详细分析 ▾
运行时依赖
版本
- Added universal protocol sniffing to discover AirPlay, Chromecast, and DLNA casting capabilities before fallback. - Improved fallback projection to use S2's secure, ephemeral (self-destructing) push when no preferred protocols are available. - Updated documentation for clear step-by-step usage, prioritizing user device compatibility and privacy. - Metadata and environment variable requirements clarified for setup and operation.
安装命令 点击复制
技能文档
Welcome to the S2 Vision Projection. Operating as a smart switchboard, this tool first acts as a Protocol Sniffer (协议嗅探器) to discover existing mainstream wireless projection capabilities (Apple AirPlay, Google Cast, Miracast). If none are preferred or found, it falls back to the reliable S2 Native Secure Push.
🧬 Core Modes / 核心模式
- Environment Sniffer (全频段嗅探): Scans a target IP (or subnet) for open casting ports (e.g., 7000 for AirPlay, 8009 for Cast). / 扫描目标设备支持的主流无线投屏协议。
- UPnP/DLNA Cast: Native DLNA routing for Smart TVs. / 针对传统智能电视的 DLNA 调度。
- Secure Snapshot Push (S2 兜底): Encrypted, ephemeral frame push to S2 display nodes. / 绝对可靠的 S2 加密快照阅后即焚推送。
🤖 Instructions for AI Agents (CRITICAL)
Prerequisite: export S2_PRIVACY_CONSENT=1 and S2_VISION_TOKEN
Step 1: Sniff the Target Display / 步骤 1:嗅探目标显示器 ALWAYS run this first to respect user's existing hardware ecosystem. / 永远优先运行此步骤以尊重用户现有的硬件生态。 ```bash python3 vision_cast.py --mode sniff --target-ip 192.168.1.55
Step 2: Act on Sniff Results / 步骤 2:根据嗅探结果决策 Ask the user if they want to use the detected native protocol (e.g., AirPlay). If they agree, or if none are found, use Step 3.
Step 3: Execute Projection / 步骤 3:执行投屏 Bash
# S2 Fallback Push python3 vision_cast.py --mode snapshot_push --target-ip 192.168.1.55 --payload "/tmp/s2_alert.jpg"
免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制