| 命令 | 说明 |
|---|---|
gateway |
最核心命令,启动 WebSocket Gateway 服务,是整个系统的运行基础 |
configure |
交互式配置向导,首次使用和修改配置时必用 |
config |
非交互式配置辅助(get/set/unset),脚本化管理配置 |
channels |
管理聊天渠道连接(Telegram、Discord 等),接入消息平台的入口 |
agent |
通过 Gateway 运行一次 agent turn,直接与 AI agent 交互 |
message |
收发消息的核心命令,日常使用频率很高 |
Discover gists
| slicer.util.pip_install("torch torchvision torchaudio --index-url https://download.pytorch.org/whl/cu128") |
| 0x0000 | Ericsson Technology Licensing | |
|---|---|---|
| 0x0001 | Nokia Mobile Phones | |
| 0x0002 | Intel Corp. | |
| 0x0003 | IBM Corp. | |
| 0x0004 | Toshiba Corp. | |
| 0x0005 | 3Com | |
| 0x0006 | Microsoft | |
| 0x0007 | Lucent | |
| 0x0008 | Motorola | |
| 0x0009 | Infineon Technologies AG |
As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))
**1.
They should work. Works for all cores of your host system. Also you can download ESXi from here.
Most MCP servers just wrap CRUD JSON APIs into tools — I did it too with scim-mcp and garmin-mcp-app. It works, until you realize a tool call dumps 50KB+ into context.
MCP isn't dead — but we need to design MCP tools with the context window in mind.
/* 前言 -------------------------------------------------- */
這是 Jeremy 於 2026-03-07 於第二屆「 AI 取暖會」中分享過去十八個月來與 AI/Agent 搏鬥的實戰心得。
This guide documents the process of integrating a custom proxy core (yass_cli) into NekoBoxForAndroid by disguising it
as the NaiveProxy plugin, without modifying the NekoBox application source code.
NekoBox uses a plugin architecture where it extracts native libraries (.so files) from a plugin APK and executes them
as background child processes. When running a plugin, NekoBox generates a JSON configuration file specific to that plugi
n (e.g., naive_config.json) and passes the file path as a command-line argument.