codex-quota
Fail
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill accesses and modifies the
~/.codex/auth.jsonfile, which contains authentication credentials for the OpenAI Codex service. It temporarily overwrites this file to iterate through multiple accounts. - Evidence: Found in
codex-quota.pywithin functionsget_active_account(),switch_account(), andupdate_all_accounts(). - [COMMAND_EXECUTION]: The script executes the external
codexCLI tool using thesubprocessmodule to refresh rate limit data. - Evidence:
subprocess.run(["codex", "exec", ...])in theping_codex()function incodex-quota.py. - [DATA_EXFILTRATION]: The skill writes account-level quota data and account names to
/tmp/codex-quota-all.json. On many systems, the/tmpdirectory is world-readable, meaning this sensitive summary could be accessed by other users on the same machine. - Evidence: Found in
codex-quota.pyin theupdate_all_accounts()function. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it processes session logs generated from external API responses.
- Ingestion points: Reads
.jsonlfiles from~/.codex/sessions/inextract_rate_limits(). - Boundary markers: Absent. The script parses the files as JSON without verifying the content source or using delimiters.
- Capability inventory: Capability to read/write authentication files and execute system commands via the
codexCLI. - Sanitization: Absent. The script assumes the validity of the JSON structure and contents within the log files.
Recommendations
- AI detected serious security threats
Audit Metadata