AI-First

AI Agent Infrastructure

Give Claude Code, Cursor, Windsurf, and any AI agent persistent SSH access to your remote servers.

The problem

AI agents like Claude Code, Cursor, and GitHub Copilot need to execute commands on remote servers. But every tool call is stateless. The SSH connection drops between invocations. The agent reconnects, re-authenticates, and loses context every single time. Credentials end up in prompts. Complex commands break due to shell metacharacter re-interpretation across layers.

Without sshDCommander

  • - SSH connection drops between every tool call
  • - Agent must reconnect and re-authenticate each time
  • - Passwords or keys end up in the AI context window
  • - Complex commands with pipes and quotes break silently
  • - No audit trail of which agent did what

How sshDCommander solves it

sshDCommander runs a persistent daemon that keeps SSH connections alive across all tool calls. The AI agent calls simple CLI commands. The daemon routes them through the existing SSH session. Credentials stay in the OS keyring. Server profiles eliminate connection details from prompts.

Persistent Sessions

SSH connections survive between tool calls. No reconnect overhead. The daemon manages the full lifecycle.

Zero Credential Exposure

Server profiles + OS keyring integration. No passwords in prompts, no key material in context windows.

Mandatory Audit Trail

Every request requires --client-id. Full traceability: which agent ran which command on which server.

Script Mode for Complex Commands

The -s flag wraps commands in a temp script, uploads, executes, and cleans up. No more broken pipes or quotes.

In practice

claude-code — AI agent session
# AI agent connects and executes commands across tool calls
$ sshdcmd --client-id claude --server prod "systemctl status nginx" --connect
Connected to 10.0.1.5:22 as deploy
nginx.service - active (running)
# Next tool call — connection persists, no --connect needed
$ sshdcmd --client-id claude "df -h /"
/dev/sda1 80G 24G 52G 32% /
# Complex command — script mode handles pipes safely
$ sshdcmd --client-id claude -s "cat /var/log/nginx/access.log | tail -20 | grep 500"
# Upload a file with SHA-256 verification
$ sshdcp --client-id claude upload ./config.json /etc/app/config.json
SHA-256 verified config.json (2.1 KB) in 0.1s

Compatible AI clients

Claude Code
Cursor
GitHub Copilot
Windsurf
Aider
Cline
Codex CLI
Any shell agent

Give your AI agents reliable SSH access

5-day free trial. Works with any AI client that can execute shell commands.

Start Free TrialAI Instructions