hyle is an AI code assistant that shows every action, runs locally, and never hides what's happening. Verify everything yourself.
Every operation is logged. Click any entry to inspect details.
Tool: read_file Path: /home/dev/myproject/src/handlers/auth.rs Bytes read: 2,847 Duration: 0.3ms Permissions: 644 Owner: dev:dev
Tool: write_file
Path: /home/dev/myproject/src/handlers/auth.rs
Bytes written: 2,912
Lines changed: +3, -1
Backup: .hyle/backups/auth.rs.1704825782.bak
Diff preview:
+ use tracing::{info, warn};
+ info!("auth attempt: {}", username);
- // TODO: add logging
Tool: run_command
Command: cargo test --lib
Working directory: /home/dev/myproject
Exit code: 0
Duration: 4.2s
Stdout: running 47 tests...
test result: ok. 47 passed; 0 failed
Tool: run_command (BLOCKED) Command: rm -rf / Matched filter: "rm -rf /" Filter category: destructive_filesystem Action: Command rejected, user notified Logged to: ~/.local/state/hyle/security.log
Tool: read_file Path: /home/dev/myproject/Cargo.toml Bytes read: 1,234 Duration: 0.2ms
Tool: run_command Command: cargo clippy -- -D warnings Exit code: 0 Duration: 8.7s Warnings: 0
Test any command against hyle's security filters before execution.
Every file modification shows exactly what changed. Nothing hidden.
Commands are checked against these patterns. All filters are visible in source.
Browse the actual implementation. Every security decision is documented.
Don't take our word for it. Verify each claim yourself.
All code is MIT licensed at github.com/uprootiny/hyle
Run with tcpdump or wireshark. Only traffic is to OpenRouter API.
Use inotifywait to monitor. Only writes to ~/.config/hyle and ~/.local/state/hyle
Clone, audit, and compile yourself. cargo build --release
364 tests covering safety filters, file operations, and session handling.
grep -r "analytics\|telemetry\|tracking" src/ returns nothing.
Read the source. Run the tests. Decide for yourself.
View Source Code