Note: CodexRoxas is a community fork of
openai/codexand is not affiliated with or endorsed by OpenAI. Security issues specific to this fork should be reported via the process below. Vulnerabilities in the upstream project should be reported to OpenAI directly.
Thank you for helping keep CodexRoxas secure!
If you discover a security vulnerability specific to this fork (CodexRoxas / Mecasimetra), please report it responsibly:
- Open a private GitHub Security Advisory via the Security tab on this repository. This keeps the report confidential until a fix is in place.
- Alternatively, contact the maintainer directly via
GitHub Issues — prefix your
issue title with
[SECURITY]for triage priority.
- A clear description of the vulnerability and potential impact
- Steps to reproduce or a minimal proof-of-concept
- Affected versions or components (CLI, TUI, app-server, website, etc.)
- Suggested remediation if you have one
We aim to acknowledge reports within 72 hours and to provide a resolution timeline within 14 days for critical issues.
- Please do not publicly disclose vulnerabilities before a fix is available.
- We will credit researchers in the release notes unless anonymity is requested.
- We do not run a bug bounty program at this time.
For vulnerabilities in the original openai/codex codebase
that also affect this fork, please report to OpenAI first:
OpenAI's security program is managed through Bugcrowd, and we ask that any validated vulnerabilities be reported via the Bugcrowd program. Vulnerability Program Guidelines are defined on the Bugcrowd program page.
After reporting upstream, please also open a GitHub Security Advisory in this repository so the fork can be patched independently if needed.
The following are in scope for this fork's security policy:
- Fork-specific code changes in
codex-rs/,codex-cli/,shell-tool-mcp/ - Website files:
index.html,assets/,data/terms.json - Configuration handling, credential storage, and sandbox enforcement changes made in this fork
The following are out of scope (report upstream):
- Vulnerabilities present in the upstream
openai/codexcodebase without modification by this fork - Third-party dependencies (report to the respective upstream maintainer)
This software is not certified for safety-critical applications. See DISCLAIMER.md for the full no-warranty statement.