Armed Tactical Trusted Access for Cyber Kit (ATTACK)
A Codex plugin to maximize the cyber capabilities of Codex, intended for verified members of the Trusted Access for Cyber (TAC) program. This plugin provides more aggressive cyber skills than the official Codex Security plugin, which is intentionally safe for non-TAC users. Verified members of TAC are granted access to more lax models with less cyber guardrails. Only use this plugin with TAC-verified accounts. Only use the features of this plugin on authorized targets.
This plugin is NOT developed by OpenAI and is NOT associated with the official Codex Security plugin.
engagement-scope: Establish authorization, bounty/program scope, impact tolerance, and the right next skill.code-vulnerability-review: Trace code, diffs, configs, and data flows for reachable security bugs and fix paths.web-app-security-inspection: Inspect browser-visible behavior, HTTP/API flows, sessions, authz, storage, and safe live validation.cve-research: Research CVEs/advisories, affected versions, KEV/EPSS signals, exploitability, and prioritization.binary-debugging: Debug crashes, cores, sanitizer findings, process state, registers, traces, and exploitability evidence.binary-reversing: Recover security-relevant behavior from binaries, firmware, formats, imports, strings, and decompilation.fuzz-harness-builder: Build and triage fuzz harnesses only when the target justifies long-running fuzzing value.finding-tracker: Maintain centralized finding state, duplicate checks, milestones, related IDs, and proof references.triage-verifier: Reproduce, prove, or de-escalate confident findings before anything becomesproofed.triage-theater: Convert proofed verifier PoCs into step-based, screen-recordable human reproduction kits.exploit-chain-analysis: Combine findings and de-escalated leads into higher-impact, trackable, verifiable exploit chains.report-writer: Turn proofed findings, evidence, attachments, and Mermaid diagrams into submission-ready reports.
- Clone this repository
- Copy its content into ~/.codex/plugins/cache/codex-local/codex-attack
- Restart Codex
- Start a new thread and ask Codex to use the codex-attack plugin
- Done. The plugin will be enabled across sessions
Edit your ~/.codex/config.toml with:
[plugins."codex-attack"]
enabled = false
MIT