codex-mcp

Warn

Audited by Socket on Apr 14, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/codex-mcp-server.mjs

This code is primarily an orchestration wrapper around a local `codex` subprocess. It does not show clear intentional malware (no exfiltration/crypto/backdoor logic). However, it contains a high-severity security weakness: `context_cmd` from external RPC input is executed via `execSync` without validation, enabling arbitrary command execution under the user’s privileges. Additionally, its sandbox/approval mediation defaults appear permissive (auto-accepts file/permission approvals), increasing the risk that the spawned child can modify project files. Overall: likely more of a dangerous orchestration design than overt sabotage, but security-critical if exposed to untrusted callers.

Confidence: 78%Severity: 82%
Audit Metadata
Analyzed At
Apr 14, 2026, 02:13 PM
Package URL
pkg:socket/skills-sh/krishamaze%2Fskills%2Fcodex-mcp%2F@2a78641d341fc57f467079b56e55675ef56a0f4e