We checked 20 of 24 files worth caring about.
Check the repo before it touches your machine.
Paste a public GitHub repo. Get a trust read on install files, MCP and agent surfaces, maintainer signals, dependency clues, risky paths, and the first thing to inspect before you run anything.
© Christo 2026 — Created by Christo and Nova
Looks clean from this scan.
openai/codex is more than a CLI repo. It is a local agent with real execution power, so the important question is simple: are sandboxing, permissions and policy easy to follow as the repo grows?
Safe to inspect. Do not blindly run it. Check sandboxing, execution policy, MCP and install files before giving it real credentials or local tools. Agent fit: 0/100.
The execution boundary is the strategic center of the repo.
Any new capability crossing this line can change how safe the agent feels to run.
The terminal interface is product infrastructure, not decoration.
A contributor who changes UI behavior without reading design records risks breaking the agent's operator model.
CLI, SDK, MCP, and app-server surfaces can drift if protocol changes are not traced.
One protocol adjustment can ripple across developer tools and host integrations.
The terminal interface is product infrastructure, not decoration.
codex-rs/tui
Install scripts are where a lot of bad repos get their first shot.
Setup files decide what gets onto your machine first.
Workflows and build hooks show what access the repo is asking for.
Build files show what access the repo asks for quietly.
CLI, SDK, MCP, and app-server surfaces can drift if protocol changes are not traced.
codex-rs/protocol
Look for anything trying to stick around after setup finishes.
This is where anything sticky or persistent would show up.
The execution boundary is the strategic center of the repo.
Any new capability crossing this line can change how safe the agent feels to run.
- codex-rs/exec
- codex-rs/execpolicy
- codex-rs/sandboxing
The terminal interface is product infrastructure, not decoration.
A contributor who changes UI behavior without reading design records risks breaking the agent's operator model.
- codex-rs/tui
- docs/tui-chat-composer.md
- docs/tui-stream-chunking-review.md
CLI, SDK, MCP, and app-server surfaces can drift if protocol changes are not traced.
One protocol adjustment can ripple across developer tools and host integrations.
- codex-rs/protocol
- sdk/typescript
- sdk/python
See the big turns, not the commit soup.
The map cuts noisy history down to the moments that changed the repo. Useful when something looks clean now and you want to know how it got there.
Would you trust this on your machine?
Codex is organized like a machine with a Rust engine room, a thin npm launch corridor, SDK wings, policy vaults, and documentation placards that teach humans and agents how to operate safely.
Sample dossier built from public README and repo tree signals. It is a quick read, not a substitute for checking the repo yourself.
Public GitHub repository kept as a sample dossier reference path.
Root tree exposes codex-rs, codex-cli, SDK folders, Bazel files, and docs.
Declared in the public README and LICENSE file.
Root package metadata declares a modern Node requirement for repo tooling.
The scanner has to show its work.
Looks safe to inspect
Built-in engine. This is the verdict currently driving the page.
High risk means the scan found something worth stopping for, not just a weird file name.
This shows how much the scanner actually got to read. Low score means first pass, not final answer.
safe on unknown; agent fit 0/100.
This is how much of the install, workflow and script surface made it into the scan.
The big pieces are named clearly and split apart well.
- codex-rs dominates the engine room
- codex-cli is a thin launch corridor
- sdk/ and docs/ expose integration and operator context
Tests exist, but policy changes still need a careful read.
- Dedicated test-support chambers exist
- Protocol and TUI design docs preserve behavior expectations
Safety is easy to find in the repo.
- sandboxing, execpolicy, shell-escalation, secrets, and process-hardening are separate chambers
- SECURITY.md defines disclosure flow
New contributors get a few good starting points.
- README.md, docs/install.md, docs/config.md
- TUI decision records explain interface intent
The hard part is adding capability without making trust fuzzy.
- MCP, SDK, app-server, and model-provider chambers spread the agent across hosts
- Sandbox and policy chambers define the blast-radius hinge
Where trust pressure gathers.
Use the map to find dense areas, gateway files, and places where install or agent risk is likely to concentrate.
The files worth reading before install.
Origin Foyer
The public entrance explains Codex CLI as a coding agent that runs locally, then routes different users toward npm, Homebrew, IDE integration, desktop app flow, or Codex Web.
Rust Engine Room
The largest chamber is a Rust workspace. Its subcrates separate core agent behavior, protocol models, terminal interface, sandboxing, execution policy, MCP support, login, model providers, and platform-specific hardening.
Terminal Theater
The product is experienced as a terminal-first agent. The TUI, CLI wrapper, and composer documentation show a repo that treats interaction design as engineering infrastructure, not decoration.
Safety Vault
Execution is the risky heart of any coding agent. Codex exposes dedicated chambers for sandboxing, execution policy, process hardening, shell escalation, secrets, and security reporting.
Integration Wing
The repository is not only a CLI. It carries SDK surfaces, MCP support, model-provider layers, backend clients, and app-server protocols that suggest several host environments need to share a common agent spine.
Contributor Route
The docs are operational signage: contributing, install flow, config, sandboxing, skills, slash commands, and TUI design records give newcomers a guided route through a dense machine.
How the repo earned its current shape.
Founding Layer
A local coding agent enters through the CLIThe public identity is intentionally simple: install a local agent and start from the terminal.
README.mdcodex-cli/package.jsondocs/install.mdEngine Layer
Rust crates become the machine roomThe codebase avoids a single monolith by splitting core behavior, messages, providers, and host boundaries into named chambers.
codex-rs/Cargo.tomlcodex-rs/corecodex-rs/protocolHardening Layer
Trust becomes architectureThe repo acknowledges that agent capability and security are the same conversation.
codex-rs/sandboxingcodex-rs/execpolicycodex-rs/secretsCurrent Frontier
The agent spreads across tools and hostsThe future pressure is multi-surface consistency: every host needs the same trust story.
codex-rs/mcp-serversdk/typescriptsdk/pythoncodex-rs/app-server-protocolAgent spine
codex-rs/core and codex-rs/protocol define the central operating language.
94Trust boundary
execpolicy, sandboxing, shell-escalation, secrets, and process-hardening cluster around user trust.
97Terminal theater
TUI implementation plus design docs make terminal behavior a contributor gateway.
81Integration frontier
MCP, SDKs, app-server, and provider crates suggest widening host surfaces.
86Decision fossils
TUI and config docs preserve why interface and operation decisions exist.
72Recent commits tell you where to look next.
- Entry layer
Public threshold
README, install instructions, license, and docs create the public museum entrance.
A newcomer can understand what Codex CLI is before reading implementation code.README.mdLICENSEdocs/install.md - Engine layer
Rust consolidation
The codex-rs workspace concentrates the operational logic in many focused crates.
The repo can evolve agent behavior, UI, policies, and integrations without one monolithic crate swallowing everything.codex-rs/Cargo.tomlcodex-rs/corecodex-rs/protocol - Safety layer
Local execution guarded by policy
Execution, sandboxing, secrets, and process hardening have dedicated chambers.
The architecture acknowledges that coding agents are powerful because they can act, and dangerous for the same reason.codex-rs/execcodex-rs/execpolicycodex-rs/sandboxing - Experience layer
Interface becomes infrastructure
TUI design documents sit beside implementation, preserving decisions about stream chunking, composers, and alternate screens.
The terminal is treated as a product surface with design history, not only stdout plumbing.codex-rs/tuidocs/tui-chat-composer.mddocs/tui-stream-chunking-review.md - Bridge layer
Integration spread
SDKs, MCP, backend clients, and app-server protocol crates indicate a system meant to travel across hosts.
The project becomes a shared agent platform rather than a single binary surface.sdk/typescriptsdk/pythoncodex-rs/mcp-server
Reasons to slow down before running it.
Dense workspace, high newcomer load
codex-rs contains many focused crates spanning core, protocol, TUI, providers, MCP, execution, sandboxing, and platform-specific hardening.
Start from README, docs/install.md, docs/config.md, then trace codex-rs/cli -> codex-rs/core -> codex-rs/protocol before touching policy code.Execution policy is the blast-radius hinge
Dedicated exec, execpolicy, sandboxing, shell escalation, secrets, and process-hardening chambers imply a sensitive boundary.
Treat policy changes as high risk. Require tests that prove denied operations remain denied and secrets never cross display/log boundaries.CLI, TUI, SDKs, MCP, and app-server surfaces can drift
The repository exposes multiple integration wings that likely share protocol assumptions.
When changing protocol models, inspect direct consumers across TUI, SDK, MCP, backend client, and app-server protocol crates.Lockfiles and generated surfaces dominate visual mass
Root tree includes large Bazel and package lock artifacts that are necessary but noisy for first-time readers.
Hide generated or lockfile-heavy paths during first-pass onboarding, but keep them visible in build/release investigations.Maintainers leave fingerprints too.
Code trust is not only files. A repo with visible, active people feels different from a dump with no one home.
Don't trust the stars at face value.
A star count is easy to quote and easy to overread. The better question is whether the repo shows signs of real use once you look past the headline number.
Forks point to adoption. Watchers point to commitment. Issues point to real user pressure. When those stay too low, the star number loses weight fast.
Healthy projects often sit between 10% and 25%. A huge star count with tiny fork volume is a bad smell.
Organic projects usually keep more watchers than manipulated ones. Near-zero watchers means low conviction.
Real users complain, ask questions, and break things. Bots don't. This is a rough usage signal, not proof.
Pulling the live GitHub counts for this repo now.
Run a VirusTotal check for peace of mind.
Fire a live check when you want one more layer before you download or run anything from the repo.
Run the scan when you want the extra signal.
Press the button to check this repo's public hosts and release links against VirusTotal.
If you only have thirty minutes, check these first.
Read the front door first
Open README.md, docs/install.md, and docs/config.md to understand the user-facing contract before tracing implementation.
README.mddocs/install.mddocs/config.mdTrace the command spine
Follow the path from the npm wrapper into codex-rs/cli, then into codex-rs/core and codex-rs/protocol.
codex-cli/package.jsoncodex-rs/clicodex-rs/corecodex-rs/protocolTreat policy as protected glass
Before editing execution behavior, inspect sandboxing, execpolicy, process-hardening, shell-escalation, secrets, and SECURITY.md together.
codex-rs/sandboxingcodex-rs/execpolicycodex-rs/process-hardeningSECURITY.mdUse docs as decision fossils
Read the TUI design records before changing terminal behavior; they explain why the interface behaves the way it does.
docs/tui-chat-composer.mddocs/tui-stream-chunking-review.mddocs/tui-alternate-screen.mdLet your agent do the boring first pass.
Paste the repo link, copy the review prompt and let your agent skim it. Then come back here for the files worth checking with your own eyes.