@termly-dev/cli
Advanced tools
@@ -160,2 +160,20 @@ const { exec } = require('child_process'); | ||
| }, | ||
| 'pi': { | ||
| key: 'pi', | ||
| command: 'pi', | ||
| args: [], | ||
| displayName: 'Pi Coding Agent', | ||
| description: 'Minimal AI coding agent with extensions, skills, and 15+ LLM providers', | ||
| website: 'https://shittycodingagent.ai', | ||
| checkInstalled: async () => await commandExists('pi') | ||
| }, | ||
| 'kilo': { | ||
| key: 'kilo', | ||
| command: 'kilo', | ||
| args: [], | ||
| displayName: 'Kilo Code CLI', | ||
| description: 'Agentic engineering CLI with 500+ models and parallel mode', | ||
| website: 'https://kilo.ai', | ||
| checkInstalled: async () => await commandExists('kilo') | ||
| }, | ||
| 'demo': { | ||
@@ -162,0 +180,0 @@ key: 'demo', |
@@ -20,3 +20,3 @@ const pty = require('node-pty'); | ||
| // TUI tools that use alternate screen buffer (internal scroll, mouse events) | ||
| this.tuiTools = ['opencode']; | ||
| this.tuiTools = ['opencode', 'kilo']; | ||
| this.isTUIMode = this.tuiTools.includes(tool.key); | ||
@@ -23,0 +23,0 @@ |
+2
-2
| { | ||
| "name": "@termly-dev/cli", | ||
| "version": "1.7.0", | ||
| "description": "Mirror your AI coding sessions to mobile - control Claude, Aider, Copilot, and 17+ tools from your phone", | ||
| "version": "1.9.0", | ||
| "description": "Mirror your AI coding sessions to mobile - control Claude, Aider, Copilot, and 19+ tools from your phone", | ||
| "main": "index.js", | ||
@@ -6,0 +6,0 @@ "bin": { |
+9
-5
@@ -5,9 +5,11 @@ # Termly CLI | ||
| ## What's New in v1.7 | ||
| ## What's New in v1.9 | ||
| - 🖥️ **TUI Mode Support** - Full support for TUI apps like OpenCode (alternate screen buffer, mouse events) | ||
| - 🎯 **OpenCode Integration** - Native support for OpenCode with internal scroll and mouse handling | ||
| - 🔄 **Smarter Reconnection** - Skip useless catchup for TUI apps that redraw full screen | ||
| - 🎯 **Pi Coding Agent** - Support for minimal AI coding agent with extensions and 15+ LLM providers | ||
| - 🚀 **Kilo Code CLI** - Full TUI support for agentic engineering CLI with 500+ models | ||
| - 🖥️ **Enhanced TUI** - Improved TUI mode for Kilo Code with alternate screen buffer | ||
| **Previous versions:** | ||
| - **v1.8** - Added Pi Coding Agent and Kilo Code CLI support | ||
| - **v1.7** - TUI mode support, OpenCode integration, smarter reconnection | ||
| - **v1.5** - Push notifications support, improved session stability | ||
@@ -139,3 +141,3 @@ - **v1.3** - Prebuilt binaries, improved Windows support, fast installation | ||
| Termly CLI supports **20+ interactive terminal-based AI coding assistants**: | ||
| Termly CLI supports **22+ interactive terminal-based AI coding assistants**: | ||
@@ -155,2 +157,4 @@ ### Official Tools from Major Companies | ||
| - **OpenCode** - TUI-based AI coding agent with LSP integration (full TUI support!) | ||
| - **Kilo Code CLI** - Agentic engineering CLI with 500+ models and parallel mode (full TUI support!) | ||
| - **Pi Coding Agent** - Minimal AI agent with extensions, skills, and 15+ LLM providers | ||
| - **Continue CLI** - Modular architecture | ||
@@ -157,0 +161,0 @@ - **OpenHands** - Open-source Devin alternative |
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
173902
0.51%4219
0.43%470
0.86%