REPO-ID · openai/codexSOURCE · SAMPLE DOSSIERTRUST SCORE · 87/100CREATED BY · Christo + Nova
Pre-install repo check

Check the repo before it touches your machine.

Paste a public GitHub repo. Get a trust read on install files, MCP and agent surfaces, maintainer signals, dependency clues, risky paths, and the first thing to inspect before you run anything.

© Christo 2026 — Created by Christo and Nova

Accepted format: https://github.com/owner/repo. Public repos only. No local execution.

01Checking the GitHub URL02Reading the repo as untrusted data03Finding install and agent surfaces04Building the trust dossier

Showing openai/codex. Paste another public repo to switch the dossier.

Should you trust it?openai/codex
Score 87/10021 risk · 89 sure · 84 coverage
Install or hold off?
Looks safe

Safe to inspect normally

Looks clean from this scan.

openai/codex is more than a CLI repo. It is a local agent with real execution power, so the important question is simple: are sandboxing, permissions and policy easy to follow as the repo grows?

What we saw84/100

We checked 20 of 24 files worth caring about.

How sure89/100

0 claims backed by 0 snippets from the repo.

Scan size242,000 bytes

The important files fit inside the scan.

Groq second looksafe · 86% sure · unknown

Safe to inspect. Do not blindly run it. Check sandboxing, execution policy, MCP and install files before giving it real credentials or local tools. Agent fit: 0/100.

critical

The execution boundary is the strategic center of the repo.

Any new capability crossing this line can change how safe the agent feels to run.​

signal

The terminal interface is product infrastructure, not decoration.

A contributor who changes UI behavior without reading design records risks breaking the agent's operator model.​

watch

CLI, SDK, MCP, and app-server surfaces can drift if protocol changes are not traced.

One protocol adjustment can ripple across developer tools and host integrations.​

01Clone

The terminal interface is product infrastructure, not decoration.

codex-​rs/​tui

02Install

Install scripts are where a lot of bad repos get their first shot.

Setup files decide what gets onto your machine first.

03Build

Workflows and build hooks show what access the repo is asking for.

Build files show what access the repo asks for quietly.

04Run

CLI, SDK, MCP, and app-server surfaces can drift if protocol changes are not traced.

codex-​rs/​protocol

05Persist

Look for anything trying to stick around after setup finishes.

This is where anything sticky or persistent would show up.

critical

The execution boundary is the strategic center of the repo.

Any new capability crossing this line can change how safe the agent feels to run.

  • codex-​rs/​exec
  • codex-​rs/​execpolicy
  • codex-​rs/​sandboxing
signal

The terminal interface is product infrastructure, not decoration.

A contributor who changes UI behavior without reading design records risks breaking the agent's operator model.

  • codex-​rs/​tui
  • docs/​tui-​chat-​composer.​md
  • docs/​tui-​stream-​chunking-​review.​md
watch

CLI, SDK, MCP, and app-server surfaces can drift if protocol changes are not traced.

One protocol adjustment can ripple across developer tools and host integrations.

  • codex-​rs/​protocol
  • sdk/​typescript
  • sdk/​python
Commit map

See the big turns, not the commit soup.

The map cuts noisy history down to the moments that changed the repo. Useful when something looks clean now and you want to know how it got there.

Open commit map
Repo verdict

Would you trust this on your machine?

Codex is organized like a machine with a Rust engine room, a thin npm launch corridor, SDK wings, policy vaults, and documentation placards that teach humans and agents how to operate safely.

Sample dossier built from public README and repo tree signals. It is a quick read, not a substitute for checking the repo yourself.

REPO-IDopenai/codex

Public GitHub repository kept as a sample dossier reference path.

PRIMARY SIGNALRust core + CLI package

Root tree exposes codex-rs, codex-cli, SDK folders, Bazel files, and docs.

LICENSEApache-2.0

Declared in the public README and LICENSE file.

RUNTIME FLOORNode >= 22

Root package metadata declares a modern Node requirement for repo tooling.

Why it got this call

The scanner has to show its work.

Looks safe to inspect

Final call87/100

Built-in engine. This is the verdict currently driving the page.

Built-in risk21/100

High risk means the scan found something worth stopping for, not just a weird file name.

Built-in sure89/100

This shows how much the scanner actually got to read. Low score means first pass, not final answer.

Groq second look86/100

safe on unknown; agent fit 0/100.

Coverage84/100

This is how much of the install, workflow and script surface made it into the scan.

Architecture Clarity88

The big pieces are named clearly and split apart well.

  • codex-rs dominates the engine room
  • codex-cli is a thin launch corridor
  • sdk/ and docs/ expose integration and operator context
Test Confidence78

Tests exist, but policy changes still need a careful read.

  • Dedicated test-support chambers exist
  • Protocol and TUI design docs preserve behavior expectations
Security Hygiene92

Safety is easy to find in the repo.

  • sandboxing, execpolicy, shell-escalation, secrets, and process-hardening are separate chambers
  • SECURITY.md defines disclosure flow
Maintainer Friendliness86

New contributors get a few good starting points.

  • README.md, docs/install.md, docs/config.md
  • TUI decision records explain interface intent
Future Pressure91

The hard part is adding capability without making trust fuzzy.

  • MCP, SDK, app-server, and model-provider chambers spread the agent across hosts
  • Sandbox and policy chambers define the blast-radius hinge
Check this first

Prove the sandbox and permission boundary before expanding capability

The real question is whether the agent can act without turning into a trust problem.

maintainer-level91% surecodex-rs/execpolicycodex-rs/sandboxingcodex-rs/process-hardeningcodex-rs/shell-escalationSECURITY.md
File risk map

Where trust pressure gathers.

Use the map to find dense areas, gateway files, and places where install or agent risk is likely to concentrate.

Repository file risk mapA node graph connecting high-signal repository areas and files that deserve pre-install review.READMEPublic entrycodex-clinpm wrappercliCommand gatecoreAgent spineprotocolMessage shapestuiTerminal theatersandboxingExecution boundarymcp-serverTool bridgesdkLanguage clientsdocsOperator signage
Evidence locker

The files worth reading before install.

01
README / release surface

Origin Foyer

The public entrance explains Codex CLI as a coding agent that runs locally, then routes different users toward npm, Homebrew, IDE integration, desktop app flow, or Codex Web.

README.mdpackage.json
02
codex-rs

Rust Engine Room

The largest chamber is a Rust workspace. Its subcrates separate core agent behavior, protocol models, terminal interface, sandboxing, execution policy, MCP support, login, model providers, and platform-specific hardening.

codex-rs/Cargo.tomlcodex-rs/corecodex-rs/protocol
03
TUI and command surface

Terminal Theater

The product is experienced as a terminal-first agent. The TUI, CLI wrapper, and composer documentation show a repo that treats interaction design as engineering infrastructure, not decoration.

codex-rs/clicodex-cli/package.jsondocs/tui-chat-composer.md
04
sandbox and policy

Safety Vault

Execution is the risky heart of any coding agent. Codex exposes dedicated chambers for sandboxing, execution policy, process hardening, shell escalation, secrets, and security reporting.

codex-rs/sandboxingcodex-rs/execpolicySECURITY.md
05
SDKs, MCP, and providers

Integration Wing

The repository is not only a CLI. It carries SDK surfaces, MCP support, model-provider layers, backend clients, and app-server protocols that suggest several host environments need to share a common agent spine.

codex-rs/mcp-serversdk/typescriptsdk/python
06
docs and rituals

Contributor Route

The docs are operational signage: contributing, install flow, config, sandboxing, skills, slash commands, and TUI design records give newcomers a guided route through a dense machine.

docs/contributing.mdAGENTS.md
Repo history

How the repo earned its current shape.

01

Founding Layer

A local coding agent enters through the CLI

The public identity is intentionally simple: install a local agent and start from the terminal.

README.mdcodex-cli/package.jsondocs/install.md
02

Engine Layer

Rust crates become the machine room

The codebase avoids a single monolith by splitting core behavior, messages, providers, and host boundaries into named chambers.

codex-rs/Cargo.tomlcodex-rs/corecodex-rs/protocol
03

Hardening Layer

Trust becomes architecture

The repo acknowledges that agent capability and security are the same conversation.

codex-rs/sandboxingcodex-rs/execpolicycodex-rs/secrets
04

Current Frontier

The agent spreads across tools and hosts

The future pressure is multi-surface consistency: every host needs the same trust story.

codex-rs/mcp-serversdk/typescriptsdk/pythoncodex-rs/app-server-protocol
living core

Agent spine

codex-rs/core and codex-rs/protocol define the central operating language.

94
pressure

Trust boundary

execpolicy, sandboxing, shell-escalation, secrets, and process-hardening cluster around user trust.

97
gateway

Terminal theater

TUI implementation plus design docs make terminal behavior a contributor gateway.

81
pressure

Integration frontier

MCP, SDKs, app-server, and provider crates suggest widening host surfaces.

86
fossil

Decision fossils

TUI and config docs preserve why interface and operation decisions exist.

72
Recent movement

Recent commits tell you where to look next.

  1. Entry layer

    Public threshold

    README, install instructions, license, and docs create the public museum entrance.

    A newcomer can understand what Codex CLI is before reading implementation code.
    README.mdLICENSEdocs/install.md
  2. Engine layer

    Rust consolidation

    The codex-rs workspace concentrates the operational logic in many focused crates.

    The repo can evolve agent behavior, UI, policies, and integrations without one monolithic crate swallowing everything.
    codex-rs/Cargo.tomlcodex-rs/corecodex-rs/protocol
  3. Safety layer

    Local execution guarded by policy

    Execution, sandboxing, secrets, and process hardening have dedicated chambers.

    The architecture acknowledges that coding agents are powerful because they can act, and dangerous for the same reason.
    codex-rs/execcodex-rs/execpolicycodex-rs/sandboxing
  4. Experience layer

    Interface becomes infrastructure

    TUI design documents sit beside implementation, preserving decisions about stream chunking, composers, and alternate screens.

    The terminal is treated as a product surface with design history, not only stdout plumbing.
    codex-rs/tuidocs/tui-chat-composer.mddocs/tui-stream-chunking-review.md
  5. Bridge layer

    Integration spread

    SDKs, MCP, backend clients, and app-server protocol crates indicate a system meant to travel across hosts.

    The project becomes a shared agent platform rather than a single binary surface.
    sdk/typescriptsdk/pythoncodex-rs/mcp-server
Risk surface

Reasons to slow down before running it.

WATCH

Dense workspace, high newcomer load

codex-rs contains many focused crates spanning core, protocol, TUI, providers, MCP, execution, sandboxing, and platform-specific hardening.

Start from README, docs/install.md, docs/config.md, then trace codex-rs/cli -> codex-rs/core -> codex-rs/protocol before touching policy code.
HIGH

Execution policy is the blast-radius hinge

Dedicated exec, execpolicy, sandboxing, shell escalation, secrets, and process-hardening chambers imply a sensitive boundary.

Treat policy changes as high risk. Require tests that prove denied operations remain denied and secrets never cross display/log boundaries.
WATCH

CLI, TUI, SDKs, MCP, and app-server surfaces can drift

The repository exposes multiple integration wings that likely share protocol assumptions.

When changing protocol models, inspect direct consumers across TUI, SDK, MCP, backend client, and app-server protocol crates.
INFO

Lockfiles and generated surfaces dominate visual mass

Root tree includes large Bazel and package lock artifacts that are necessary but noisy for first-time readers.

Hide generated or lockfile-heavy paths during first-pass onboarding, but keep them visible in build/release investigations.
People behind the repo

Maintainers leave fingerprints too.

Code trust is not only files. A repo with visible, active people feels different from a dump with no one home.

Star trust

Don't trust the stars at face value.

A star count is easy to quote and easy to overread. The better question is whether the repo shows signs of real use once you look past the headline number.

Forks point to adoption. Watchers point to commitment. Issues point to real user pressure. When those stay too low, the star number loses weight fast.

Fork to star ratio

Healthy projects often sit between 10% and 25%. A huge star count with tiny fork volume is a bad smell.

Watcher commitment

Organic projects usually keep more watchers than manipulated ones. Near-zero watchers means low conviction.

Issue pressure

Real users complain, ask questions, and break things. Bots don't. This is a rough usage signal, not proof.

Read behind the starsLoading live GitHub data

Pulling the live GitHub counts for this repo now.

VirusTotal reputation

Run a VirusTotal check for peace of mind.

Fire a live check when you want one more layer before you download or run anything from the repo.

Optional check

Run the scan when you want the extra signal.

Press the button to check this repo's public hosts and release links against VirusTotal.

Before you run it

If you only have thirty minutes, check these first.

01

Read the front door first

Open README.md, docs/install.md, and docs/config.md to understand the user-facing contract before tracing implementation.

README.mddocs/install.mddocs/config.md
02

Trace the command spine

Follow the path from the npm wrapper into codex-rs/cli, then into codex-rs/core and codex-rs/protocol.

codex-cli/package.jsoncodex-rs/clicodex-rs/corecodex-rs/protocol
03

Treat policy as protected glass

Before editing execution behavior, inspect sandboxing, execpolicy, process-hardening, shell-escalation, secrets, and SECURITY.md together.

codex-rs/sandboxingcodex-rs/execpolicycodex-rs/process-hardeningSECURITY.md
04

Use docs as decision fossils

Read the TUI design records before changing terminal behavior; they explain why the interface behaves the way it does.

docs/tui-chat-composer.mddocs/tui-stream-chunking-review.mddocs/tui-alternate-screen.md
If you don't have time

Let your agent do the boring first pass.

Paste the repo link, copy the review prompt and let your agent skim it. Then come back here for the files worth checking with your own eyes.

Open the agent audit page