AI-powered Git workflow CLI - smart commits, PRs, and security scanning
npm install wushAI-powered Git workflow CLI that generates meaningful commits, creates PRs, and scans for vulnerabilities.


``bash`
npm install -g wush
`bash`First run will guide you through setup
wush commit
bash
wush commit # or wush c
`
Analyzes staged changes and generates AI-powered commit messages.$3
`bash
wush pr --dev # PR to dev branch
wush pr --main # PR to main branch
wush pr # Interactive branch selection
`$3
`bash
wush branch # or wush b
`
Create branches with AI-generated names based on your task description.$3
`bash
wush push # or wush p
wush pull # or wush l
wush pull -r # Pull with rebase
`
Push and pull changes with smart defaults and safety prompts.$3
`bash
wush scan # or wush s
`
Scans codebase for vulnerabilities (SQL injection, XSS, hardcoded secrets, etc.)$3
`bash
wush status
`
Enhanced git status with color-coded output.$3
`bash
wush config
``| Provider | Models |
|----------|--------|
| OpenAI | GPT-5, GPT-5 mini, GPT-5 nano |
| Anthropic | Claude Sonnet 4.5, Claude Haiku 4.5 |
| Google | Gemini 2.5 Pro, Gemini 2.5 Flash |
| Ollama | Llama 3.3 70B, Qwen3 72B (Local - Free) |
| Groq | gpt-oss-120B, Llama 4 (Fast inference) |
| Azure OpenAI | GPT-4o, GPT-4o mini, GPT-4 Turbo (Enterprise) |
On first run, Wush will guide you through:
1. Select AI provider
2. Enter API key (skip for Ollama)
3. Choose default model
4. Configure git preferences
5. Connect GitHub (optional, for PR features)
- 🤖 AI-Powered Commits - Generate meaningful commit messages from your changes
- 🔀 Smart PRs - Auto-generate PR titles and descriptions
- 🌿 Branch Creation - AI-suggested branch names based on task description
- 🔒 Security Scanning - Detect vulnerabilities before they ship
- 🎨 Beautiful UI - Sleek terminal interface with colors and animations
- âš¡ Multiple AI Providers - Choose your preferred AI (OpenAI, Azure OpenAI, Claude, Gemini, Ollama, Groq)
- 🔧 Conventional Commits - Follow best practices automatically
Wush detects common vulnerabilities:
- SQL Injection
- XSS (Cross-Site Scripting)
- Hardcoded secrets & API keys
- Weak cryptography
- Command injection
- Path traversal
- And more...
MIT © bikidsx