一个用于本地自查的 Python 脚本,帮助你根据的公开分析文章,快速判断这台机器上是否存在与 Apifox 供应链攻击相符的本地痕迹,以及哪些凭据应当进入轮换清单。
参考文章:
一个用于本地自查的 Python 脚本,帮助你根据的公开分析文章,快速判断这台机器上是否存在与 Apifox 供应链攻击相符的本地痕迹,以及哪些凭据应当进入轮换清单。
参考文章:
| curl -G "https://open.bigmodel.cn/api/monitor/usage/model-usage" \ | |
| --data-urlencode "startTime=2026-02-23 14:00:00" \ | |
| --data-urlencode "endTime=2026-02-24 14:59:59" \ | |
| -H "Authorization: <token>" \ | |
| -H "Accept-Language: en-US,en" \ | |
| -H "Content-Type: application/json" | |
| curl "https://open.bigmodel.cn/api/monitor/usage/quota/limit" \ | |
| -H "Authorization: <token>" \ | |
| -H "Accept-Language: en-US,en" \ |
| function claude() { | |
| # 默认渠道配置 | |
| local default_provider="" | |
| # 定义不同服务的配置 | |
| local base_url="" | |
| local auth_token="" | |
| local api_key="" | |
| local model="" | |
| local small_fast_model="" |
| { | |
| "apc.electron": { | |
| "backgroundColor": "#00000000", | |
| "titleBarStyle": "hidden", | |
| "vibrancy": "sidebar", | |
| "visualEffectState": "followWindow", | |
| "trafficLightPosition": { | |
| "x": 9, | |
| "y": 9 | |
| } |
| package excel | |
| import ( | |
| "errors" | |
| "github.com/xuri/excelize/v2" | |
| "reflect" | |
| ) | |
| type Row []any |