🍀 Spring Date with Fortune, Prizes with Raffle! Growth Value Phase 1️⃣ 7️⃣ Spring Raffle Carnival Begins!
Seize Spring's Good Luck! 👉 https://www.gate.com/activities/pointprize?now_period=17
🌟 How to Participate?
1️⃣ Enter [Square] personal homepage, click the points icon next to your avatar to enter [Community Center]
2️⃣ Complete Square or Hot Chat tasks such as posting, commenting, liking, speaking to earn growth value
🎁 Every 300 points can raffle once, 10g gold bars, Gate Red Bull gift box, VIP experience card and more prizes waiting for you to win!
Details 👉 https://www.gate.com/ann
# 使用過 apifox 趕緊自測
# 1. 檢測是否中招(注意:二進制檔案檢測存在假陰性風險,結果僅供參考)
# macOS:
grep -arlE "rl_mc|rl_headers" ~/Library/Application\ Support/apifox/Local\ Storage/leveldb
# Linux:
grep -arlE "rl_mc|rl_headers" ~/.config/apifox/Local\ Storage/leveldb
# Windows PowerShell:
Select-String -Path "$env:APPDATA\apifox\Local Storage\leveldb\*" -Pattern "rl_mc","rl_headers" -List
# 2. 無論是否檢測到,都建議執行以下操作:
# 轮换 SSH 密钥
cd ~/.ssh && ls -la # 先查看有哪些密钥
# 為每個密鑰生成新的替代品,並在所有伺服器上更新 authorized_keys
# 3. 撤銷並重新生成 Git Token
# GitHub: Settings → Developer settings → Personal access tokens → 全部 Revoke
# GitLab: 同理
# 4. 轮换 K8s 憑證
# kubectl config view → 逐一檢查並輪換
# 5. 轮换 npm Token
npm token revoke
npm token create
# 6. 檢查 .zsh_history / .bash_history 中暴露的所有明文密碼和 Token
# 是的,如果你曾經在命令行中輸入過密碼,它們可能已經泄露了
# apifox