Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[HV]AutoAttack 无法开启Spirit Stance #102

Open
No1sySh1t opened this issue Dec 10, 2021 · 8 comments
Open

[HV]AutoAttack 无法开启Spirit Stance #102

No1sySh1t opened this issue Dec 10, 2021 · 8 comments

Comments

@No1sySh1t
Copy link

  • 脚本: [HV]AutoAttack
  • 类型: Bug,
  • OS: win10 1909
  • 浏览器: 浏览器及类型
  • 扩展: Tampermonkey
  1. 如果是Bug
  • 重现: 开启Spirit Stance的条件设置为: OC,1,100 ;但JJC中OC条满了也没办法开启Spirit Stance,进而使得OFC无法施放。

虽然大佬AFK了,但希望有其他正在用这个插的大佬指导一下。99孩子。

@chellothere
Copy link

Try this
screenshot1

@tqdungctuct
Copy link

tqdungctuct commented Dec 15, 2021

Try this screenshot1

Unrelated question about HV Autoattack. What is the usually speed of HVAT script? My script reduce from ~3 action/s to ~2 action/s recently. Can I do something to increase it?

@chellothere
Copy link

Try this screenshot1

Unrelated question about HV Autoattack. What is the usually speed of HVAT script? My script reduce from ~3 action/s to ~2 action/s recently. Can I do something to increase it?

Check the delay value, spells for me is 190ms, other 120ms.
It also may be drops/usage tracking issue, try to turn it off.

@No1sySh1t
Copy link
Author

Try this screenshot1

Thanks. But it dosen't work.

@chellothere
Copy link

Thanks. But it dosen't work.

Checkbox on Skills and OFC - check again please

@UNSCs117
Copy link

按照作者的说法,你这个问题可能和我的问题很像 #106
应该也是判断条件的问题吧?

@nxoet
Copy link

nxoet commented Sep 19, 2023

我是开了以后,它不会自动攻击了,要先暂停,手动点击SS,再继续,它才能自动攻击。

@nxoet
Copy link

nxoet commented Sep 20, 2023

我现在可以了,之前是用了一个全局字体样式影响了,排除即可,我设的条件是:oc,1,50

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants