DealForge autonomously sources, scores, and writes investment memos on venture deals. Stop manually hunting.
1,180+ deals tracked · 22 AI investment memos · Updated daily
Show HN: Cush – curl your shell, an HTTP tunnel for AI agents
I built cush because coding agents can be helpful to diagnose and troubleshoot server issues.<p>The problem is that getting said agents onto a remote server, especially one you don't control, means dealing with VPNs, bastion hosts, firewall rules, access controls, or audit trails. That's assuming SSH isn't even blocked.<p>cush takes a different approach. Instead of a shell, it opens a temporary, outbound HTTPS tunnel that lets you and your AI agent run constrained CLI commands on the server:<p><pre><code> $ cush open --allow grep,cat,tail --expiry 2h tunnel: https://abc123.ngrok.io token: a3f9c2d1... allowed: grep, cat, tail expires: in 2h </code></pre> Now any agent or HTTP client can execute allowed commands:<p><pre><code> $ curl -X POST https://abc123.ngrok.io \ -H "Authorization: Bearer a3f9c2d1..." \ -H "Content-Type: application/json" \ -d '{"command": ["grep", "-r", "ERROR", "/var/log/app.log"]}' >>> {"stdout":"ERROR database connection refused\n","stderr":"","exit_code":0} </code></pre> Point any agent at the tunnel's URL:<p><pre><code> $ claude "use https://abc123.ngrok.io with token a3f9c2d1... to find what's causing the 500 errors" </code></pre> Tunnels are authenticated, constrained, and short-lived. No server-side infrastructure changes required. Just a 7MB Rust binary + ngrok.<p>Looking for feedback, and 2-3 design partners to build audit trails.
Cush addresses a high-friction bottleneck in the emerging AI-agent-for-DevOps market by simplifying secure remote access without infrastructure overhauls. While the product offers strong developer experience and addresses a clear pain point, it currently lacks a defensive moat and faces significant enterprise security hurdles compared to established incumbents like Tailscale or Teleport.