English in, Shell out.

A secure, zero-bloat CLI companion that turns natural language and error logs into executable commands. 100% private and locally-hosted.

hey-cli demo animation

100% Local

All reasoning happens on your machine via Ollama. No API keys, no telemetry, and your data never leaves your shell.

OS Aware

Detects macOS, Linux, and Windows natively. Generates the correct flags for your specific shell and package manager.

Secure Governance

Dangerous commands are intercepted by the Built-in Governance Engine, requiring explicit confirmation before execution.

Native knowledge across all ecosystems

macOS
Linux (Ubuntu, Arch, Fedora)
Windows PowerShell
FreeBSD

Under the Hood

Plain English
Governance Engine
Ollama (Local LLM)
Command Runner

Governance Engine

The core of hey-cli's safety. It intercepts every command before execution, checking it against ~/.hey-rules.json. Dangerous commands (like rm -rf /) are blocked or restricted, requiring manual keyword confirmation to proceed.

Get Started in Seconds

Method 1: Homebrew (Recommended)

brew install sinsniwal/hey-cli/hey-cli

Method 2: One-Liner

curl -sL https://raw.githubusercontent.com/sinsniwal/hey-cli/main/install.sh | bash

Method 1: Universal Script

curl -sL https://raw.githubusercontent.com/sinsniwal/hey-cli/main/install.sh | bash

Method 2: uv tool

uv tool install hey-cli-python

Method 1: Scoop

scoop install https://raw.githubusercontent.com/sinsniwal/hey-cli/main/scoop/hey-cli.json

Method 2: PowerShell One-Liner

Invoke-WebRequest -Uri "https://raw.githubusercontent.com/sinsniwal/hey-cli/main/install.ps1" -OutFile "$env:TEMP\hey_install.ps1"; & "$env:TEMP\hey_install.ps1"