Sambusa
快速概览
Ere Nulim•2026/04/09•1 分钟阅读•3 天前更新

食材
Ingredients
- olive oil
- 1 small onion, finely chopped
- 1 leek, washed and chopped
- garlic, minced
- ground beef
- ground cumin
- ground cardamom
- salt
- pepper
- all-purpose flour
- water, or as needed
- 1 (14 ounce) package spring roll wrappers
- 1 quart oil for frying, or as needed
制作步骤
Gather all ingredients.
Heat olive oil in a large skillet over medium-low heat. Add onion, leek, and garlic; cook and stir until onion is transparent.
Add ground beef; cook and stir until still slightly pink and about halfway done.
Season with cumin, cardamom, salt, and pepper; mix well. Continue cooking until beef is browned and crumbly. Remove the skillet from heat.
Mix flour and water together in a small bowl to make a thin paste. Using one wrapper at a time, fold into the shape of a cone.
Fill cone with beef mixture, close the top, and seal with paste. Repeat until wrappers or filling are used up.
Heat oil in a deep fryer or large saucepan to 365 degrees F (170 degrees C). There should be enough oil to submerge sambusas. Fry sambusas, a few at a time, in hot oil until golden brown.
Remove to a paper towel-lined plate to drain.
营养成分(每份)
常见问题
Is this recipe suitable for dietary restrictions?
Check the ingredients list for dietary compatibility.
What cuisine does this belong to?
This recipe represents authentic cooking traditions.
How long does it take to prepare?
Preparation and cooking time details are provided in the recipe.
How difficult is this recipe?
This recipe is suitable for home cooks of all skill levels.
Can I make this ahead of time?
Many recipes can be prepared in advance.
Where can I find more recipes like this?
Explore more recipes on kb.pub.
Can I substitute ingredients?
Yes, common ingredient substitutions are usually possible.
还有更多问题?访问 kb.pub 获取更多信息。
相关内容
知识库
更多 →Essential security practices for protecting your digital life.
Essential security practices for protecting your digital life.
How to create and manage secure passwords.
How to create and manage secure passwords.
Best practices for database backup and recovery.
Best practices for database backup and recovery.



