codex-reviewer
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script
codex_review.pyexecutes thecodexCLI viasubprocess.run. The documentation incodex_cli_reference.mdindicates the tool supports dangerous configurations such as--sandbox danger-full-accessand--full-auto. Exposing these features through a script that accepts arbitrary user input for targets and contexts creates a risk for command execution outside of the intended scope.\n- [PROMPT_INJECTION] (LOW): User-controlled variables such astargetandcontextare directly interpolated into LLM prompts without sanitization. This allows for prompt injection where malicious input could alter the behavior of the code review or potentially influence the underlying CLI's execution logic.\n- [DATA_EXFILTRATION] (LOW): The skill is designed to process local codebase content. An attacker using prompt injection could potentially leverage the CLI's capabilities to exfiltrate sensitive source code or environmental information, especially if non-restrictive sandbox modes are active.\n- [CREDENTIALS_UNSAFE] (SAFE): Documentation includes placeholders likesk-...andyour-api-key. These are not valid secrets and do not pose a direct credential exposure risk.\n- [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8).\n - Ingestion points: Files identified by the
targetargument are read and processed by the LLM (scripts/codex_review.py).\n - Boundary markers: Absent; code is interpolated directly into prompts.\n
- Capability inventory: The skill can execute system commands and modify files through the
codexCLI (scripts/codex_review.py, references/codex_cli_reference.md).\n - Sanitization: Absent; the content of files is not validated or escaped before inclusion in the prompt.
Audit Metadata