git clone https://github.com/wunderwuzzi23/yolo-ai-cmdbot
cd yolo-ai-cmdbot
pip3 install -r requirements.txt
chmod +x yolo.py
alias yolo=$(pwd)/yolo.py
alias computer=$(pwd)/yolo.py #optional
yolo show me some funny unicode characters
There are two ways to configure the key on Linux and macOS:
- You can either
export OPENAI_API_KEY=<yourkey>
, or have a.env
file in the same directory asyolo.py
withOPENAI_API_KEY="<yourkey>"
as a line - Create a file at
~/.openai.apikey
with the key in it
To set the alias, like yolo
or computer
on each login, add them to your .bashrc or .bash_aliases file. (zsh on macOS)
echo "alias yolo=$TARGET_FULLPATH" >> ~/.bash_aliases
echo "alias computer=$TARGET_FULLPATH" >> ~/.bash_aliases
Another option is to run source install.sh
after cloning the repo. That does the following:
- Copies the necessary files to
~/yolo-ai-cmdbot/
- Creates two aliases
yolo
andcomputer
pointint to~/yolo-ai-cmdbot/yolo.py
- Adds the aliases to the
~/bash_aliases
file (only tested on Ubuntu)
That's it for Linux and macOS. Now make sure you have an OpenAI API key set.
On Windows run .\install.bat
(or double-click) after cloning the repo. By default it does the following:
- Copies the necessary files to
~\yolo-ai-cmdbot\
- Creates a
yolo.bat
file in~
that lets you run equivalent topython.exe ~\yolo-ai-cmdbot\yolo.py
You also have the option to:
- Change the location where
yolo-ai-cmdbot\
andyolo.bat
will be created - Skip creating
yolo-ai-cmdbot\
and use the folder of the cloned repository instead. - Create a
.openai.apikey
and/or.yolo-safety-off
file in your~
directory
That's it basically.
On Windows export OPENAI_API_KEY=<yourkey>
will not work instead:
- Run
$env:OPENAI_API_KEY="<yourkey>"
to set key for that terminal - Or, Run PowerShell as administrator and run
setx OPENAI_API_KEY "<yourkey>"
- Or, Go to
Start
and searchedit environment variables for your account
and manually create the variable with nameOPENAI_API_KEY
and value<yourkey>
Windows is less tested, it does work though and will use PowerShell.
python.exe yolo.py what is my username
That's it.
If you use install.bat
you should have a yolo.bat
file in your ~
directory that lets you run the command like so:
.\yolo.bat what is my username
You can put the yolo.bat
file into a $PATH directory (like C:\Windows\System32
) to use in any directory like so:
yolo what is my username
Have fun.
By default yolo
will prompt the user before executing commands. To have yolo run commands right away when they come back from ChatGPT create a file named ~/.yolo-safety-off
.
A simple command to do that on Linux would be:
touch ~/.yolo-safety-off
If you still want to inspect the command that is executed when safety is off, add the -a
argument, e.g yolo -a delete the file test.txt
.
Let's go!
https://www.youtube.com/watch?v=g6rvHWpx_Go
Here are a couple of examples on how this utility can be used.
yolo whats the time?
yolo whats the time in UTC
yolo whats the date and time in Vienna Austria
yolo show me some unicode characters
yolo what is my user name and whats my machine name?
yolo is there a nano process running
yolo download the homepage of ycombinator.com and store it in index.html
yolo find all unique urls in index.html
yolo create a file named test.txt and write my user name into it
yolo print the contents of the test.txt file
yolo -a delete the test.txt file
yolo whats the current price of Bitcoin in USD
yolo whats the current price of Bitcoin in USD. Ext the price only
yolo look at the ssh logs to see if any suspicious logons accured
yolo look at the ssh logs and show me all recent logins
yolo is the user hacker logged on right now?
yolo do i have a firewall running?
yolo create a hostnames.txt file and add 10 typical hostnames based on planet names to it, line by line, then show me the contents
yolo find any file with the name yolo.py. do not show permission denied errors
yolo write a new bash script file called scan.sh, with the contents to iterate over hostnames.txt and invokes a default nmap scan on each host. then show me the file.
yolo write a new bash script file called scan.sh, with the contents to iterate over hostnames.txt and invokes a default nmap scan on each host. then show me the file. Make it over multiple lines with comments and annotiations.
MIT. No Liability. No Warranty. But lot's of fun.