Skip to content

Conversation

@zhao-oai
Copy link
Collaborator

@zhao-oai zhao-oai commented Nov 5, 2025

No description provided.

Copy link
Contributor

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +123 to +126
sandbox: SandboxType::None,
with_escalated_permissions: None,
justification: None,
arg0: None,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Honor sandbox policy for bang commands

The new UserShellCommandTask now constructs its own ExecEnv with sandbox: SandboxType::None and then passes SandboxPolicy::DangerFullAccess into execute_exec_env. That means every !… command runs unsandboxed with full filesystem/network access regardless of the user’s configured sandbox_mode or approval policy. Before this change the same commands were routed through ToolOrchestrator::run (see tools/handlers/shell.rs), which derives the sandbox from turn_context.sandbox_policy and enforces the configured approval flow, so read-only/workspace-write sandboxes and prompts worked as expected. With the new hard‑coded values a session configured as read‑only can now be mutated simply by running !rm, which breaks the documented safety guarantees. Please plumb the session’s sandbox policy/approval handling into this path instead of forcing DangerFullAccess.

Useful? React with 👍 / 👎.

@Nek-12
Copy link

Nek-12 commented Nov 5, 2025

No. Do not dump.

@etraut-openai etraut-openai added the oai-pr PRs posted by Codex team members label Nov 5, 2025
@zhao-oai zhao-oai closed this Nov 13, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

oai-pr PRs posted by Codex team members

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants