codex-tools

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill explicitly promotes bypassing approvals and sandboxing to run arbitrary commands and modify files, enabling remote code execution, credential access, and supply-chain abuses even though it contains no directly obfuscated payload or explicit exfiltration code.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's "Web Search" section shows use of codex exec --search (e.g., "Research best practices for GraphQL") which performs searches of public web content that the agent is expected to read and use, exposing it to untrusted third-party/user-generated material.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly instructs bypassing approvals and sandboxes ("--dangerously-bypass-approvals-and-sandbox", "permission bypass") and enables arbitrary shell/file modifications and full automation, which pushes the agent to evade security controls and modify the host state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 12:52 AM