🍀 Spring Appointment, Lucky Draw Gifts! Growth Value Issue 1️⃣7️⃣ Spring Lucky Draw Carnival Begins!
Seize Spring Luck! 👉 https://www.gate.com/activities/pointprize?now_period=17
🌟 How to Participate?
1️⃣ Enter [Plaza] personal homepage, click the points icon next to your avatar to enter [Community Center]
2️⃣ Complete plaza or hot chat tasks like posting, commenting, liking, and speaking to earn growth value
🎁 Every 300 points can draw once, 10g gold bars, Gate Red Bull gift boxes, VIP experience cards and more great prizes await you!
Details 👉 https://www.gate.com/announcements/article/
用过 apifox 赶紧自测
# 1. 检测是否中招(注意:二进制文件检测存在假阴性风险,结果仅供参考)
# macOS:
grep -arlE "rl_mc|rl_headers" ~/Library/Application\ Support/apifox/Local\ Storage/leveldb
# Linux:
grep -arlE "rl_mc|rl_headers" ~/.config/apifox/Local\ Storage/leveldb
# Windows PowerShell:
Select-String -Path "$env:APPDATA\apifox\Local Storage\leveldb\*" -Pattern "rl_mc","rl_headers" -List
# 2. 无论是否检测到,都建议执行以下操作:
# 轮换 SSH 密钥
cd ~/.ssh && ls -la # 先查看有哪些密钥
# 为每个密钥生成新的替代品,并在所有服务器上更新 authorized_keys
# 3. 吊销并重新生成 Git Token
# GitHub: Settings → Developer settings → Personal access tokens → 全部 Revoke
# GitLab: 同理
# 4. 轮换 K8s 凭证
# kubectl config view → 逐一检查并轮换
# 5. 轮换 npm Token
npm token revoke
npm token create
# 6. 检查 .zsh_history / .bash_history 中暴露的所有明文密码和 Token
# 是的,如果你曾经在命令行中输入过密码,它们可能已经泄露了
#apifox