
Security News
MCP Community Begins Work on Official MCP Metaregistry
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Automatically fetch anime updates from the Mikan Project's RSS feed and offline download them to the cloud drive through Alist.
从蜜柑计划或其他动漫番剧相关的RSS订阅源中自动获取番剧更新并通过Alist离线下载至对应网盘
并结合使用ChatGPT分析资源名,将资源重命名为Emby可解析的格式。
附:对其余RSS订阅源也作了一定适配,理论上支持绝大多数订阅源(番剧相关),对于未能支持的RSS,也欢迎上交issue
Docker,源码运行等更多的运行方法详见使用文档
使用pip安装运行
pip install alist-mikananirss
config.yaml
配置文件,并填写配置文件如下(完整功能示例详解见配置说明)
common:
interval_time: 300
alist:
base_url: https://example.com # 修改为你的alist访问地址
token: alist-xxx # 修改为你的alist token;可在"管理员后台->设置->其他"中找到
downloader: qBittorrent # 或者 aria2
download_path: Onedrive/Anime # 修改为你的下载路径(Alist中的路径)
mikan:
subscribe_url:
- https://mikanani.me/RSS/MyBangumi?token=xxx # 修改为你的蜜柑订阅地址
# - https://mikanani.me/RSS/MyBangumi?token=xxx2 # 多条RSS订阅链接情况
filters:
- 非合集 # 程序暂不支持合集等形式的重命名,若使用重命名功能推荐使用此过滤器
python -m alist_mikananirss --config /path/to/config.yaml
FAQs
Automatically fetch anime updates from the Mikan Project's RSS feed and offline download them to the cloud drive through Alist.
We found that alist-mikananirss demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The MCP community is launching an official registry to standardize AI tool discovery and let agents dynamically find and install MCP servers.
Research
Security News
Socket uncovers an npm Trojan stealing crypto wallets and BullX credentials via obfuscated code and Telegram exfiltration.
Research
Security News
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor access.