hexr CLI is the primary interface for building, publishing, and deploying AI agents on the Hexr platform. You use it from your local machine or CI pipeline to go from a Python agent file to a running, identity-provisioned Kubernetes pod — with SPIFFE certificates, mTLS networking, and A2A endpoints configured automatically. No Dockerfile authoring, no manual manifest writing, no kubectl gymnastics required.
Installation
hexr-sdk Python package — no separate install step.
Commands
| Command | Description |
|---|---|
hexr build | AST analysis → Dockerfile + K8s manifests + SPIFFE contexts |
hexr push | Build container image + vulnerability scan + push to registry |
hexr deploy | Apply manifests to Kubernetes cluster |
hexr audit | Vulnerability scan + SBOM generation + drift detection |
hexr login | Authenticate with Hexr Cloud |
hexr status | Show deployed agents and their health |
hexr cache | Credential cache management |
Global flags
| Flag | Description |
|---|---|
--verbose, -v | Verbose output |
--debug | Debug-level logging |
--version | Show version |
The three-command workflow
Every Hexr deployment follows the same three steps. Here is what each one does and what you see in your terminal:hexr build — analyze and generate
hexr build performs AST analysis on your agent file, detects its framework, agents, cloud resource usage, and A2A configuration, then writes a complete set of deployment artifacts to .hexr/.hexr push — build and publish the image
hexr push picks a build strategy (Docker Build Cloud, local buildx, or Google Cloud Build), builds a multi-platform container image, runs a vulnerability scan, and pushes the result to your registry.