Command-Line Functionality
Machine can execute command-line operations on your behalf, enabling powerful system automation through simple conversations. This capability allows you to perform complex technical tasks without needing to remember specific command syntax.Overview
The command-line functionality serves as a bridge between natural language and system-level operations, allowing you to:- Run terminal commands without memorizing syntax
- Execute scripts and programs
- Automate system tasks
- Install and configure software
- Manage files and directories at the system level
Command-line operations can modify your system and files. Machine always asks for confirmation before executing potentially destructive or high-impact commands.
Available Operations
File System Operations
Machine can help you manage files and directories through commands like:System Information
Retrieve information about your system:Network Operations
Perform network diagnostics and operations:Package Management
Install and manage software packages:Process Management
Control running processes:Using Command-Line Functionality
Natural Language Requests
You don’t need to know exact commands. Simply describe what you want to accomplish:Script Creation
Machine can create, explain, and execute scripts:Automation Workflows
Create complex automation workflows through conversation:Security Considerations
When using command-line functionality, Machine follows these security principles:Permission Requirements
- Machine only executes commands with your current user permissions
- Elevated privileges (sudo/Administrator) are clearly indicated before execution
- You must explicitly approve commands requiring elevated privileges
Command Review
- All commands are shown to you before execution
- Potentially destructive operations are highlighted with warnings
- Machine explains complex commands in plain language
Execution Contexts
- By default, commands run in a secure execution context
- File system access is limited to your user directories unless explicitly expanded
- Network operations follow strict security policies
Best Practices
Follow these guidelines for optimal and secure use of command-line functionality:- Review commands carefully before approving execution
- Start simple with basic commands before attempting complex operations
- Use descriptive requests to help Machine understand your goals
- Ask for explanations if you don’t understand what a command does
- Create scripts for recurring operations rather than executing complex commands repeatedly
Platform-Specific Considerations
Windows
- PowerShell and Command Prompt commands are both supported
- Some operations may require Administrator privileges
- UNC paths are supported for network operations
macOS/Linux
- Bash, Zsh, and other common shells are supported
- Environment variables are preserved between commands
- File permissions follow standard Unix models
For advanced command-line operations or custom scripts, you can provide Machine with specific syntax or ask it to optimize commands for your particular environment.