=============================================== MD-GOUV (Ministere de la Defense) Email Extraction - 2026-03-04 Source: md.gouv.ht WordPress API JSON dump =============================================== UNIQUE EMAILS FOUND: 1 --- Government / Institutional --- infodefense@md.gouv.ht [pages-p1.json, posts-p1.json, MD-GOUV.md] Ministry of Defense contact --- Notes --- - "tinfodefense@md.gouv.ht" appeared in raw grep output but is a false positive: the "\t" (tab character) was prepended to "infodefense@md.gouv.ht" in rendered HTML. Real email is infodefense@md.gouv.ht. --- External URLs (non-gov, non-WordPress/Gravatar) --- http://laministeredf.local/ - LEAKED internal dev hostname! The MD-GOUV WordPress site was developed locally under the hostname "laministeredf.local" and URLs were never migrated. This exposes: - Internal development URL pattern - Dozens of uploaded media files with original filenames - A PDF document: /wp-content/uploads/2024/06/9782379350283.pdf - WhatsApp-sourced images (indicating mobile-to-CMS workflow) - Stock photo filenames from GettyImages (gettyimages-*.jpg) This is an OPSEC failure - reveals the dev environment naming convention.