Skip to content

Security: peezy-tech/codex-flows

Security

SECURITY.md

Security

codex-flows provides clients, local workspace backend surfaces, a browser UI, and sidecar automation around Codex app-server. It does not add a general authentication, authorization, persistence, or request-filtering boundary in front of Codex app-server.

Keep app-server and workspace backend WebSocket surfaces bound to localhost or another trusted network boundary unless a deployment adds its own access control. Do not expose Codex app-server or workspace backend control WebSockets directly to the public internet.

Memory transplant is intentionally scoped to durable files under memories/. It must not be used to copy auth files, sessions, logs, sqlite databases, or other Codex home runtime internals.

Thread transplant and repo-committed thread artifacts intentionally handle raw Codex rollout JSONL under sessions/. Treat those files as trusted history: they can contain prompts, model output, tool calls, command output, file paths, and any sensitive text the agent observed. Do not commit or transplant raw rollouts unless that exact thread is safe to preserve.

There aren't any published security advisories