codex-plan-reviewer
Audited by Socket on Mar 19, 2026
1 alert found:
Obfuscated FileThe module itself does not contain active malware or obfuscated payloads, but it creates a moderate supply-chain and data-exfiltration risk by forwarding user-supplied plan and prior-context contents to an external, non-audited 'codex' CLI and persisting the raw responses and plan snapshots to disk. Missing prompt templates (empty REVIEW_PROMPT_* variables) are anomalous and suggest incomplete packaging or tampering. Recommend treating the external CLI as untrusted until audited, avoid sending secrets, add redaction/secret-scanning, populate and verify prompt templates, restrict filesystem permissions for output artifacts, and consider embedding or vetting the review implementation rather than delegating to an external third-party CLI.