
Security News
New Website “Is It Really FOSS?” Tracks Transparency in Open Source Distribution Models
A new site reviews software projects to reveal if they’re truly FOSS, making complex licensing and distribution models easy to understand.
Welcome to Hunyuan! Hunyuan is a Ruby gem that provides a client for interacting with Tencent Hunyuan API for chat completions. With Hunyuan, you can easily integrate chat completion capabilities into your Ruby applications.
TODO: Delete this and the text above, and describe your gem
Install the gem and add to the application's Gemfile by executing:
$ bundle add hunyuan
If bundler is not being used to manage dependencies, install the gem by executing:
$ gem install hunyuan
To use Hunyuan, you'll need an API key from Hunyuan. You can obtain the required credentials by signing up for the Hunyuan API service.
require 'hunyuan'
# Initialize the ChatClient with your Hunyuan API credentials
client = Hunyuan::ChatClient.new(app_id: 'YOUR_APP_ID', secret_id: 'YOUR_SECRET_ID', secret_key: 'YOUR_SECRET_KEY')
# Send a chat query
response = client.chat('Hello, world!')
# Process the response
puts response
The gem is available as open source under the terms of the MIT License.
FAQs
Unknown package
We found that hunyuan demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A new site reviews software projects to reveal if they’re truly FOSS, making complex licensing and distribution models easy to understand.
Security News
Astral unveils pyx, a Python-native package registry in beta, designed to speed installs, enhance security, and integrate deeply with uv.
Security News
The Latio podcast explores how static and runtime reachability help teams prioritize exploitable vulnerabilities and streamline AppSec workflows.