codex-agent
Warn
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/codex-asyncacts as a wrapper for an external CLI tool namedcodex. It invokescodex execwith the--full-autoflag, which allows for autonomous operations without human intervention. - [COMMAND_EXECUTION]: The skill documentation explicitly defines a
--sandboxoption with adanger-full-accesssetting. This mode provides the execution engine with high-privilege access to the environment, increasing the risk of significant system impact if malicious instructions are processed. - [COMMAND_EXECUTION]: The script manages background tasks by writing PIDs and metadata to
/tmp/codex-tasks. On shared systems, the use of predictable paths in/tmpwithout strict permissions can lead to local privilege escalation or task manipulation. - [PROMPT_INJECTION]: The skill exhibits a significant surface for indirect prompt injection.
- Ingestion points: The skill reads user prompts and operates on files within the specified
--cd(workdir) path viacodex exec. - Boundary markers: No boundary markers or 'ignore' instructions are used to delimit external code from system instructions.
- Capability inventory: The skill can execute arbitrary commands and modify files through the
codexCLI with full autonomy. - Sanitization: While the prompt is escaped using
json.dumpsfor storage in a local metadata file, the content passed to thecodexexecutor is unvetted, allowing content within the project files to potentially hijack the agent's logic.
Audit Metadata