REPO-ID · openai/codexSOURCE · LIVE EVIDENCETRUST SCORE · 59/100CREATED BY · Christo + Nova
Pre-install repo check

Check the repo before it touches your machine.

Paste a public GitHub repo. Get a trust read on install files, MCP and agent surfaces, maintainer signals, dependency clues, risky paths, and the first thing to inspect before you run anything.

© Christo 2026 — Created by Christo and Nova

Accepted format: https://github.com/owner/repo. Public repos only. No local execution.

01Checking the GitHub URL02Reading the repo as untrusted data03Finding install and agent surfaces04Building the trust dossier

Showing openai/codex. Paste another public repo to switch the dossier.

Should you trust it?openai/codex
Score 59/10041 risk · 26 sure · 25 coverage
Install or hold off?
Be careful

Use a sandbox before it touches anything real

Read this before the repo touches your machine.

Not enough of the repo was visible, so this is not getting a safe label yet.. openai/codex is mostly Rust, with codex-rs/ carrying the visible weight. Start with review the automation before running it before cloning it into a real workspace. Groq also checked the evidence and called it caution at 0% sure, but it did not show enough to override the built-in engine.

What we saw25/100

We checked 6 of 24 files worth caring about.

How sure26/100

1 claims backed by 4 snippets from the repo.

Scan size14,828 bytes

The important files fit inside the scan.

Groq second lookcaution · 0% sure · agent

Proceed with caution: verify the integrity of the release binaries (e.g., checksum), run them in a sandboxed environment, and review the code paths that invoke external tools or network calls. Ensure that any agent runtime is configured with the minimal required permissions. Agent fit: 80/100, The repository contains .codex/skills and .codex/agents directories, along with a codex-cli package and Rust agent code, indicating it is designed for agent tooling.

watch

Executable artifact is present

4 executable release artifacts appeared.​ That deserves review, but release binaries alone are not proof the repo is …

01Clone

Check who owns it. Then check whether the README matches the code.

Owner, maintainer and repo signals show up here first.

02Install

Install scripts are where a lot of bad repos get their first shot.

Setup files decide what gets onto your machine first.

03Build

Executable artifact is present

openai/​codex/​releases — codex-​aarch64-​pc-​windows-​msvc.​exe

04Run

Shell, network and filesystem access are where risk gets real.

Shell or network access is where risk stops being theoretical.

05Persist

Look for anything trying to stick around after setup finishes.

This is where anything sticky or persistent would show up.

watch

Executable artifact is present

4 executable release artifacts appeared. That deserves review, but release binaries alone are not proof the repo is unsafe.

  • openai/​codex/​releases — codex-​aarch64-​pc-​windows-​msvc.​exe
  • openai/​codex/​releases — codex-​app-​server-​aarch64-​pc-​windows-​msvc.​exe
  • openai/​codex/​releases — codex-​app-​server-​x86_​64-​pc-​windows-​msvc.​exe
Commit map

See the big turns, not the commit soup.

The map cuts noisy history down to the moments that changed the repo. Useful when something looks clean now and you want to know how it got there.

Open commit map
Repo verdict

Would you trust this on your machine?

openai/codex is mostly a Rust repo, with the visible weight around codex-rs, .github, root, .codex. The scan found 8 install or runtime files, agent or MCP-looking files, and docs are visible, tests are visible, safety files are labeled. Read this before installing it. Do not treat it as permission to run the repo.

This check uses public GitHub data, repo files and recent commits. It treats the repo like it might be hostile. It never installs, imports or runs the code.

REPOopenai/codex

Checked before you install it or hand it to an agent.

INSTALL FILES8 files

.devcontainer/Dockerfile · .devcontainer/codex-install/package.json · codex-cli/package.json

FILES CHECKED850

Candidate files: 24 · Fetched files: 6 · Scanned bytes: 14828 · 18 high-signal files were not fetched in the bounded scan.

PEOPLE426 shown

Top public contributor: @bolinfest (892 commits).

REPO AGE2025-04-13

Default branch: main · visibility: public.

SOCIAL SIGNAL79K stars

11K forks · 79K watchers · 3,374 open issues.

RELEASESrust-v0.128.0-alpha.1

2026-04-30 · prerelease

TOPICSnone

No repo topics came back in metadata.

LAST PUSH2026-04-30

GitHub size: 416K KB · issues on.

HOW SURE26/100

Coverage 25/100 · risk 41/100 · 1 claims with receipts.

Why it got this call

The scanner has to show its work.

Not enough of the repo was visible, so this is not getting a safe label yet.

Final call59/100

Built-in engine. This is the verdict currently driving the page.

Built-in risk41/100

High risk means the scan found something worth stopping for, not just a weird file name.

Built-in sure26/100

This shows how much the scanner actually got to read. Low score means first pass, not final answer.

Groq second look0/100

caution on agent; agent fit 80/100.

Coverage25/100

This is how much of the install, workflow and script surface made it into the scan.

Install surface69

The bounded scan did not find a clear install surface break.

    Expose the exact install path and keep install hooks minimal.
    Runtime execution surface73

    The bounded scan did not find a clear runtime execution surface break.

      Make execution, downloads, and persistence paths explicit before users run anything.
      Release provenance67

      The bounded scan did not find a clear release provenance break.

        Show how source becomes release artifacts.
        Dependency exposure75

        The bounded scan did not find a clear dependency exposure break.

          Pinned dependencies are easier to trust and reproduce.
          Maintainer continuity65

          The bounded scan did not find a clear maintainer continuity break.

            Trust improves when maintenance is not concentrated in one visible person.
            CI/build permissions67

            The bounded scan did not find a clear ci/build permissions break.

              Keep CI permissions narrow and visible.
              Inspectability / opacity55

              4 executable release artifacts appeared. That deserves review, but release binaries alone are not proof the repo is unsafe.

              • executable-artifact: Executable artifact is present
              Prefer source builds in a sandbox. Trust binaries only with reproducible build instructions, signatures, and strong maintainer provenance.
              Install path

              Where things can go wrong during setup.

              entrypackage.json

              Primary install entry point appears to be package.json.

              Receipts

              If the scanner makes a claim, it has to point at a file.

              executable-artifactinspectability-opacity

              Executable artifact is present

              4 executable release artifacts appeared. That deserves review, but release binaries alone are not proof the repo is unsafe.

              Executable artifacts are higher risk than inspectable script/library source because users cannot quickly verify behavior before running them.
              watch76% sure
              • openai/codex/releasescodex-aarch64-pc-windows-msvc.exe
              • openai/codex/releasescodex-app-server-aarch64-pc-windows-msvc.exe
              • openai/codex/releasescodex-app-server-x86_64-pc-windows-msvc.exe
              • openai/codex/releasescodex-command-runner-aarch64-pc-windows-msvc.exe
              Prefer source builds in a sandbox. Trust binaries only with reproducible build instructions, signatures, and strong maintainer provenance.
              Rulebook

              The scanner rules are here so you can call bullshit if needed.

              install-hook-exec

              Install hook executes code

              package.json scripts.preinstall/install/postinstall/prepare contains executable commands

              Install-time execution runs before most users inspect behavior carefully.
              remote-pipe-exec

              Remote download piped to shell

              curl/wget download is piped directly into bash/sh

              Remote code executes immediately with minimal review opportunity.
              privileged-install

              Install flow requests elevated privileges

              install-related file contains sudo or direct system-profile writes

              Privilege elevation expands blast radius beyond the repo workspace.
              workflow-write-permissions

              Workflow can write back to GitHub

              workflow permissions include write-all or explicit write scopes, or uses pull_request_target

              Write-capable CI can change code, releases, or packages if compromised or misconfigured.
              profile-persistence

              Install flow persists changes outside repo

              script modifies shell profiles, startup files, or system paths

              Persistence survives the first run and changes future machine behavior.
              obfuscated-exec

              Encoded or obfuscated execution path

              base64 decode plus exec/eval/shell pattern appears in install/runtime-sensitive files

              Encoded execution reduces inspectability and hides real behavior.
              explicit-malicious-intent

              Repo text explicitly signals hostile intent

              repo name, description, or README uses terms like malware, stealer, grabber, keylogger, or similar hostile language without a benign research context

              Open hostile-intent language is a direct trust break even before deeper execution-path review.
              credential-harvest-language

              Repo text describes credential or token theft

              repo text couples theft verbs with tokens, credentials, passwords, cookies, wallets, sessions, or similar sensitive targets

              Theft language aimed at sensitive material is a direct hostile-behavior signal.
              malicious-skill-instructions

              Skill or prompt text asks for hostile instruction override or exfiltration

              skill/prompt/instruction text contains override language plus explicit secret theft, exfiltration, or destructive execution cues

              Malicious skill text can redirect an agent or operator into credential theft, prompt hijacking, or destructive local actions even when install paths look clean.
              opaque-artifact

              Opaque artifact dominates visible tree

              large binary blobs or large minified assets appear without enough surrounding source context

              Opaque artifacts reduce a user's ability to verify what will actually run.
              maintainer-concentration

              Maintainer continuity is concentrated

              one contributor dominates visible contribution counts

              High bus-factor concentration increases continuity risk and weakens trust transfer.
              release-provenance-gap

              Release provenance is weak in visible evidence

              public releases exist but no visible workflow/build provenance is found in bounded scan

              Source-to-release continuity is harder to verify when build steps are not publicly visible.
              new-account-immediate-repo

              New account shipped a repo immediately

              owner account and repository were created close together, with a very young repo age

              Fresh account plus immediate repository creation is a high-signal supply-chain suspicion pattern when trust evidence is otherwise thin.
              single-commit-release

              Release exists on a one-commit repo

              public release exists while the bounded commit sample shows a single commit

              A release repo with almost no history gives users little provenance to inspect before downloading artifacts.
              executable-artifact

              Executable artifact is present in source or releases

              repo tree or release assets include executable/binary artifacts while the repo presents as installable code

              Executables are harder to inspect than scripts or source and deserve heavier suspicion before local execution.
              lockfile-missing

              Dependency pinning is not obvious

              manifest exists without an obvious lockfile in the bounded scan

              Unpinned dependency resolution makes installs less reproducible.
              Check this first

              review the automation before running it

              Most developer-machine damage starts with a copied command. The boring files are where that risk usually lives.

              maintainer-level84% sure.codex/skills/babysit-pr/scripts/gh_pr_watch.py.codex/skills/babysit-pr/scripts/test_gh_pr_watch.py.codex/skills/codex-issue-digest/scripts/collect_issue_digest.py.codex/skills/codex-issue-digest/scripts/test_collect_issue_digest.py.devcontainer/Dockerfile.github/ISSUE_TEMPLATE/3-cli.yml
              File risk map

              Where trust pressure gathers.

              Use the map to find dense areas, gateway files, and places where install or agent risk is likely to concentrate.

              Repository file risk mapA node graph connecting high-signal repository areas and files that deserve pre-install review.repoPublic rootcodex-rs724 files.github62 filesroot22 files.codex19 files.devcontainer11 filescodex-cli9 files.vscode3 files
              Evidence locker

              The files worth reading before install.

              01
              README and public promise

              Front door check

              openai/codex says: "Lightweight coding agent that runs in your terminal" Start here, because a repo that asks for trust should explain what it does before asking you to install anything.

              README.md
              02
              Directory weight

              Where the code gathers

              The heaviest areas are codex-rs (724), .github (62), root (22), .codex (19), .devcontainer (11). If something risky hides in plain sight, it usually hides near the areas with the most gravity.

              codex-rs/.github/root files.codex/.devcontainer/codex-cli/
              03
              Manifests, scripts, containers

              Install path

              These files shape what happens before the project runs. Read them before copying an install command, especially when the repo exposes CLIs, containers, workflow files, or scripts.

              .devcontainer/Dockerfile.devcontainer/codex-install/package.jsoncodex-cli/package.jsoncodex-rs/Cargo.tomlcodex-rs/agent-graph-store/Cargo.tomlcodex-rs/agent-identity/Cargo.toml
              04
              Tests and repeatable checks

              Verification signs

              Test or spec paths are visible. That gives you a safer way to inspect behavior before trusting a repo with local execution.

              README.md.devcontainer/Dockerfilecodex-cli/package.jsoncodex-rs/Cargo.toml
              05
              Auth, secrets, policy, MCP

              Permission surface

              Security, auth, policy, secret, sandbox or permission files show up in the tree. Read those before wiring this into an agent or your machine.

              SECURITY.md.github/workflows/blob-size-policy.yml
              06
              Tools, prompts, skills, servers

              Agent and MCP scan

              This repo has agent-shaped paths. Before installing it as an MCP server, skill, plugin, or CLI, inspect what tools it exposes and what environment variables it expects.

              codex-rs/app-server-protocol/schema/json/McpServerElicitationRequestParams.jsoncodex-rs/app-server-protocol/schema/json/McpServerElicitationRequestResponse.jsoncodex-rs/app-server-protocol/schema/json/v2/ListMcpServerStatusParams.jsoncodex-rs/app-server-protocol/schema/json/v2/ListMcpServerStatusResponse.jsoncodex-rs/app-server-protocol/schema/json/v2/McpResourceReadParams.jsoncodex-rs/app-server-protocol/schema/json/v2/McpResourceReadResponse.json
              Repo history

              How the repo earned its current shape.

              01

              Public promise

              What the repo says it does

              openai/codex first earns or loses trust through README, license, docs, and root manifests. Read those before source code.

              README.md.devcontainer/Dockerfilecodex-cli/package.json
              02

              Code weight

              Where the repo got dense

              Directory weight shows where review time should go first. Big areas are not always risky, but they are rarely irrelevant.

              codex-rs/Cargo.tomlLICENSESECURITY.md.devcontainer/codex-install/package.json
              03

              Trust boundary

              Safety surfaces are visible

              Security-sensitive paths are visible. They deserve review before tokens, tools, or local execution enter the picture.

              SECURITY.md.github/workflows/blob-size-policy.yml
              04

              Recent motion

              Where maintainers touched it lately

              Recent commits are clues, not proof of intent. They tell you where the repo is moving right now.

              feat: Add workspace plugin sharing APIs (#20278)ci: increase Windows release workflow timeouts (#20343)Add persisted hook enablement state (#19840)permissions: expose active profile metadata (#20095)
              living core

              codex-rs

              724 visible files; samples: codex-rs/.cargo/audit.toml, codex-rs/.cargo/config.toml

              95
              pressure

              .github

              62 visible files; samples: .github/CODEOWNERS, .github/ISSUE_TEMPLATE/1-codex-app.yml

              47
              pressure

              root

              22 visible files; samples: .bazelignore, .bazelrc

              43
              pressure

              .codex

              19 visible files; samples: .codex/skills/babysit-pr/SKILL.md, .codex/skills/babysit-pr/agents/openai.yaml

              42
              gateway

              Repeatable checks

              Test/spec patterns are visible.

              62
              pressure

              Trust boundary

              Auth/security/policy/secret-like paths were found.

              81
              gateway

              First file to read

              README.md: Explains the front-door contract for humans scanning the repository.

              70
              Recent movement

              Recent commits tell you where to look next.

              1. 2026-04-30

                feat: Add workspace plugin sharing APIs (#20278)

                Recent public commit signal from openai/codex. Commit messages are used as strata labels, not as proof of architectural intent.

                Use this layer as a starting clue, then inspect the linked files and pull requests before making conclusions.
                README.md.devcontainer/Dockerfilecodex-cli/package.json
              2. 2026-04-30

                ci: increase Windows release workflow timeouts (#20343)

                Recent public commit signal from openai/codex. Commit messages are used as strata labels, not as proof of architectural intent.

                Use this layer as a starting clue, then inspect the linked files and pull requests before making conclusions.
                .devcontainer/Dockerfilecodex-cli/package.jsoncodex-rs/Cargo.toml
              3. 2026-04-30

                Add persisted hook enablement state (#19840)

                Recent public commit signal from openai/codex. Commit messages are used as strata labels, not as proof of architectural intent.

                Use this layer as a starting clue, then inspect the linked files and pull requests before making conclusions.
                codex-cli/package.jsoncodex-rs/Cargo.tomlLICENSE
              4. 2026-04-30

                permissions: expose active profile metadata (#20095)

                Recent public commit signal from openai/codex. Commit messages are used as strata labels, not as proof of architectural intent.

                Use this layer as a starting clue, then inspect the linked files and pull requests before making conclusions.
                codex-rs/Cargo.tomlLICENSESECURITY.md
              5. 2026-04-30

                [plugins] Allow MSFT curated plugins in tool_suggest (#20304)

                Recent public commit signal from openai/codex. Commit messages are used as strata labels, not as proof of architectural intent.

                Use this layer as a starting clue, then inspect the linked files and pull requests before making conclusions.
                LICENSESECURITY.md.devcontainer/codex-install/package.json
              Risk surface

              Reasons to slow down before running it.

              WATCH

              Executable artifact is present

              openai/codex/releases — codex-aarch64-pc-windows-msvc.exe

              Prefer source builds in a sandbox. Trust binaries only with reproducible build instructions, signatures, and strong maintainer provenance.
              WATCH

              Evidence coverage is incomplete

              6 of 24 high-signal files were fetched in the bounded scan.

              Treat this report as a first pass and review the missing install, workflow, or script files before trusting the repo.
              People behind the repo

              Maintainers leave fingerprints too.

              Code trust is not only files. A repo with visible, active people feels different from a dump with no one home.

              Star trust

              Don't trust the stars at face value.

              A star count is easy to quote and easy to overread. The better question is whether the repo shows signs of real use once you look past the headline number.

              Forks point to adoption. Watchers point to commitment. Issues point to real user pressure. When those stay too low, the star number loses weight fast.

              Fork to star ratio

              Healthy projects often sit between 10% and 25%. A huge star count with tiny fork volume is a bad smell.

              Watcher commitment

              Organic projects usually keep more watchers than manipulated ones. Near-zero watchers means low conviction.

              Issue pressure

              Real users complain, ask questions, and break things. Bots don't. This is a rough usage signal, not proof.

              Read behind the starsLoading live GitHub data

              Pulling the live GitHub counts for this repo now.

              VirusTotal reputation

              Run a VirusTotal check for peace of mind.

              Fire a live check when you want one more layer before you download or run anything from the repo.

              Optional check

              Run the scan when you want the extra signal.

              Press the button to check this repo's public hosts and release links against VirusTotal.

              Before you run it

              If you only have thirty minutes, check these first.

              01

              Read the promise

              Start with the README and docs. Does the repo plainly say what it will do on your machine?

              README.md
              02

              Check the install path

              Open the files a package manager, shell or container runtime touches first.

              .devcontainer/Dockerfile.devcontainer/codex-install/package.jsoncodex-cli/package.jsoncodex-rs/Cargo.tomlcodex-rs/agent-graph-store/Cargo.tomlcodex-rs/agent-identity/Cargo.tomlcodex-rs/analytics/Cargo.tomlcodex-rs/ansi-escape/Cargo.toml
              03

              Check agent permissions

              Trace MCP, tool, prompt, permission, sandbox and execution paths before connecting this repo to an assistant.

              codex-rs/app-server-protocol/schema/json/McpServerElicitationRequestParams.jsoncodex-rs/app-server-protocol/schema/json/McpServerElicitationRequestResponse.jsoncodex-rs/app-server-protocol/schema/json/v2/ListMcpServerStatusParams.jsoncodex-rs/app-server-protocol/schema/json/v2/ListMcpServerStatusResponse.jsoncodex-rs/app-server-protocol/schema/json/v2/McpResourceReadParams.jsoncodex-rs/app-server-protocol/schema/json/v2/McpResourceReadResponse.json
              04

              Pick the first safe move

              Run or read the smallest existing check before trusting local execution.

              codex-rs/.cargo/audit.tomlcodex-rs/.cargo/config.tomlcodex-rs/.config/nextest.tomlcodex-rs/.github/workflows/cargo-audit.yml
              If you don't have time

              Let your agent do the boring first pass.

              Paste the repo link, copy the review prompt and let your agent skim it. Then come back here for the files worth checking with your own eyes.

              Open the agent audit page