collaborating-with-codex
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile provides instructions to add an MCP server from an unverified GitHub repository (github.com/GuDaStudio/codexmcp.git) usinguvx. This source does not belong to the trusted organizations list. \n- [COMMAND_EXECUTION]: The bridge scriptscripts/codex_bridge.pyusessubprocess.Popento execute the externalcodexcommand. It exposes dangerous flags like--yoloand--sandbox danger-full-accessto the agent, which can result in the execution of model-generated commands without user approval or sandbox restrictions. \n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it takes arbitrary task instructions in thePROMPTparameter and processes them through an execution engine. \n - Ingestion points: The
PROMPTparameter in themcp__codex__codextool. \n - Boundary markers: None identified; prompts are passed directly to the tool via stdin without delimiters. \n
- Capability inventory: The skill has the capability to run system commands via the
subprocessmodule inscripts/codex_bridge.py. \n - Sanitization: No input validation or filtering is performed on the prompt string.
Audit Metadata