wush
v1.0.4
Published
AI-powered Git workflow CLI - smart commits, PRs, and security scanning
Downloads
411
Maintainers
Readme
Wush 🚀
AI-powered Git workflow CLI that generates meaningful commits, creates PRs, and scans for vulnerabilities.
Installation
npm install -g wushQuick Start
# First run will guide you through setup
wush commitCommands
Smart Commits
wush commit # or wush cAnalyzes staged changes and generates AI-powered commit messages.
Create PRs
wush pr --dev # PR to dev branch
wush pr --main # PR to main branch
wush pr # Interactive branch selectionBranch Creation
wush branch # or wush bCreate branches with AI-generated names based on your task description.
Security Scan
wush scan # or wush sScans codebase for vulnerabilities (SQL injection, XSS, hardcoded secrets, etc.)
Status
wush statusEnhanced git status with color-coded output.
Configuration
wush configConfigure AI provider, model, GitHub token, and preferences.
Supported AI Providers
| Provider | Models | |----------|--------| | OpenAI | GPT-5, GPT-5 mini, GPT-5 nano | | Anthropic | Claude Sonnet 4.5, Claude Haiku 4.5 | | Google | Gemini 2.5 Pro, Gemini 2.5 Flash | | Ollama | Llama 3.3 70B, Qwen3 72B (Local - Free) | | Groq | gpt-oss-120B, Llama 4 (Fast inference) |
First Run Setup
On first run, Wush will guide you through:
- Select AI provider
- Enter API key (skip for Ollama)
- Choose default model
- Configure git preferences
- Connect GitHub (optional, for PR features)
Features
- 🤖 AI-Powered Commits - Generate meaningful commit messages from your changes
- 🔀 Smart PRs - Auto-generate PR titles and descriptions
- 🌿 Branch Creation - AI-suggested branch names based on task description
- 🔒 Security Scanning - Detect vulnerabilities before they ship
- 🎨 Beautiful UI - Sleek terminal interface with colors and animations
- ⚡ Multiple AI Providers - Choose your preferred AI (OpenAI, Claude, Gemini, Ollama, Groq)
- 🔧 Conventional Commits - Follow best practices automatically
Security Scanning
Wush detects common vulnerabilities:
- SQL Injection
- XSS (Cross-Site Scripting)
- Hardcoded secrets & API keys
- Weak cryptography
- Command injection
- Path traversal
- And more...
License
MIT © bikidsx
