oracle-codex
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it incorporates untrusted user input into a prompt for the Codex AI model.
- Ingestion Point: The
queryargument from$ARGUMENTSis directly used to construct the prompt inSKILL.md. - Boundary Markers: The skill does not use delimiters or specific instructions to isolate user input from system prompts.
- Capability Inventory: The
run-codex-exec.shscript executes thecodex execcommand, which can perform complex analysis based on its input. - Sanitization: There is no evidence of input validation or escaping for the user-provided query.
- [EXTERNAL_DOWNLOADS]: The
scripts/check-codex.shscript references external installation sources for the Codex CLI. - Evidence: The script suggests installing
@openai/codexvia npm or theopenai/tap/codexHomebrew tap. - Source: These references point to OpenAI, which is a recognized and trusted organization. The documentation is provided neutrally as setup instructions.
- [COMMAND_EXECUTION]: The skill executes local shell scripts and a binary CLI tool.
- Evidence: It runs
scripts/check-codex.shandscripts/run-codex-exec.sh, which in turn executes thecodexbinary. - Security: The skill uses a HEREDOC and temporary files to pass input to the binary, which is a safe practice that avoids shell command injection vulnerabilities.
Audit Metadata