codex-plugin-claude-code
Warn
Audited by Gen Agent Trust Hub on May 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill includes JavaScript examples that utilize
child_process.execSyncto run shell commands. - [COMMAND_EXECUTION]: The
delegateToCodexfunction in the provided code examples is vulnerable to shell command injection. It interpolates thetaskvariable directly into a command string without sanitization, which could allow an attacker to execute arbitrary commands if the task description contains shell metacharacters. - [COMMAND_EXECUTION]: The skill uses dynamic context injection (
!codex login) to execute a shell command when the skill is loaded. - [EXTERNAL_DOWNLOADS]: The skill facilitates the installation of the
@openai/codexpackage from the npm registry and adds a plugin marketplace from OpenAI's GitHub organization. - [REMOTE_CODE_EXECUTION]: The skill triggers the execution of the
codexCLI, which sends local source code to OpenAI's remote infrastructure for processing. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface. It ingests untrusted code and task descriptions for processing. While it provides powerful capabilities to execute commands via the Codex CLI, the provided examples lack boundary markers or sanitization logic to prevent malicious instructions within the processed data from influencing agent behavior.
Audit Metadata