codexplusplus-launcher

Fail

Audited by Gen Agent Trust Hub on May 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill instructs users to clone a repository from an untrusted source: https://github.com/BigPizzaV3/CodexPlusPlus.git. This source does not match the stated author of the skill.
  • [REMOTE_CODE_EXECUTION]: The installation process involves downloading external code and installing it as an editable Python package via python -m pip install -e ., followed by execution of that code using python -m codex_session_delete.
  • [COMMAND_EXECUTION]: The skill requires running various command-line tools including setup.bat and multiple Python module calls that perform system-level operations such as creating application bundles and shortcuts.
  • [COMMAND_EXECUTION]: The skill includes a 'Watcher' feature (watch-install) designed to intercept the launch of the original Codex application and redirect it to the injected launcher, which constitutes a persistence and interception mechanism.
  • [REMOTE_CODE_EXECUTION]: The tool uses Chromium DevTools Protocol (CDP) to perform dynamic code injection (renderer-inject.js) into the memory space of a running application to modify its frontend and enable hidden features.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
May 16, 2026, 03:27 PM