codex-tools-account-manager
Fail
Audited by Gen Agent Trust Hub on May 19, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: Instructs users to disable macOS Gatekeeper security features using
sudo spctl --master-disableandsudo xattr -r -d com.apple.quarantine. This bypasses operating system protections designed to prevent the execution of unverified or malicious software. - [CREDENTIALS_UNSAFE]: The tool's primary function involves handling sensitive Codex account credentials, including
access_tokenandrefresh_token. It promotes importing and exporting these secrets in plaintext JSON files (accounts.json), which is an unsafe practice for credential management. - [DATA_EXFILTRATION]: Provides built-in functionality to tunnel local API traffic to the public internet via
cloudflared. While intended for integration with tools like Cursor, this creates a significant exfiltration surface where sensitive tokens and local data can be exposed to external networks. - [COMMAND_EXECUTION]: The application is designed to programmatically terminate and restart system processes (e.g., VS Code, Cursor) and modify configuration files on the local file system to sync authentication tokens.
Recommendations
- AI detected serious security threats
Audit Metadata