codex-review

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). This content does not contain explicit obfuscated payloads or credential-stealing code, but it repeatedly instructs sending local/PR diffs to an external "codex" execution service and uses a clearly dangerous flag (--dangerously-bypass-approvals-and-sandbox) plus automated "apply" behavior, creating a high risk of unauthorized data exfiltration, remote code execution, and repository compromise if the external service or model is malicious or compromised.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly ingests PR bodies and diffs from GitHub (e.g., gh pr view --json body,diff | codex exec ...), which are untrusted, user-generated third‑party content that the agent is expected to read and interpret as part of its workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt explicitly instructs use of a "--dangerously-bypass-approvals-and-sandbox" flag and automatised "auto-fix" + "apply" workflows that can execute arbitrary code and modify files (potentially outside the project), which constitutes bypassing security mechanisms and risks compromising the machine state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:17 AM