Skip to content

feat: add support for CODEX_SECURE_MODE=1 to restrict process observability#4220

Merged
bolinfest merged 1 commit intomainfrom
pr4220
Sep 25, 2025
Merged

feat: add support for CODEX_SECURE_MODE=1 to restrict process observability#4220
bolinfest merged 1 commit intomainfrom
pr4220

Conversation

@bolinfest
Copy link
Copy Markdown
Collaborator

@bolinfest bolinfest commented Sep 25, 2025

Because the codex process could contain sensitive information in memory, such as API keys, we add logic so that when CODEX_SECURE_MODE=1 is specified, we avail ourselves of whatever the operating system provides to restrict observability/tampering, which includes:

  • disabling ptrace(2), so it is not possible to attach to the process with a debugger, such as gdb
  • disabling core dumps

Admittedly, a user with root privileges can defeat these safeguards.

For now, we only add support for this in the codex multitool, but we may ultimately want to support this in some of the smaller CLIs that are buildable out of our Cargo workspace.

@bolinfest bolinfest merged commit d61dea6 into main Sep 25, 2025
38 checks passed
@bolinfest bolinfest deleted the pr4220 branch September 25, 2025 17:02
@github-actions github-actions Bot locked and limited conversation to collaborators Sep 25, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants