codex-subagents
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure & Exfiltration (LOW): The skill accesses and may clone sensitive authentication files (
~/.codex/auth.json,~/.codex/config.toml) into a local project directory (.codex-home) to facilitate subagent authentication in write-restricted environments (seedev/src/lib/exec-runner.ts). This poses a risk of credential exposure if the project directory is shared or committed.\n- Dynamic Execution (LOW): The tool manages long-running background tasks by spawning detached worker processes vianodeand executing external CLI binaries (codex,claude) with arguments constructed at runtime (seedev/src/commands/send.tsanddev/src/lib/backends.ts).\n- Indirect Prompt Injection (LOW): The skill's primary function involves interpolating untrusted user prompts into execution flows for subagents.\n - Ingestion points:
promptBodyandpromptFileinputs in thestartandsendcommand workflows.\n - Boundary markers:
composePrompt(indev/src/lib/prompt.ts) prepends working directory context but lacks strict delimiters for user content.\n - Capability inventory: Subagents run with the full capabilities of the underlying CLI tools, which include file modification and command execution.\n
- Sanitization: Prompts are passed to backends without sanitization or validation of the input content.
Audit Metadata