Command-Line
System automation through conversation
Command-Line Functionality
Machine can execute command-line operations on your behalf, enabling powerful system automation through simple conversations. This capability allows you to perform complex technical tasks without needing to remember specific command syntax.
Overview
The command-line functionality serves as a bridge between natural language and system-level operations, allowing you to:
- Run terminal commands without memorizing syntax
- Execute scripts and programs
- Automate system tasks
- Install and configure software
- Manage files and directories at the system level
Command-line operations can modify your system and files. Machine always asks for confirmation before executing potentially destructive or high-impact commands.
Available Operations
File System Operations
Machine can help you manage files and directories through commands like:
System Information
Retrieve information about your system:
Network Operations
Perform network diagnostics and operations:
Package Management
Install and manage software packages:
Process Management
Control running processes:
Using Command-Line Functionality
Natural Language Requests
You don’t need to know exact commands. Simply describe what you want to accomplish:
Script Creation
Machine can create, explain, and execute scripts:
Automation Workflows
Create complex automation workflows through conversation:
Security Considerations
When using command-line functionality, Machine follows these security principles:
Permission Requirements
- Machine only executes commands with your current user permissions
- Elevated privileges (sudo/Administrator) are clearly indicated before execution
- You must explicitly approve commands requiring elevated privileges
Command Review
- All commands are shown to you before execution
- Potentially destructive operations are highlighted with warnings
- Machine explains complex commands in plain language
Execution Contexts
- By default, commands run in a secure execution context
- File system access is limited to your user directories unless explicitly expanded
- Network operations follow strict security policies
Best Practices
Follow these guidelines for optimal and secure use of command-line functionality:
- Review commands carefully before approving execution
- Start simple with basic commands before attempting complex operations
- Use descriptive requests to help Machine understand your goals
- Ask for explanations if you don’t understand what a command does
- Create scripts for recurring operations rather than executing complex commands repeatedly
Platform-Specific Considerations
Windows
- PowerShell and Command Prompt commands are both supported
- Some operations may require Administrator privileges
- UNC paths are supported for network operations
macOS/Linux
- Bash, Zsh, and other common shells are supported
- Environment variables are preserved between commands
- File permissions follow standard Unix models
For advanced command-line operations or custom scripts, you can provide Machine with specific syntax or ask it to optimize commands for your particular environment.