by LearnPrompt
永久免费开源的 AIGC 课程, 目前已支持Claude Code,Codex,Hermes,OpenClaw,Obsidian,Prompt Engineering, ChatGPT, Midjourney, Runway, Stable Diffusion, AI数字人,AI声音&音乐,开源大模型
# Add to your Claude Code skills
git clone https://github.com/LearnPrompt/LearnPromptLast scanned: 5/19/2026
{
"issues": [
{
"type": "npm-audit",
"message": "@babel/helpers: Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@babel/plugin-transform-modules-systemjs: @babel/plugin-transform-modules-systemjs generates arbitrary code when compiling malicious input",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@babel/runtime: Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@babel/runtime-corejs3: Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@babel/traverse: Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code",
"severity": "critical"
},
{
"type": "npm-audit",
"message": "@docusaurus/core: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/lqip-loader: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/mdx-loader: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-client-redirects: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-content-blog: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-content-docs: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-content-pages: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-debug: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-google-analytics: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-google-gtag: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-google-tag-manager: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-ideal-image: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/plugin-sitemap: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@docusaurus/preset-classic: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@docusaurus/theme-classic: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/theme-common: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/theme-mermaid: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "@docusaurus/theme-search-algolia: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "@mdx-js/mdx: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "ajv: ajv has ReDoS when using `$data` option",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "axios: Axios Cross-Site Request Forgery Vulnerability",
"severity": "high"
},
{
"type": "npm-audit",
"message": "body-parser: body-parser vulnerable to denial of service when url encoding is enabled",
"severity": "high"
},
{
"type": "npm-audit",
"message": "brace-expansion: brace-expansion Regular Expression Denial of Service vulnerability",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "braces: Uncontrolled resource consumption in braces",
"severity": "high"
},
{
"type": "npm-audit",
"message": "compression: Vulnerability found",
"severity": "low"
},
{
"type": "npm-audit",
"message": "cookie: cookie accepts cookie name, path, and domain with out of bounds characters",
"severity": "low"
},
{
"type": "npm-audit",
"message": "copy-webpack-plugin: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "cross-spawn: Regular Expression Denial of Service (ReDoS) in cross-spawn",
"severity": "high"
},
{
"type": "npm-audit",
"message": "css-minimizer-webpack-plugin: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "diff: jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch",
"severity": "low"
},
{
"type": "npm-audit",
"message": "dompurify: DOMPurify allows tampering by prototype pollution",
"severity": "high"
},
{
"type": "npm-audit",
"message": "express: express vulnerable to XSS via response.redirect()",
"severity": "high"
},
{
"type": "npm-audit",
"message": "flatted: flatted vulnerable to unbounded recursion DoS in parse() revive phase",
"severity": "high"
},
{
"type": "npm-audit",
"message": "follow-redirects: follow-redirects' Proxy-Authorization header kept across hosts",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "got: Got allows a redirect to a UNIX socket",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "http-proxy-middleware: Denial of service in http-proxy-middleware",
"severity": "high"
},
{
"type": "npm-audit",
"message": "immutable: Immutable is vulnerable to Prototype Pollution",
"severity": "high"
},
{
"type": "npm-audit",
"message": "js-yaml: js-yaml has prototype pollution in merge (<<)",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "katex: KaTeX missing normalization of the protocol in URLs allows bypassing forbidden protocols",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "latest-version: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "lodash: Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions",
"severity": "high"
},
{
"type": "npm-audit",
"message": "lodash-es: Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions",
"severity": "high"
},
{
"type": "npm-audit",
"message": "mermaid: Prototype pollution vulnerability found in Mermaid's bundled version of DOMPurify",
"severity": "high"
},
{
"type": "npm-audit",
"message": "micromatch: Regular Expression Denial of Service (ReDoS) in micromatch",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "minimatch: minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern",
"severity": "high"
},
{
"type": "npm-audit",
"message": "nanoid: Predictable results in nanoid generation when given non-integer values",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "node-forge: node-forge has ASN.1 Unbounded Recursion",
"severity": "high"
},
{
"type": "npm-audit",
"message": "on-headers: on-headers is vulnerable to http response header manipulation",
"severity": "low"
},
{
"type": "npm-audit",
"message": "package-json: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "path-to-regexp: path-to-regexp outputs backtracking regular expressions",
"severity": "high"
},
{
"type": "npm-audit",
"message": "picomatch: Picomatch: Method Injection in POSIX Character Classes causes incorrect Glob Matching",
"severity": "high"
},
{
"type": "npm-audit",
"message": "postcss: PostCSS has XSS via Unescaped </style> in its CSS Stringify Output",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "prismjs: PrismJS DOM Clobbering vulnerability",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "qs: qs's arrayLimit bypass in comma parsing allows denial of service",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "rehype-katex: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "remark-mdx: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "remark-parse: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "semver: semver vulnerable to Regular Expression Denial of Service",
"severity": "high"
},
{
"type": "npm-audit",
"message": "send: send vulnerable to template injection that can lead to XSS",
"severity": "low"
},
{
"type": "npm-audit",
"message": "serialize-javascript: Serialize JavaScript is Vulnerable to RCE via RegExp.flags and Date.prototype.toISOString()",
"severity": "high"
},
{
"type": "npm-audit",
"message": "serve-handler: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "serve-static: serve-static vulnerable to template injection that can lead to XSS",
"severity": "low"
},
{
"type": "npm-audit",
"message": "sharp: sharp vulnerability in libwebp dependency CVE-2023-4863",
"severity": "high"
},
{
"type": "npm-audit",
"message": "svgo: SVGO DoS through entity expansion in DOCTYPE (Billion Laughs)",
"severity": "high"
},
{
"type": "npm-audit",
"message": "tar-fs: tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball",
"severity": "high"
},
{
"type": "npm-audit",
"message": "terser-webpack-plugin: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "trim: Regular Expression Denial of Service in trim",
"severity": "high"
},
{
"type": "npm-audit",
"message": "update-notifier: Vulnerability found",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "wait-on: Vulnerability found",
"severity": "high"
},
{
"type": "npm-audit",
"message": "webpack: Cross-realm object access in Webpack 5",
"severity": "critical"
},
{
"type": "npm-audit",
"message": "webpack-dev-middleware: Path traversal in webpack-dev-middleware",
"severity": "high"
},
{
"type": "npm-audit",
"message": "webpack-dev-server: webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser",
"severity": "medium"
},
{
"type": "npm-audit",
"message": "ws: ws affected by a DoS when handling a request with many HTTP headers",
"severity": "high"
},
{
"type": "npm-audit",
"message": "yaml: yaml is vulnerable to Stack Overflow via deeply nested YAML collections",
"severity": "medium"
}
],
"status": "FAILED",
"scannedAt": "2026-05-19T07:45:20.377Z",
"semgrepRan": false,
"npmAuditRan": true,
"pipAuditRan": true
}中文文档 | README in English
我是卡尔,一个兴趣使然的古法AI码农,长期做AI工具实测、内容创作、开源教程和Agent工作流。
AI对我来说,已经从聊天窗口变成了工作台:学新东西、写代码、整理资料、做PPT、搭自动化,都能在这里发生。
永远保持好奇。
这句话是我做LearnPrompt、AI沃茨和Carl Skills的底层原因。我不太想只追热点,也不太想把新工具讲成发布会摘要。
我更关心普通人拿到这些工具以后,能不能真的多做成一些事。
LearnPrompt · 永久免费开源的中文AI实战教程
LearnPrompt是我的来时路,也是这个账号最早的公共项目。它是一套持续维护的中文AI学习路径,覆盖Claude Code,Codex,OpenClaw,Hermes,提示语工程,ChatGPT,RAG,Agent,AI编程,Agent Skills,Obsidian,Midjourney,Runway,Stable Diffusion,数字人,AI声音与音乐和大模型微调等主题。
如果你是第一次系统学习AI,可以从这里开始。
AI News Radar · 24小时AI信息雷达
AI更新太快了,头大的是信息多到没法好好看。
AI News Radar里的伯乐Skill,用GitHub Actions、网页和自动化摘要,把AI/tech信息源变成一个可以持续运行的雷达。它能判断一个新的信息源,设置7天冷静期判断内容值不值得长期追更,会不会跟你现有信息流有内容重复,如果值得,应该怎么接进来最稳定?
它服务的是一个很朴素的需求:
少刷一点,把注意力留给真正值得看的变化。
Skillrush Town · 淘金小镇
淘金小镇从ClawHub Top100开始,记录每天哪些AI skill在上升。然后就是覆盖到更多的排行榜,像Claude Code的更新日志,或者像AA Index这种模型排行榜,观测它们的更新,让模型以最少的环境依赖稳定地运行多次数据分析。
No comments yet. Be the first to share your thoughts!
这个项目保留下来的,是一套公开信息源监控方法:固定抓取口径、每天留快照、做历史对比、生成报告,再把结果贴到一个GitHub Pages页上。
Humanize PPT · 先让PPT像是人在讲,再用工具生成
很多AI做PPT的问题,出在第一页之前。材料刚丢进去,就被压成一堆无聊的提纲,这样用的HTML PPT Skill再好也没用。
Humanize PPT读取了50多期TED演讲,先处理主线,听众获得感和讲述顺序,再进入具体的PPT制作。
Carl Skills · 把真实AI工作流做成可复用的skills
我每天都会试很多AI工具,但一条视频,一篇文章,一次聊天记录,很快就会被新的信息盖过去。
我想要沉淀下来,下次也能交给Agent复用。
Carl Skills就是这个方向的新仓库。它会逐步收纳内容生产,资料整理,工具评测,PPT制作,飞书和Obsidian协作,Hermes/Codex/OpenClaw实践里长出来的AI workflows。
它就是从日常对话的千万token里长出来的。
先做出来,再谈方法。 我不太相信隔空判断一个AI工具好不好用。模型也不能光看排行榜。它要接入真实任务,能帮我写出一篇稿子,改完一个代码项目、整理出复盘资料,才算过了第一关。
教程要给普通人留台阶。 LearnPrompt从一开始就为刚接触AI的人而生。看完以后能多试一步,多跑通一个案例,比记住一堆概念更重要。
工作流值得被保存。 一次聊天会消失,一篇文章会过期。被验证过的workflow可以留下来,被复用,被修改,也可以交给Agent继续跑。
这里既是GitHub账号LearnPrompt的默认Profile README,也是LearnPrompt开源AI教程站的项目仓库。
对第一次打开GitHub主页的人,它介绍我是谁、我在做什么、有哪些代表项目。
对之前就用过LearnPrompt的人,它会记录下这个教程站接下来要升级到哪里。
两年前,LearnPrompt解决的是一批很具体的问题:怎么理解Prompt,怎么用ChatGPT,怎么入门Midjourney、Stable Diffusion、Runway这些AI工具。
但AI变化太快了。
很多旧教程已经过时了,真就只要我学得慢就不用学。
今天值得重做的,是把LearnPrompt升级成一套更适合现在的AI native教程。
我理解的AI native教程,要少一点工具目录,多一点真实任务。它应该围绕这些问题来组织,
怎么用AI做研究、写稿、做PPT、改代码、整理知识库、搭自己的Agent工作台。
现在有skills的帮助,这件事终于可以用新的方式做了。
过去写教程,更多是人手动整理资料、截图、写步骤。接下来我想让LearnPrompt本身也变成一个被AI工作流持续维护的项目,
用wiki skills拆主题,更新过期内容,沉淀实测流程,把一次次真实使用变成普通人可以照着走的学习路径。
新版LearnPrompt会继续免费开源,也会保留中文学习路径这条主线。它会从早期的AIGC教程,慢慢长成一套面向真实工作的AI native教程。
大概会往这几个方向走:
这也是我现在重新整理这个仓库的原因。
公众号/视频号:「卡尔的AI沃茨」
交流与反馈:你可以添加微信aiwarts101,或在GitHub提交issue。
邮箱合作:carl@goodcase.ai
编写本教程时参考了以下教程或文档的内容和示例,感谢创作者们的付出: