diff --git a/.github/workflows/update-star-charts.yml b/.github/workflows/update-star-charts.yml index 1f3fa16..3892e15 100644 --- a/.github/workflows/update-star-charts.yml +++ b/.github/workflows/update-star-charts.yml @@ -13,15 +13,20 @@ permissions: jobs: update: runs-on: ubuntu-latest - steps: - name: Switch to another branch uses: actions/checkout@v3 - - name: Switch to another branch - run: git checkout images + with: + ref: 'images' - name: Update Star Charts run: | wget -O assets/stars.svg https://starchart.cc/Marven11/Fenjing.svg + wget -O assets/run-tests.svg https://github.com/Marven11/Fenjing/actions/workflows/run-tests.yml/badge.svg + wget -O assets/python-package.svg https://github.com/Marven11/Fenjing/actions/workflows/python-publish.yml/badge.svg + wget -O assets/codecov.svg https://codecov.io/gh/Marven11/Fenjing/branch/main/graph/badge.svg?token=DLP7OH52P3 + wget -O assets/downloads.svg https://static.pepy.tech/badge/fenjing + wget -O assets/downloads-monthly.svg https://static.pepy.tech/badge/fenjing/month + wget -O assets/license.svg https://img.shields.io/badge/license-MPL2.0-blue git config --local user.email "actions@github.com" git config --local user.name "GitHub Actions" git add . && git commit -m 'Update: '"$(date)" && git push diff --git a/README.md b/README.md index b3e694b..6fcf5fc 100755 --- a/README.md +++ b/README.md @@ -3,12 +3,12 @@ > Bypass the WAF without knowing WAF -[![Run tests](https://github.com/Marven11/Fenjing/actions/workflows/run-tests.yml/badge.svg)](https://github.com/Marven11/Fenjing/actions/workflows/run-tests.yml) -[![Upload Python Package](https://github.com/Marven11/Fenjing/actions/workflows/python-publish.yml/badge.svg)](https://github.com/Marven11/Fenjing/actions/workflows/python-publish.yml) -[![codecov](https://codecov.io/gh/Marven11/Fenjing/branch/main/graph/badge.svg?token=DLP7OH52P3)](https://codecov.io/gh/Marven11/Fenjing) -[![Downloads](https://static.pepy.tech/badge/fenjing)](https://pepy.tech/project/fenjing) -[![Downloads](https://static.pepy.tech/badge/fenjing/month)](https://pepy.tech/project/fenjing) -![Static Badge](https://img.shields.io/badge/license-MPL2.0-blue) +[![Run tests](https://github.com/Marven11/Fenjing/raw/images/assets/run-tests.svg)](https://github.com/Marven11/Fenjing/actions/workflows/run-tests.yml) +[![Upload Python Package](https://github.com/Marven11/Fenjing/raw/images/assets/python-package.svg)](https://github.com/Marven11/Fenjing/actions/workflows/python-publish.yml) +[![codecov](https://github.com/Marven11/Fenjing/raw/images/assets/codecov.svg)](https://codecov.io/gh/Marven11/Fenjing) +[![Downloads](https://github.com/Marven11/Fenjing/raw/images/assets/downloads.svg)](https://pepy.tech/project/fenjing) +[![Downloads](https://github.com/Marven11/Fenjing/raw/images/assets/downloads-monthly.svg)](https://pepy.tech/project/fenjing) +![Static Badge](https://github.com/Marven11/Fenjing/raw/images/assets/license.svg) 焚靖是一个针对CTF比赛中Jinja SSTI绕过WAF的全自动脚本,可以自动攻击给定的网站或接口。