codex-review-loop
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill automatically identifies and executes type-checking commands from the local repository (such as
npm run typecheck,npx tsc,mypy, orcargo check). This involves executing potentially arbitrary code defined in files likepackage.jsonorpyproject.tomlbelonging to the repository being reviewed. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
@openai/codexCLI tool from the public NPM registry. As this originates from a well-known service (OpenAI), the reference itself is considered a standard operational requirement. - [PROMPT_INJECTION]: The skill implements an iterative loop that parses prose and structured findings from the OpenAI Codex LLM to automatically apply code fixes via the
Edittool. This creates a surface for indirect prompt injection where malicious or erroneous suggestions from the external model could lead to unintended modifications of the local codebase. - Ingestion points: Findings are ingested from the output of the Codex CLI stored in
/tmp/codex-review-findings.md. - Boundary markers: The skill does not use explicit boundary markers or 'ignore' instructions when parsing the external findings.
- Capability inventory: The agent is granted
Read,Edit, andBashcapabilities to fulfill the review and fix cycle. - Sanitization: There is no validation or sanitization of the suggestions provided by the external model before the agent attempts to implement them.
- [COMMAND_EXECUTION]: The skill utilizes a shell script
scripts/codex-review.shto execute the Codex CLI. While the script employs double-quoting for variables likeFOCUSandBASE_BRANCHto mitigate basic shell injection, it still performs operations based on user-supplied strings within a powerfulBashexecution environment.
Audit Metadata