Research
Security News
Malicious PyPI Package ‘pycord-self’ Targets Discord Developers with Token Theft and Backdoor Exploit
Socket researchers uncover the risks of a malicious Python package targeting Discord developers.
hexo-theme-stun
Advanced tools
警告:目前该项目年久失修,请尽量不要使用,建议使用一直处于维护状态的 NexT 主题,祝好
如果你准备长期使用 «Stun» 主题,并希望展示在这里,你只需在 README 中填入你的网站,然后提交 PR 即可。
安装 «Stun»
进入 Hexo 根目录,执行指令:
$ git clone https://github.com/liuyib/hexo-theme-stun.git themes/stun
该指令会将本仓库中的所有文件克隆下来,其中有很多文件仅用于项目开发,对于普通用户来说完全用不到。因此,如果你想仅克隆主题运行所必需的文件,请用下面的指令代替上面的指令:
$ git clone -b dist https://github.com/liuyib/hexo-theme-stun.git themes/stun
注意:这样做不方便以后更新,请谨慎使用。
安装依赖 hexo-renderer-pug
进入 Hexo 根目录,执行指令:
$ npm install --save hexo-renderer-pug
修改 Hexo 根目录下的 _config.yml
文件:
theme: stun
然后,启动 Hexo 服务器:
$ hexo clean && hexo s
$ cd themes/stun
$ git pull
下面是多个文档镜像(它们是全量同步的),任选其一访问即可。
如果遇到问题,首先请仔细阅读文档,或者查看常见问题。当以上的方法都无法帮助你时,再去提出 issue
:hugs:。
在提出 Pull request 之前,请务必先阅读贡献指南。
感谢所有为 «Stun» 做出贡献的人!
IE | Edge | Firefox | Chrome | Safari | Opera |
---|---|---|---|---|---|
Not Supported | 12+ | 41+ | 45+ | 10+ | 32+ |
MIT Copyright (c) 2019-present liuyib
FAQs
A beautiful & simple theme for Hexo
We found that hexo-theme-stun demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover the risks of a malicious Python package targeting Discord developers.
Security News
The UK is proposing a bold ban on ransomware payments by public entities to disrupt cybercrime, protect critical services, and lead global cybersecurity efforts.
Security News
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.