Loading lesson…
Codex executes code on your behalf. Understanding the sandbox boundaries — and where they leak — is the difference between productivity and an outage.
Most chatbots cannot touch your system. Codex can run shell commands, edit files, hit URLs, and start subprocesses. That is what makes it useful and dangerous. The security model is a layered set of constraints that try to keep the useful parts in and the catastrophic parts out.
| Surface | Process isolation | Network policy | Credential exposure |
|---|---|---|---|
| Codex Cloud | Strong (per-task container) | Configurable allowlist | Per-task secrets |
| Codex CLI | Your shell | Your machine's | Your env vars |
| IDE plugin | Your shell | Your machine's | Your env vars |
| GitHub action | GitHub runner | GitHub config | GitHub secrets |
The big idea: security is a defense in depth. Sandboxes, permissions, network policy, and credential isolation each catch what the others miss.
15 questions · take it digitally for instant feedback at tendril.neural-forge.io/learn/quiz/end-codex-security-model-creators
What is the core idea behind "Codex Security Model: What Code It Can Run And Where"?
Which term best describes a foundational idea in "Codex Security Model: What Code It Can Run And Where"?
A learner studying Codex Security Model: What Code It Can Run And Where would need to understand which concept?
Which of these is directly relevant to Codex Security Model: What Code It Can Run And Where?
Which of the following is a key point about Codex Security Model: What Code It Can Run And Where?
Which of these does NOT belong in a discussion of Codex Security Model: What Code It Can Run And Where?
Which statement is accurate regarding Codex Security Model: What Code It Can Run And Where?
Which of these does NOT belong in a discussion of Codex Security Model: What Code It Can Run And Where?
What is the key insight about "The CLI sees your laptop" in the context of Codex Security Model: What Code It Can Run And Where?
What is the key insight about "Audit logs are your insurance" in the context of Codex Security Model: What Code It Can Run And Where?
What is the key insight about "From the community" in the context of Codex Security Model: What Code It Can Run And Where?
Which statement accurately describes an aspect of Codex Security Model: What Code It Can Run And Where?
What does working with Codex Security Model: What Code It Can Run And Where typically involve?
Which best describes the scope of "Codex Security Model: What Code It Can Run And Where"?
Which section heading best belongs in a lesson about Codex Security Model: What Code It Can Run And Where?