Kissasean.sh Site
The script uses who , grep , cut , write , and date —standard tools from 1970s Bell Labs. No dependencies. No containers. Just a kiss, a log, and a little mystery. “I installed it on our production jump box as a joke,” says one Reddit user, “and now there’s a cron job running it every Friday at 4:59 PM. Sean from accounting has no idea why he keeps getting kissed right before the weekend.” To be clear: kissasean.sh is not malicious, but it is mischievous. Sending unsolicited terminal messages to another user ( write $SEAN ) is borderline workplace chaos. Some IT departments have banned it. Others have integrated it into onboarding.
#!/bin/bash # kissasean.sh - Because even servers need affection. KISS="💋" SEAN=$(who | grep -i sean | cut -d' ' -f1 | head -n1) if [ -z "$SEAN" ]; then echo "👻 No Sean found. Kissing current user instead." echo "$KISS -> $(whoami) at $(date)" >> ~/.kisslog else echo "$KISS -> $SEAN at $(date)" >> /tmp/kissasean.log write $SEAN "💋 Pucker up, $SEAN. You've been kissed by $(whoami)." fi kissasean.sh
One startup in Portland reportedly uses a modified version called kissadeploy.sh , which blows a kiss to the last person who broke the build. You won’t find it in apt or brew . That’s part of the charm. It lives in Gists, Pastebins, and the occasional forgotten dotfiles repo. To install: The script uses who , grep , cut