orchestrate-codex

Warn

Audited by Socket on May 13, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
scripts/codex-cc/lib/app-server.mjs

No direct indicators of malware (e.g., exfiltration, backdoor, credential theft, or exploit code) are present in this fragment. However, it introduces moderate-to-high operational security risk due to (1) spawning an external binary by name (`codex`) with inherited/broad environment variables, (2) unusual Windows `shell` configuration, and (3) connecting to a broker endpoint/path derived from environment/session configuration without visible allowlist/validation in this fragment. The security posture depends heavily on how `parseBrokerEndpoint`, protocol handlers (`handleLine/handleChunk`), and option/environment sourcing are validated elsewhere.

Confidence: 58%Severity: 62%
SecurityMEDIUM
SKILL.md

BENIGN. The skill is internally consistent: it orchestrates the official OpenAI Codex CLI, manages manifests/worktrees, and monitors fleet runs as advertised. The main concern is not malware but elevated operational risk: it intentionally disables sandbox/approval protections and enables detached autonomous code actions, so it should be treated as a high-privilege developer automation skill rather than a low-risk helper.

Confidence: 89%Severity: 74%
Audit Metadata
Analyzed At
May 13, 2026, 04:15 AM
Package URL
pkg:socket/skills-sh/yigitkonur%2Fskills-by-yigitkonur%2Forchestrate-codex%2F@cf88501f4277001dc80f4bb82dd0eac62b2d3ac4