codex

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill instructs assembling and previewing shell commands that embed the full user-provided "" (e.g., via -p "" or echo "prompt" | codex ...), so any API keys or secrets in that context would be included verbatim in commands and outputs, creating an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The codex-agent explicitly lists the WebFetch tool as "required for documentation lookup during research mode" (codex-agent.md tools/safety controls), which means the agent can fetch and consume open/public third‑party documentation/web pages and thus read untrusted external content as part of its workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.70). The skill explicitly encourages running the codex CLI with sandbox modes that allow workspace writes and "danger-full-access" (and --full-auto), and mandates bypassing repo checks (--skip-git-repo-check), which enables automatic and broad modifications to the host environment even though it doesn't explicitly request sudo or creation of system accounts.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:14 AM