codexplusplus-launcher
Fail
Audited by Gen Agent Trust Hub on May 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs users to clone a repository from an untrusted source:
https://github.com/BigPizzaV3/CodexPlusPlus.git. This source does not match the stated author of the skill. - [REMOTE_CODE_EXECUTION]: The installation process involves downloading external code and installing it as an editable Python package via
python -m pip install -e ., followed by execution of that code usingpython -m codex_session_delete. - [COMMAND_EXECUTION]: The skill requires running various command-line tools including
setup.batand multiple Python module calls that perform system-level operations such as creating application bundles and shortcuts. - [COMMAND_EXECUTION]: The skill includes a 'Watcher' feature (
watch-install) designed to intercept the launch of the original Codex application and redirect it to the injected launcher, which constitutes a persistence and interception mechanism. - [REMOTE_CODE_EXECUTION]: The tool uses Chromium DevTools Protocol (CDP) to perform dynamic code injection (
renderer-inject.js) into the memory space of a running application to modify its frontend and enable hidden features.
Recommendations
- AI detected serious security threats
Audit Metadata