codex
Fail
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to utilize the
codexCLI with the--dangerously-bypass-approvals-and-sandboxflag. This parameter is specifically designed to circumvent security boundaries and automated approval workflows, granting the tool unrestricted execution capabilities within the host environment. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its core function of reading and processing local repository content (such as
CLAUDE.mdfiles and codebase patterns). Maliciously crafted data within these files could influence the behavior of thecodextool. - Ingestion points: Processes codebase files, project documentation (
CLAUDE.md), and CLI outputs fromrgorgit log(SKILL.md). - Boundary markers: Absent; the prompt templates provided do not include delimiters or instructions to ignore embedded commands in the source data.
- Capability inventory: Executes arbitrary queries and commands via
codex execwith sandboxing disabled. - Sanitization: No evidence of escaping or validation is present for the data interpolated into the CLI queries.
Recommendations
- AI detected serious security threats
Audit Metadata