
Security News
npm Adopts OIDC for Trusted Publishing in CI/CD Workflows
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
zoro-to-api
Advanced tools
A simple wrapper for the Zoro.to API
# npm
npm install zoro-to-api
# yarn
yarn add zoro-to-api
const Zoro = require('zoro-to-api');
// Change Horimiya to whatever you want to search for
let zoroResults = await Zoro.zoroSearch("Horimiya")
// Get the first result
let horimiya = zoroResults[0]
// Get the info for the first result
let info = Zoro.getAnimeInfoByName(horimiya.eng_title);
// Get the episodes for the first result
let eps = Zoro.getEpList(horimiya.eng_title);
// Get the first episode
let firstEpisode = eps.episodes[0];
// Get the servers for the first episode
let servers = Zoro.getEpisodeServers(firstEpisode.epId);
// Choose out of 4 servers
let subbed = servers.serversSub[0]
// Get the stream server
let streamServer = Zoro.getStreamsById(subbed.serverId);
// Your iframe link
console.log(streamServer.link)
//* ⚠ Make sure you read the docs for the functions you use
import Zoro from 'zoro-to-api';
...
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change. Make sure to update tests as appropriate.
FAQs
API wrapper for zoro.to
The npm package zoro-to-api receives a total of 0 weekly downloads. As such, zoro-to-api popularity was classified as not popular.
We found that zoro-to-api demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
npm now supports Trusted Publishing with OIDC, enabling secure package publishing directly from CI/CD workflows without relying on long-lived tokens.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.