Skip to content

Conversation

bolinfest
Copy link
Collaborator

@bolinfest bolinfest commented Sep 25, 2025

Because the codex process could contain sensitive information in memory, such as API keys, we add logic so that when CODEX_SECURE_MODE=1 is specified, we avail ourselves of whatever the operating system provides to restrict observability/tampering, which includes:

  • disabling ptrace(2), so it is not possible to attach to the process with a debugger, such as gdb
  • disabling core dumps

Admittedly, a user with root privileges can defeat these safeguards.

For now, we only add support for this in the codex multitool, but we may ultimately want to support this in some of the smaller CLIs that are buildable out of our Cargo workspace.

@bolinfest bolinfest merged commit d61dea6 into main Sep 25, 2025
38 checks passed
@bolinfest bolinfest deleted the pr4220 branch September 25, 2025 17:02
@github-actions github-actions bot locked and limited conversation to collaborators Sep 25, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants