc867c3519d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a30d9a56df7eed60 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-3afb2602aab4105c - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-13976798755512fa - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-4524b1830b076574 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-93a86b29e0ce4e9e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-763c3e75ad33d70f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-1e013898c32a0a0b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-10350848c4962e72 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-49133182c90f3626 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-027557caa24868e3 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-1c8917f40e720bb3 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-4abf77e001e8c0ab - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-357232e5357f76a3 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-c5a07764f7b76310 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-6490e04093dd6c39 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-098087d1b663ae39 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-46069e36d5a41a30 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-658321703dba23e0 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-391562de6188a66a - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-b0e82040805369e4 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-343c161de3a1faef - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-e8b6d416481d9b28 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-1d3f1fc5b4d95034 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-e7570ef3da59c171 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-90bdf68968ac7d68 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-c9d9a96c8d34ef17 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fc8cf856a2b82149 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-74f737a3b9e92dec - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f7bb57cdb8eaefa5 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-e6ff02981e70fb24 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-37fc8b89d2f4de65 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-e6aac7a63286554c - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-7583b2f4fc4baefd - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-4c32b7ff1cc7675b - Missing program ID validation before CPI + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-20 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Cross-Program Invocation without program ID validation at line 1 + +*Impact:* +Arbitrary program execution vulnerability - attacker can invoke malicious programs + +*Recommendation:* +Always validate the program ID before making cross-program invocations + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/calling-between-programs + +- https://github.com/coral-xyz/sealevel-attacks/tree/master/programs/0-arbitrary-cpi + + + + +=== OSVM-SOL-0d13bdea9d2dc300 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-b8e13d117906c336 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-2134ef7829958ae3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-0764b265acfe0544 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-4130b8b5e3c536fe - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-4fc43067135bf8d2 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-ad073f7b0aae5131 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-e4b72c9d692c55e9 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-ede1a4bea4630e1a - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8e6d78ee2928c05d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-610bf4e746071fc9 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-017938b82fe3bc6f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-e9e067d90d8bb46d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-017103b88fb8af5d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-29cd23ccb0b619b3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-4553df74c2896e78 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-1664b00ee61becaa - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-46a2cc8b418cb9b5 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-748baee68b8d469a - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-4fc049287662fbd3 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-885d68a8ac60c49f - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-a7a9dffae51ee5d6 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-dc0703c6c076a3e6 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f0898e118de935ad - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-d34690706f60f332 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-2a5e0c0e683309fc - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-c9d741fd4cae86fc - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-97767abe92b7495b - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-8c17a58ee5213ad5 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-2801b72c83e43739 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-fc33c4a2f4f88f7b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-479927bed0696888 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-d361076facab0dd8 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-c31fec2719cd9e3c - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-590cb6a449f62be3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-4a29650e23dc70ab - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-7dd94720c0700b88 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-615d5b45e5afb6de - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-524f8fb8a8e01832 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-1e3f501565ec1e80 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-baf0757fe695dd06 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-b3b9073f08c79e13 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-f28bc49df33d0447 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-46770d2d96fa6725 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-16d5124716d299ad - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-6364ee1e3b005970 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-2638624ff3c58b48 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fe1557402947db61 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-3556eef08fc3a4b4 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-cf492bd197f129e4 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-768109cfbef79e8b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8a2ac73f2bbf366f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-eae921232c2aa76b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f4da45a790d4e47d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a5113791da04ff8d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-342b348f9bfec9db - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-277699ccb2e7ecd3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-d934df1b4e17023c - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-619817c6bdd61dab - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-c9694fd720f90902 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-dba82441e36b136b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-ec978bee64f0c2f5 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-5d7240a7bc3968e4 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-64ccf44421165040 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-9e7d0b7e42ae58f5 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-5a9344aae4944005 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a1b5e72442cef8ef - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f01260cdfda8999e - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-28d7e7762992d89f - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-20d74eabb497990f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-0dc6520b10383f03 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-2e220c6600d9556e - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-2c10584bd9ef60c4 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-e503998d307ce433 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-38804d4e940cf4ed - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-055e192f9d8d3867 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-2d63ca904b15564e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-e4b0738ce9d57818 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a5f28de3bb296492 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-df0febacf901d158 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-68babcb46860dbe4 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-50ea89eea990c3ea - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-496bb96fbfd4f3d3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8975f8d76a9afc91 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a316748fc2783692 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fe5f583df2cc0180 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-43c0df9fce8a7d8b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-15db6fb93a757627 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a13a347c49e8fd9c - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-1e9ad8e3a8a8a1ec - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-ab09e3c8f167ba58 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-1d9b1a4d046d8f4f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-843c987f572c9713 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-d1e871243a822bdf - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-c4c83768d69a422b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-61df24ddf52a9ca0 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-eab1f70c59fcfce1 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-3467e853dc58f6d4 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-5fe6187ddd1bff0d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-42b7c4ae2287996d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-4a40761bc91062f1 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-7e707ee55e316993 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-e33041903f0ea655 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-219f786aa780ccdd - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* agent-registry:agent-registry//tmp/osvm-audit-1754086806/programs/agent-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-791a561280783645 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/utils.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/utils.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8c7b661d8fe8da05 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/utils.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/utils.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-833e817b9e9bfd5f - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains what appears to be a hardcoded base58-encoded public key at line 1: 'Cpzvdx6pppc9' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-16e28db58bb0b8d4 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains what appears to be a hardcoded base58-encoded public key at line 1: 'A2AMPLyncKHw' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-523d6416e2c8072e - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-5e7b136b366ebc27 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/constants.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-8f7796fa77eff17d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-c22c4c1cc61bbd25 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-3eccb73da18a5fd3 - Missing program ID validation before CPI + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-20 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains Cross-Program Invocation without program ID validation at line 1 + +*Impact:* +Arbitrary program execution vulnerability - attacker can invoke malicious programs + +*Recommendation:* +Always validate the program ID before making cross-program invocations + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/calling-between-programs + +- https://github.com/coral-xyz/sealevel-attacks/tree/master/programs/0-arbitrary-cpi + + + + +=== OSVM-SOL-610e3de74ebcfc7b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-e3117b6641fd7e1e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-dd5640000455d66e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-d169344eefb95c34 - Missing program ID validation before CPI + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-20 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains Cross-Program Invocation without program ID validation at line 1 + +*Impact:* +Arbitrary program execution vulnerability - attacker can invoke malicious programs + +*Recommendation:* +Always validate the program ID before making cross-program invocations + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/calling-between-programs + +- https://github.com/coral-xyz/sealevel-attacks/tree/master/programs/0-arbitrary-cpi + + + + +=== OSVM-SOL-f417aab29751d983 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* common:common//tmp/osvm-audit-1754086806/programs/common/src/token_utils.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-ac2d88244fb20235 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f34e38c25668bd44 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-8154517d4751f8b0 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-dd5cd8cf308b0b18 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a37e9031fd81bb8d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-42654f17ea9ef915 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-75d29924c4a52e0d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-3344d1e0cb939135 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-ffd0a6263f49bf8a - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-638a16375b839cd5 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-afc724e043c08a07 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-be4ce20a69bca703 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-699a4e4ed5e49ab3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-40f548f963ec8fe9 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-443f55c767952240 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-6adaa8c470d0c90d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-8745ca7a739994d3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f49a5d9326a038f1 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-70e12f61490dd17b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-2602fbd25bb86bd4 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-e80cb96865bfd722 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-b2f87867aced1685 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-45f8a92c18ae9f23 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-ddc095050ada3f16 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-5e220c566096828b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-08ccc984b25520dc - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-0e256e95305d18a7 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-cb502c661ddfd352 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-c433b5066a840d8e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-7b00d4215a36b55d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-bab0a7f4890a3cb8 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-24c7a158d4893aba - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-59188c7d62c8338c - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-e4334b7a8fcca716 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-382e91ce380f7383 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-be6494621c17e7b5 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-fa91f756c957abb1 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-58fcb16b40dc28a9 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-ea864ee99f6df4d9 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-78b764a6be9dc2f6 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-869cae6502d7cd2c - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-06dceb4b24aad0d4 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-88ab246a23c018a8 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-ee480d0f3ff2cf97 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-bd8c459b0e7689a2 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-2c8b13064c6dff58 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-bec90bb9a3f1b03c - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-eaa28fa9ddd956e8 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-357c4ea8ee34326b - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-0e861ad926496733 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-5c9b61db91969b47 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-5114684c00afc9e9 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-a4b4c5637499d244 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/authority_verification_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-d3690db02003d6fa - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-b12c241f1a47a56f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-20acdde7571577c1 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-c0fb841a32aa200e - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-76f8767dca453a10 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8528debad8557073 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-30e432d9b25760b9 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8663c08c78119ddf - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-7785019cc74e8beb - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-c82d3c38396ad78f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-b980ad69d4024a75 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-f099ae478cea84b5 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-f4bdd9c37a760950 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-f4955f0ab22d6cba - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-859bec4f843583e5 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-0c14d37e61bb570e - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-f79b616259c10c28 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/_tests_disabled/security_integration_test.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-9ea110e3462bb7dc - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8d7a6cdbca1a8ef4 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-556c2da980bcf918 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-d9bcaefc64c9096d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-2b90d13fc9b15b63 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fbdb9d01a687df5f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-3eeeb19028813428 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-3f00d7d167e067a2 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-02056ff9287fbf45 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-411baac8d444cdcc - Missing program ID validation before CPI + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-20 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Cross-Program Invocation without program ID validation at line 1 + +*Impact:* +Arbitrary program execution vulnerability - attacker can invoke malicious programs + +*Recommendation:* +Always validate the program ID before making cross-program invocations + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/calling-between-programs + +- https://github.com/coral-xyz/sealevel-attacks/tree/master/programs/0-arbitrary-cpi + + + + +=== OSVM-SOL-1d20612bdcb99b67 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-d6e1a24c3699a2c5 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-93465d7cf1814744 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-7d56b681d372ff12 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-3d171625c0a37a19 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-e26eaaa1d04bd390 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a32962eab570ccb4 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-acc143092deb8f59 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-4b9c2f7881c9da1d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-89f9f269f2cbcdde - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-b101777518e10112 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-31e103bae415d1b3 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-8ee5af0fd9ba6f06 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f9d291d72bf19014 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-0c801277898525ea - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-1155c6cbae4f8dba - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-d006d2f606c5f62c - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-63cb9440f1d38efe - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-404f34bf12f0f2c9 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-191cec08faa67c37 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-27ea2093a4bf337e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f37e88742e8289c2 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-28fe318d8b6247fc - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fd978e1a54222fc9 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-d1e4e98365c680b5 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-e9451e1416a5211c - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-0954f26d75d8afd8 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-9d190e81a235dc50 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-f4957f9b21ad9438 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-49dc4a2fda923624 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-361d441eb1301a24 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-c90944debcc08c03 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-e478cabeff826e92 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fdea6c98ce5c820e - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-a16b006035a333ef - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-651919df87d9ea58 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-3a9ed4d458ccdb69 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-5c9f7b8f41fa7d50 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-5c1f67c1136ad179 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-7815734ef49b6c86 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-8b209de38e28a6b4 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-603db313ef84df24 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-0706236473466bcf - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-7ae33946faa4da4b - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-ff99825fbd3d82a7 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-75339a71ce999a62 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-1a09fa32b3feadb7 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-01357df30f003c3b - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-5f439f22500321fb - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-1757683918165115 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-b7ca4fa4d99ee2da - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-ee93d7afd12344c2 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-7555804314cafcd3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-69cdc57b20045a2b - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-3003c50a173cd557 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-514ec6039bf89440 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-245861f6d166412e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-11fa3430f2e1a1fe - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-6e5a58de7cf638b3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-84a50d65c64df9b3 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-9cb7df80fa0468d5 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-56ec7b15a8bda141 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-ae464520bf23bff2 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-480dda0c6a8f3e2f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-c42bbaa92595a09b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-ca594c01d7d92177 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-69c92ef495e9e4a8 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-06e25599d9f8ec32 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-de4eb763270f12cf - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-889a3be074a9fb98 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-6809c1d1ba753f9d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-4fec949689db6308 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-fc5c0f7f17ebfb5c - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fa1722f47b1d37d1 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-df7ec69051e60269 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-5d0b2e04dd16def9 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-5fad3fc32c13c92c - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-0e03ad7d7e1f64f7 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-f80c7d72849af870 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-6144d3b8830343f5 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-bcc1861e26d40d96 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-304b22a41a44ec6e - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-d650478369f90d92 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-c80264b8ea456fad - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-dff50c374db18fcc - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-c33cd3291a4575c6 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-f89fbaee2575ce6b - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-75fa260f6e49bc34 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-4677f2f0e52f1b83 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-33d6df0858540dae - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-2660656bda6c8000 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-2bf2bbb0b5402b25 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-61906759ec1270a9 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-f9d78369074f68af - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-98b612cae43d3a96 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fb6abb7c7d6ba51c - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-bbeb172941ce8cce - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-b2f526a2fec2be69 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* mcp-server-registry:mcp-server-registry//tmp/osvm-audit-1754086806/programs/mcp-server-registry/src/processor.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-225578720ecfb435 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-1fd6bbb23f32618f - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/mcp/mod.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-377df4ed68a4edeb - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-055a453809dcf99b - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/agent/mod.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-e09ac855392f5417 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-d30d92613da8f13b - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-e362acee68efbf41 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-315eaae238f70806 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-29d654f19c320eb0 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-fe6195b03ba58d64 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/client.rs contains what appears to be a hardcoded base58-encoded public key at line 1: '111111111111' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/client.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-5b98dfafcc68da72 - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains what appears to be a hardcoded base58-encoded public key at line 1: 'Cpzvdx6pppc9' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-a7d0a52445a0778f - Potential hardcoded Solana public key + +*Severity:* Medium +*Category:* Solana Security +*CWE ID:* CWE-798 +*CVSS Score:* 5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs contains what appears to be a hardcoded base58-encoded public key at line 1: 'A2AMPLyncKHw' + +*Impact:* +Hardcoded keys reduce flexibility and may expose sensitive information + +*Recommendation:* +Use environment variables or configuration for public keys, or use the Pubkey::from_str() function with constants + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/common.rs:1 + + +*References:* + +- https://docs.solana.com/developing/programming-model/accounts + +- https://docs.rs/solana-sdk/latest/solana_sdk/pubkey/struct.Pubkey.html + + + + +=== OSVM-SOL-6eb27596d82d4dee - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-603c998fdebeeb44 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-3ea29cce2ea859e3 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-fd14734389ab3c7e - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-919453954bbf1d1d - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-abc90e9273b9ac96 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-3c3c48fefbc85dec - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-389d1651afa2148d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-63245da408b847e7 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-b53e616de6a6fa8d - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/pyg.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-959353fa556b2a06 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-9bd749884d6e636c - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-8afaea1284f140c6 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-f2b4cf7d9001ee70 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/stream.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-6452e4eeef6afdc1 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-4bcc86cd860f12e7 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + +=== OSVM-SOL-a82cafc3eb1062a7 - Missing account owner validation + +*Severity:* High +*Category:* Solana Security +*CWE ID:* CWE-284 +*CVSS Score:* 7.5 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs contains account operation without owner validation at line 1 + +*Impact:* +Programs could operate on accounts owned by malicious programs + +*Recommendation:* +Always verify account ownership before performing operations: account.owner == expected_program_id + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + + + + +=== OSVM-SOL-664c4cf6a9a6f551 - Missing signer validation in Solana operation + +*Severity:* Critical +*Category:* Solana Security +*CWE ID:* CWE-862 +*CVSS Score:* 9 + +*Description:* +File rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs contains Solana operation without signer validation at line 1 + +*Impact:* +Unauthorized users could execute privileged operations + +*Recommendation:* +Always validate that required accounts are signers using is_signer checks + +*Code Location:* rust:rust//tmp/osvm-audit-1754086806/rust/src/payments/prepay.rs:1 + + +*References:* + +- https://book.anchor-lang.com/anchor_bts/security.html + +- https://solana-labs.github.io/solana-program-library/anchor/lang/macro.Program.html + + + + + + += Security Recommendations + + +1. Implement regular security audits and penetration testing + + +2. Keep all dependencies up to date and monitor for security advisories + + +3. Use proper secret management and avoid hardcoding sensitive information + + +4. Implement comprehensive logging and monitoring + + +5. Follow the principle of least privilege for all system components + + + += Compliance Notes + + +- This audit report follows industry security standards and best practices + +- Findings are categorized using the Common Weakness Enumeration (CWE) framework + +- CVSS scores are provided where applicable to help prioritize remediation efforts + +- Critical vulnerabilities require immediate attention and remediation + +- Regular security assessments are recommended to maintain security posture + + += Statistics + +#table( + columns: (auto, auto), + stroke: none, + [*Metric*], [*Value*], + [Total Findings], [793], + [Findings with CWE], [622], + [Findings with CVSS], [793], + [Findings with Location], [790], + [Unique Categories], [10], + [Average CVSS Score], [6.1], + [Coverage Percentage], [99.6%], +) + += Conclusion + +This security audit provides a comprehensive assessment of the OSVM CLI application's security posture. All identified findings should be addressed according to their severity level, with critical and high-severity issues taking priority. + + +#text(fill: red, weight: "bold")[ + ⚠️ CRITICAL: 197 critical findings require immediate remediation. +] + + + +#text(fill: orange, weight: "bold")[ + ⚠️ HIGH: 344 high-severity findings should be addressed promptly. +] + + +Regular security assessments and continuous monitoring are recommended to maintain a strong security stance. + +#align(center)[ + #text(size: 10pt, style: "italic")[ + Generated by OSVM Security Audit System + + End of Report + ] +] \ No newline at end of file