codex
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Bash tool to execute the
codexCLI, facilitating shell command execution on the local host. - [REMOTE_CODE_EXECUTION]: The
codex execandcodex reviewcommands establish a workflow where code is generated by remote AI models and executed locally. - [COMMAND_EXECUTION]: The reference material explicitly details the
-s danger-full-accessflag, which removes all security sandboxing for filesystem and network operations. - [COMMAND_EXECUTION]: The skill provides an approval policy setting (
-a never) that allows the AI tool to execute generated commands without user confirmation. - [PROMPT_INJECTION]: The skill creates an indirect injection surface by interpolating user-provided task requests into English prompts for the
codextool. Untrusted input is ingested inSKILL.md(Step 2), placed within double-quote boundaries in a shell command (codex exec "<english-prompt>"), and processed by a tool with subprocess and file-write capabilities (as seen in the capability inventory), with no documented sanitization or escaping logic.
Recommendations
- AI detected serious security threats
Audit Metadata