config-reference.md +1725 −2154
6 6
7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.
8 8
99| Key | Type / Values | Details |Project-scoped config can't override machine-local provider, auth,
1010| --- | --- | --- |notification, profile, or telemetry routing keys. Codex ignores
1111| `agents.<name>.config_file` | `string (path)` | Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. |`openai_base_url`, `chatgpt_base_url`, `model_provider`, `model_providers`,
1212| `agents.<name>.description` | `string` | Role guidance shown to Codex when choosing and spawning that agent type. |`notify`, `profile`, `profiles`, `experimental_realtime_ws_base_url`, and
1313| `agents.max_threads` | `number` | Maximum number of agent threads that can be open concurrently. |`otel` when they appear in a project-local `.codex/config.toml`; put those in
1414| `approval_policy` | `untrusted | on-request | never` | Controls when Codex pauses for approval before executing commands. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. |user-level config instead.
1515| `apps.<id>.disabled_reason` | `unknown | user` | Optional reason attached when an app/connector is disabled. |
1616| `apps.<id>.enabled` | `boolean` | Enable or disable a specific app/connector by id (default: true). |For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/agent-approvals-security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/agent-approvals-security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/agent-approvals-security#network-access).
1717| `chatgpt_base_url` | `string` | Override the base URL used during the ChatGPT login flow. |
1818| `check_for_update_on_startup` | `boolean` | Check for Codex updates on startup (set to false only when updates are centrally managed). |<ConfigTable
1919| `cli_auth_credentials_store` | `file | keyring | auto` | Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). | options={[
2020| `compact_prompt` | `string` | Inline override for the history compaction prompt. | {
2121| `developer_instructions` | `string` | Additional developer instructions injected into the session (optional). | key: "model",
2222| `disable_paste_burst` | `boolean` | Disable burst-paste detection in the TUI. | type: "string",
2323| `experimental_compact_prompt_file` | `string (path)` | Load the compaction prompt override from a file (experimental). | description: "Model to use (e.g., `gpt-5.5`).",
2424| `experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. | },
2525| `experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. | {
2626| `features.apply_patch_freeform` | `boolean` | Expose the freeform `apply_patch` tool (experimental). | key: "review_model",
2727| `features.apps` | `boolean` | Enable ChatGPT Apps/connectors support (experimental). | type: "string",
2828| `features.apps_mcp_gateway` | `boolean` | Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). | description:
2929| `features.child_agents_md` | `boolean` | Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). | "Optional model override used by `/review` (defaults to the current session model).",
3030| `features.collaboration_modes` | `boolean` | Enable collaboration modes such as plan mode (stable; on by default). | },
3131| `features.elevated_windows_sandbox` | `boolean` | Enable the elevated Windows sandbox pipeline (experimental). | {
3232| `features.experimental_windows_sandbox` | `boolean` | Run the Windows restricted-token sandbox (experimental). | key: "model_provider",
3333| `features.multi_agent` | `boolean` | Enable multi-agent collaboration tools (`spawn\_agent`, `send\_input`, `resume\_agent`, `wait`, and `close\_agent`) (experimental; off by default). | type: "string",
3434| `features.personality` | `boolean` | Enable personality selection controls (stable; on by default). | description: "Provider id from `model_providers` (default: `openai`).",
3535| `features.powershell_utf8` | `boolean` | Force PowerShell UTF-8 output (defaults to true). | },
3636| `features.remote_models` | `boolean` | Refresh remote model list before showing readiness (experimental). | {
3737| `features.request_rule` | `boolean` | Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). | key: "openai_base_url",
3838| `features.runtime_metrics` | `boolean` | Show runtime metrics summary in TUI turn separators (experimental). | type: "string",
3939| `features.search_tool` | `boolean` | Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). | description:
4040| `features.shell_snapshot` | `boolean` | Snapshot shell environment to speed up repeated commands (beta). | "Base URL override for the built-in `openai` model provider.",
4141| `features.shell_tool` | `boolean` | Enable the default `shell` tool for running commands (stable; on by default). | },
4242| `features.unified_exec` | `boolean` | Use the unified PTY-backed exec tool (beta). | {
4343| `features.use_linux_sandbox_bwrap` | `boolean` | Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). | key: "model_context_window",
4444| `features.web_search` | `boolean` | Deprecated legacy toggle; prefer the top-level `web_search` setting. | type: "number",
4545| `features.web_search_cached` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. | description: "Context window tokens available to the active model.",
4646| `features.web_search_request` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. | },
4747| `feedback.enabled` | `boolean` | Enable feedback submission via `/feedback` across Codex surfaces (default: true). | {
4848| `file_opener` | `vscode | vscode-insiders | windsurf | cursor | none` | URI scheme used to open citations from Codex output (default: `vscode`). | key: "model_auto_compact_token_limit",
4949| `forced_chatgpt_workspace_id` | `string (uuid)` | Limit ChatGPT logins to a specific workspace identifier. | type: "number",
5050| `forced_login_method` | `chatgpt | api` | Restrict Codex to a specific authentication method. | description:
5151| `hide_agent_reasoning` | `boolean` | Suppress reasoning events in both the TUI and `codex exec` output. | "Token threshold that triggers automatic history compaction (unset uses model defaults).",
5252| `history.max_bytes` | `number` | If set, caps the history file size in bytes by dropping oldest entries. | },
5353| `history.persistence` | `save-all | none` | Control whether Codex saves session transcripts to history.jsonl. | {
5454| `include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | key: "model_catalog_json",
5555| `instructions` | `string` | Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. | type: "string (path)",
5656| `log_dir` | `string (path)` | Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. | description:
5757| `mcp_oauth_callback_port` | `integer` | Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. | "Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile.",
5858| `mcp_oauth_credentials_store` | `auto | file | keyring` | Preferred store for MCP OAuth credentials. | },
5959| `mcp_servers.<id>.args` | `array<string>` | Arguments passed to the MCP stdio server command. | {
6060| `mcp_servers.<id>.bearer_token_env_var` | `string` | Environment variable sourcing the bearer token for an MCP HTTP server. | key: "oss_provider",
6161| `mcp_servers.<id>.command` | `string` | Launcher command for an MCP stdio server. | type: "lmstudio | ollama",
6262| `mcp_servers.<id>.cwd` | `string` | Working directory for the MCP stdio server process. | description:
6363| `mcp_servers.<id>.disabled_tools` | `array<string>` | Deny list applied after `enabled_tools` for the MCP server. | "Default local provider used when running with `--oss` (defaults to prompting if unset).",
6464| `mcp_servers.<id>.enabled` | `boolean` | Disable an MCP server without removing its configuration. | },
6565| `mcp_servers.<id>.enabled_tools` | `array<string>` | Allow list of tool names exposed by the MCP server. | {
6666| `mcp_servers.<id>.env` | `map<string,string>` | Environment variables forwarded to the MCP stdio server. | key: "approval_policy",
6767| `mcp_servers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables for an MCP HTTP server. | type: "untrusted | on-request | never | { granular = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool, request_permissions = bool, skill_approval = bool } }",
6868| `mcp_servers.<id>.env_vars` | `array<string>` | Additional environment variables to whitelist for an MCP stdio server. | description:
6969| `mcp_servers.<id>.http_headers` | `map<string,string>` | Static HTTP headers included with each MCP HTTP request. | "Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { granular = { ... } }` to allow or auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs.",
7070| `mcp_servers.<id>.required` | `boolean` | When true, fail startup/resume if this enabled MCP server cannot initialize. | },
7171| `mcp_servers.<id>.startup_timeout_ms` | `number` | Alias for `startup_timeout_sec` in milliseconds. | {
7272| `mcp_servers.<id>.startup_timeout_sec` | `number` | Override the default 10s startup timeout for an MCP server. | key: "approval_policy.granular.sandbox_approval",
7373| `mcp_servers.<id>.tool_timeout_sec` | `number` | Override the default 60s per-tool timeout for an MCP server. | type: "boolean",
7474| `mcp_servers.<id>.url` | `string` | Endpoint for an MCP streamable HTTP server. | description:
7575| `model` | `string` | Model to use (e.g., `gpt-5-codex`). | "When `true`, sandbox escalation approval prompts are allowed to surface.",
7676| `model_auto_compact_token_limit` | `number` | Token threshold that triggers automatic history compaction (unset uses model defaults). | },
7777| `model_context_window` | `number` | Context window tokens available to the active model. | {
7878| `model_instructions_file` | `string (path)` | Replacement for built-in instructions instead of `AGENTS.md`. | key: "approval_policy.granular.rules",
7979| `model_provider` | `string` | Provider id from `model_providers` (default: `openai`). | type: "boolean",
8080| `model_providers.<id>.base_url` | `string` | API base URL for the model provider. | description:
8181| `model_providers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables when present. | "When `true`, approvals triggered by execpolicy `prompt` rules are allowed to surface.",
8282| `model_providers.<id>.env_key` | `string` | Environment variable supplying the provider API key. | },
8383| `model_providers.<id>.env_key_instructions` | `string` | Optional setup guidance for the provider API key. | {
8484| `model_providers.<id>.experimental_bearer_token` | `string` | Direct bearer token for the provider (discouraged; use `env_key`). | key: "approval_policy.granular.mcp_elicitations",
8585| `model_providers.<id>.http_headers` | `map<string,string>` | Static HTTP headers added to provider requests. | type: "boolean",
8686| `model_providers.<id>.name` | `string` | Display name for a custom model provider. | description:
8787| `model_providers.<id>.query_params` | `map<string,string>` | Extra query parameters appended to provider requests. | "When `true`, MCP elicitation prompts are allowed to surface instead of being auto-rejected.",
8888| `model_providers.<id>.request_max_retries` | `number` | Retry count for HTTP requests to the provider (default: 4). | },
8989| `model_providers.<id>.requires_openai_auth` | `boolean` | The provider uses OpenAI authentication (defaults to false). | {
9090| `model_providers.<id>.stream_idle_timeout_ms` | `number` | Idle timeout for SSE streams in milliseconds (default: 300000). | key: "approval_policy.granular.request_permissions",
9191| `model_providers.<id>.stream_max_retries` | `number` | Retry count for SSE streaming interruptions (default: 5). | type: "boolean",
9292| `model_providers.<id>.wire_api` | `chat | responses` | Protocol used by the provider (defaults to `chat` if omitted). | description:
9393| `model_reasoning_effort` | `minimal | low | medium | high | xhigh` | Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). | "When `true`, prompts from the `request_permissions` tool are allowed to surface.",
9494| `model_reasoning_summary` | `auto | concise | detailed | none` | Select reasoning summary detail or disable summaries entirely. | },
9595| `model_supports_reasoning_summaries` | `boolean` | Force Codex to send or not send reasoning metadata. | {
9696| `model_verbosity` | `low | medium | high` | Control GPT-5 Responses API verbosity (defaults to `medium`). | key: "approval_policy.granular.skill_approval",
9797| `notice.hide_full_access_warning` | `boolean` | Track acknowledgement of the full access warning prompt. | type: "boolean",
9898| `notice.hide_gpt-5.1-codex-max_migration_prompt` | `boolean` | Track acknowledgement of the gpt-5.1-codex-max migration prompt. | description:
9999| `notice.hide_gpt5_1_migration_prompt` | `boolean` | Track acknowledgement of the GPT-5.1 migration prompt. | "When `true`, skill-script approval prompts are allowed to surface.",
100100| `notice.hide_rate_limit_model_nudge` | `boolean` | Track opt-out of the rate limit model switch reminder. | },
101101| `notice.hide_world_writable_warning` | `boolean` | Track acknowledgement of the Windows world-writable directories warning. | {
102102| `notice.model_migrations` | `map<string,string>` | Track acknowledged model migrations as old->new mappings. | key: "approvals_reviewer",
103103| `notify` | `array<string>` | Command invoked for notifications; receives a JSON payload from Codex. | type: "user | auto_review",
104104| `oss_provider` | `lmstudio | ollama` | Default local provider used when running with `--oss` (defaults to prompting if unset). | description:
105105| `otel.environment` | `string` | Environment tag applied to emitted OpenTelemetry events (default: `dev`). | "Who reviews eligible approval prompts under `on-request` or granular approval policies. Defaults to `user`; `auto_review` uses the reviewer subagent. This setting doesn't change sandboxing or review actions already allowed inside the sandbox.",
106106| `otel.exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry exporter and provide any endpoint metadata. | },
107107| `otel.exporter.<id>.endpoint` | `string` | Exporter endpoint for OTEL logs. | {
108108| `otel.exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL exporter requests. | key: "auto_review.policy",
109109| `otel.exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP exporter. | type: "string",
110110| `otel.exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL exporter TLS. | description:
111111| `otel.exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL exporter TLS. | "Local Markdown policy instructions for automatic review. Managed `guardian_policy_config` takes precedence. Blank values are ignored.",
112112| `otel.exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL exporter TLS. | },
113113| `otel.log_user_prompt` | `boolean` | Opt in to exporting raw user prompts with OpenTelemetry logs. | {
114114| `otel.trace_exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry trace exporter and provide any endpoint metadata. | key: "allow_login_shell",
115115| `otel.trace_exporter.<id>.endpoint` | `string` | Trace exporter endpoint for OTEL logs. | type: "boolean",
116116| `otel.trace_exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL trace exporter requests. | description:
117117| `otel.trace_exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP trace exporter. | "Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells.",
118118| `otel.trace_exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL trace exporter TLS. | },
119119| `otel.trace_exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL trace exporter TLS. | {
120120| `otel.trace_exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL trace exporter TLS. | key: "sandbox_mode",
121121| `personality` | `none | friendly | pragmatic` | Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`. | type: "read-only | workspace-write | danger-full-access",
122122| `profile` | `string` | Default profile applied at startup (equivalent to `--profile`). | description:
123123| `profiles.<name>.*` | `various` | Profile-scoped overrides for any of the supported configuration keys. | "Sandbox policy for filesystem and network access during command execution.",
124124| `profiles.<name>.experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | },
125125| `profiles.<name>.experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec`. | {
126126| `profiles.<name>.include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | key: "sandbox_workspace_write.writable_roots",
127127| `profiles.<name>.oss_provider` | `lmstudio | ollama` | Profile-scoped OSS provider for `--oss` sessions. | type: "array<string>",
128128| `profiles.<name>.personality` | `none | friendly | pragmatic` | Profile-scoped communication style override for supported models. | description:
129129| `profiles.<name>.web_search` | `disabled | cached | live` | Profile-scoped web search mode override (default: `"cached"`). | 'Additional writable roots when `sandbox_mode = "workspace-write"`.',
130130| `project_doc_fallback_filenames` | `array<string>` | Additional filenames to try when `AGENTS.md` is missing. | },
131131| `project_doc_max_bytes` | `number` | Maximum bytes read from `AGENTS.md` when building project instructions. | {
132132| `project_root_markers` | `array<string>` | List of project root marker filenames; used when searching parent directories for the project root. | key: "sandbox_workspace_write.network_access",
133133| `projects.<path>.trust_level` | `string` | Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers. | type: "boolean",
134134| `review_model` | `string` | Optional model override used by `/review` (defaults to the current session model). | description:
135135| `sandbox_mode` | `read-only | workspace-write | danger-full-access` | Sandbox policy for filesystem and network access during command execution. | "Allow outbound network access inside the workspace-write sandbox.",
136136| `sandbox_workspace_write.exclude_slash_tmp` | `boolean` | Exclude `/tmp` from writable roots in workspace-write mode. | },
137137| `sandbox_workspace_write.exclude_tmpdir_env_var` | `boolean` | Exclude `$TMPDIR` from writable roots in workspace-write mode. | {
138138| `sandbox_workspace_write.network_access` | `boolean` | Allow outbound network access inside the workspace-write sandbox. | key: "sandbox_workspace_write.exclude_tmpdir_env_var",
139139| `sandbox_workspace_write.writable_roots` | `array<string>` | Additional writable roots when `sandbox_mode = "workspace-write"`. | type: "boolean",
140140| `shell_environment_policy.exclude` | `array<string>` | Glob patterns for removing environment variables after the defaults. | description:
141141| `shell_environment_policy.experimental_use_profile` | `boolean` | Use the user shell profile when spawning subprocesses. | "Exclude `$TMPDIR` from writable roots in workspace-write mode.",
142142| `shell_environment_policy.ignore_default_excludes` | `boolean` | Keep variables containing KEY/SECRET/TOKEN before other filters run. | },
143143| `shell_environment_policy.include_only` | `array<string>` | Whitelist of patterns; when set only matching variables are kept. | {
144144| `shell_environment_policy.inherit` | `all | core | none` | Baseline environment inheritance when spawning subprocesses. | key: "sandbox_workspace_write.exclude_slash_tmp",
145145| `shell_environment_policy.set` | `map<string,string>` | Explicit environment overrides injected into every subprocess. | type: "boolean",
146146| `show_raw_agent_reasoning` | `boolean` | Surface raw reasoning content when the active model emits it. | description:
147147| `skills.config` | `array<object>` | Per-skill enablement overrides stored in config.toml. | "Exclude `/tmp` from writable roots in workspace-write mode.",
148148| `skills.config.<index>.enabled` | `boolean` | Enable or disable the referenced skill. | },
149149| `skills.config.<index>.path` | `string (path)` | Path to a skill folder containing `SKILL.md`. | {
150150| `suppress_unstable_features_warning` | `boolean` | Suppress the warning that appears when under-development feature flags are enabled. | key: "windows.sandbox",
151151| `tool_output_token_limit` | `number` | Token budget for storing individual tool/function outputs in history. | type: "unelevated | elevated",
152152| `tools.web_search` | `boolean` | Deprecated legacy toggle for web search; prefer the top-level `web_search` setting. | description:
153153| `tui` | `table` | TUI-specific options such as enabling inline desktop notifications. | "Windows-only native sandbox mode when running Codex natively on Windows.",
154154| `tui.alternate_screen` | `auto | always | never` | Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback). | },
155155| `tui.animations` | `boolean` | Enable terminal animations (welcome screen, shimmer, spinner) (default: true). | {
156156| `tui.notification_method` | `auto | osc9 | bel` | Notification method for unfocused terminal notifications (default: auto). | key: "windows.sandbox_private_desktop",
157157| `tui.notifications` | `boolean | array<string>` | Enable TUI notifications; optionally restrict to specific event types. | type: "boolean",
158158| `tui.show_tooltips` | `boolean` | Show onboarding tooltips in the TUI welcome screen (default: true). | description:
159159| `tui.status_line` | `array<string> | null` | Ordered list of TUI footer status-line item identifiers. `null` disables the status line. | "Run the final sandboxed child process on a private desktop by default on native Windows. Set `false` only for compatibility with the older `Winsta0\\\\Default` behavior.",
160160| `web_search` | `disabled | cached | live` | Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool. | },
161161| `windows_wsl_setup_acknowledged` | `boolean` | Track Windows onboarding acknowledgement (Windows only). | {
162162 key: "notify",
163163Key type: "array<string>",
164164 description:
165165`agents.<name>.config_file` "Command invoked for notifications; receives a JSON payload from Codex.",
166166 },
167167Type / Values {
168168 key: "check_for_update_on_startup",
169169`string (path)` type: "boolean",
170170 description:
171171Details "Check for Codex updates on startup (set to false only when updates are centrally managed).",
172172 },
173173Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. {
174174 key: "feedback.enabled",
175175Key type: "boolean",
176176 description:
177177`agents.<name>.description` "Enable feedback submission via `/feedback` across Codex surfaces (default: true).",
178178 },
179179Type / Values {
180180 key: "analytics.enabled",
181181`string` type: "boolean",
182182 description:
183183Details "Enable or disable analytics for this machine/profile. When unset, the client default applies.",
184184 },
185185Role guidance shown to Codex when choosing and spawning that agent type. {
186186 key: "instructions",
187187Key type: "string",
188188 description:
189189`agents.max_threads` "Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`.",
190190 },
191191Type / Values {
192192 key: "developer_instructions",
193193`number` type: "string",
194194 description:
195195Details "Additional developer instructions injected into the session (optional).",
196196 },
197197Maximum number of agent threads that can be open concurrently. {
198198 key: "log_dir",
199199Key type: "string (path)",
200200 description:
201201`approval_policy` "Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`.",
202202 },
203203Type / Values {
204204 key: "sqlite_home",
205205`untrusted | on-request | never` type: "string (path)",
206206 description:
207207Details "Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state.",
208208 },
209209Controls when Codex pauses for approval before executing commands. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. {
210210 key: "compact_prompt",
211211Key type: "string",
212212 description: "Inline override for the history compaction prompt.",
213213`apps.<id>.disabled_reason` },
214214 {
215215Type / Values key: "commit_attribution",
216216 type: "string",
217217`unknown | user` description:
218218 'Commit co-author trailer used when `[features].codex_git_commit` is enabled. Defaults to `Codex <noreply@openai.com>`; set `""` to disable.',
219219Details },
220220 {
221221Optional reason attached when an app/connector is disabled. key: "model_instructions_file",
222222 type: "string (path)",
223223Key description:
224224 "Replacement for built-in instructions instead of `AGENTS.md`.",
225225`apps.<id>.enabled` },
226226 {
227227Type / Values key: "personality",
228228 type: "none | friendly | pragmatic",
229229`boolean` description:
230230 "Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.",
231231Details },
232232 {
233233Enable or disable a specific app/connector by id (default: true). key: "service_tier",
234234 type: "string",
235235Key description:
236236 "Preferred service tier for new turns. Built-in values include `flex` and `fast`; legacy `fast` config maps to the request value `priority`, and catalog-provided tier IDs can also be stored.",
237237`chatgpt_base_url` },
238238 {
239239Type / Values key: "experimental_compact_prompt_file",
240240 type: "string (path)",
241241`string` description:
242242 "Load the compaction prompt override from a file (experimental).",
243243Details },
244244 {
245245Override the base URL used during the ChatGPT login flow. key: "skills.config",
246246 type: "array<object>",
247247Key description: "Per-skill enablement overrides stored in config.toml.",
248248 },
249249`check_for_update_on_startup` {
250250 key: "skills.config.<index>.path",
251251Type / Values type: "string (path)",
252252 description: "Path to a skill folder containing `SKILL.md`.",
253253`boolean` },
254254 {
255255Details key: "skills.config.<index>.enabled",
256256 type: "boolean",
257257Check for Codex updates on startup (set to false only when updates are centrally managed). description: "Enable or disable the referenced skill.",
258258 },
259259Key {
260260 key: "apps.<id>.enabled",
261261`cli_auth_credentials_store` type: "boolean",
262262 description:
263263Type / Values "Enable or disable a specific app/connector by id (default: true).",
264264 },
265265`file | keyring | auto` {
266266 key: "apps._default.enabled",
267267Details type: "boolean",
268268 description:
269269Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). "Default app enabled state for all apps unless overridden per app.",
270270 },
271271Key {
272272 key: "apps._default.destructive_enabled",
273273`compact_prompt` type: "boolean",
274274 description:
275275Type / Values "Default allow/deny for app tools with `destructive_hint = true`.",
276276 },
277277`string` {
278278 key: "apps._default.open_world_enabled",
279279Details type: "boolean",
280280 description:
281281Inline override for the history compaction prompt. "Default allow/deny for app tools with `open_world_hint = true`.",
282282 },
283283Key {
284284 key: "apps.<id>.destructive_enabled",
285285`developer_instructions` type: "boolean",
286286 description:
287287Type / Values "Allow or block tools in this app that advertise `destructive_hint = true`.",
288288 },
289289`string` {
290290 key: "apps.<id>.open_world_enabled",
291291Details type: "boolean",
292292 description:
293293Additional developer instructions injected into the session (optional). "Allow or block tools in this app that advertise `open_world_hint = true`.",
294294 },
295295Key {
296296 key: "apps.<id>.default_tools_enabled",
297297`disable_paste_burst` type: "boolean",
298298 description:
299299Type / Values "Default enabled state for tools in this app unless a per-tool override exists.",
300300 },
301301`boolean` {
302302 key: "apps.<id>.default_tools_approval_mode",
303303Details type: "auto | prompt | approve",
304304 description:
305305Disable burst-paste detection in the TUI. "Default approval behavior for tools in this app unless a per-tool override exists.",
306306 },
307307Key {
308308 key: "apps.<id>.tools.<tool>.enabled",
309309`experimental_compact_prompt_file` type: "boolean",
310310 description:
311311Type / Values "Per-tool enabled override for an app tool (for example `repos/list`).",
312312 },
313313`string (path)` {
314314 key: "apps.<id>.tools.<tool>.approval_mode",
315315Details type: "auto | prompt | approve",
316316 description: "Per-tool approval behavior override for a single app tool.",
317317Load the compaction prompt override from a file (experimental). },
318318 {
319319Key key: "tool_suggest.discoverables",
320320 type: "array<table>",
321321`experimental_use_freeform_apply_patch` description:
322322 'Allow tool suggestions for additional discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
323323Type / Values },
324324 {
325325`boolean` key: "tool_suggest.disabled_tools",
326326 type: "array<table>",
327327Details description:
328328 'Disable suggestions for specific discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
329329Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. },
330330 {
331331Key key: "features.apps",
332332 type: "boolean",
333333`experimental_use_unified_exec_tool` description: "Enable ChatGPT Apps/connectors support (experimental).",
334334 },
335335Type / Values {
336336 key: "features.hooks",
337337`boolean` type: "boolean",
338338 description:
339339Details "Enable lifecycle hooks loaded from `hooks.json` or inline `[hooks]` config. `features.codex_hooks` is a deprecated alias.",
340340 },
341341Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. {
342342 key: "features.codex_git_commit",
343343Key type: "boolean",
344344 description:
345345`features.apply_patch_freeform` "Enable Codex-generated git commits. When enabled, Codex uses `commit_attribution` to append a `Co-authored-by:` trailer to generated commit messages.",
346346 },
347347Type / Values {
348348 key: "hooks",
349349`boolean` type: "table",
350350 description:
351351Details "Lifecycle hooks configured inline in `config.toml`. Uses the same event schema as `hooks.json`; see the Hooks guide for examples and supported events.",
352352 },
353353Expose the freeform `apply_patch` tool (experimental). {
354354 key: "features.plugin_hooks",
355355Key type: "boolean",
356356 description:
357357`features.apps` "Opt into lifecycle hooks bundled with enabled plugins. Off by default in this release; set to `true` to opt in.",
358358 },
359359Type / Values {
360360 key: "features.memories",
361361`boolean` type: "boolean",
362362 description: "Enable [Memories](https://developers.openai.com/codex/memories) (off by default).",
363363Details },
364364 {
365365Enable ChatGPT Apps/connectors support (experimental). key: "mcp_servers.<id>.command",
366366 type: "string",
367367Key description: "Launcher command for an MCP stdio server.",
368368 },
369369`features.apps_mcp_gateway` {
370370 key: "mcp_servers.<id>.args",
371371Type / Values type: "array<string>",
372372 description: "Arguments passed to the MCP stdio server command.",
373373`boolean` },
374374 {
375375Details key: "mcp_servers.<id>.env",
376376 type: "map<string,string>",
377377Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). description: "Environment variables forwarded to the MCP stdio server.",
378378 },
379379Key {
380380 key: "mcp_servers.<id>.env_vars",
381381`features.child_agents_md` type: 'array<string | { name = string, source = "local" | "remote" }>',
382382 description:
383383Type / Values 'Additional environment variables to whitelist for an MCP stdio server. String entries default to `source = "local"`; use `source = "remote"` only with executor-backed remote stdio.',
384384 },
385385`boolean` {
386386 key: "mcp_servers.<id>.cwd",
387387Details type: "string",
388388 description: "Working directory for the MCP stdio server process.",
389389Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). },
390390 {
391391Key key: "mcp_servers.<id>.url",
392392 type: "string",
393393`features.collaboration_modes` description: "Endpoint for an MCP streamable HTTP server.",
394394 },
395395Type / Values {
396396 key: "mcp_servers.<id>.bearer_token_env_var",
397397`boolean` type: "string",
398398 description:
399399Details "Environment variable sourcing the bearer token for an MCP HTTP server.",
400400 },
401401Enable collaboration modes such as plan mode (stable; on by default). {
402402 key: "mcp_servers.<id>.http_headers",
403403Key type: "map<string,string>",
404404 description: "Static HTTP headers included with each MCP HTTP request.",
405405`features.elevated_windows_sandbox` },
406406 {
407407Type / Values key: "mcp_servers.<id>.env_http_headers",
408408 type: "map<string,string>",
409409`boolean` description:
410410 "HTTP headers populated from environment variables for an MCP HTTP server.",
411411Details },
412412 {
413413Enable the elevated Windows sandbox pipeline (experimental). key: "mcp_servers.<id>.enabled",
414414 type: "boolean",
415415Key description: "Disable an MCP server without removing its configuration.",
416416 },
417417`features.experimental_windows_sandbox` {
418418 key: "mcp_servers.<id>.required",
419419Type / Values type: "boolean",
420420 description:
421421`boolean` "When true, fail startup/resume if this enabled MCP server cannot initialize.",
422422 },
423423Details {
424424 key: "mcp_servers.<id>.startup_timeout_sec",
425425Run the Windows restricted-token sandbox (experimental). type: "number",
426426 description:
427427Key "Override the default 10s startup timeout for an MCP server.",
428428 },
429429`features.multi_agent` {
430430 key: "mcp_servers.<id>.startup_timeout_ms",
431431Type / Values type: "number",
432432 description: "Alias for `startup_timeout_sec` in milliseconds.",
433433`boolean` },
434434 {
435435Details key: "mcp_servers.<id>.tool_timeout_sec",
436436 type: "number",
437437Enable multi-agent collaboration tools (`spawn\_agent`, `send\_input`, `resume\_agent`, `wait`, and `close\_agent`) (experimental; off by default). description:
438438 "Override the default 60s per-tool timeout for an MCP server.",
439439Key },
440440 {
441441`features.personality` key: "mcp_servers.<id>.enabled_tools",
442442 type: "array<string>",
443443Type / Values description: "Allow list of tool names exposed by the MCP server.",
444444 },
445445`boolean` {
446446 key: "mcp_servers.<id>.disabled_tools",
447447Details type: "array<string>",
448448 description:
449449Enable personality selection controls (stable; on by default). "Deny list applied after `enabled_tools` for the MCP server.",
450450 },
451451Key {
452452 key: "mcp_servers.<id>.default_tools_approval_mode",
453453`features.powershell_utf8` type: "auto | prompt | approve",
454454 description:
455455Type / Values "Default approval behavior for MCP tools on this server unless a per-tool override exists.",
456456 },
457457`boolean` {
458458 key: "mcp_servers.<id>.tools.<tool>.approval_mode",
459459Details type: "auto | prompt | approve",
460460 description:
461461Force PowerShell UTF-8 output (defaults to true). "Per-tool approval behavior override for one MCP tool on this server.",
462462 },
463463Key {
464464 key: "mcp_servers.<id>.scopes",
465465`features.remote_models` type: "array<string>",
466466 description:
467467Type / Values "OAuth scopes to request when authenticating to that MCP server.",
468468 },
469469`boolean` {
470470 key: "mcp_servers.<id>.oauth_resource",
471471Details type: "string",
472472 description:
473473Refresh remote model list before showing readiness (experimental). "Optional RFC 8707 OAuth resource parameter to include during MCP login.",
474474 },
475475Key {
476476 key: "mcp_servers.<id>.experimental_environment",
477477`features.request_rule` type: "local | remote",
478478 description:
479479Type / Values "Experimental placement for an MCP server. `remote` starts stdio servers through a remote executor environment; streamable HTTP remote placement is not implemented.",
480480 },
481481`boolean` {
482482 key: "agents.max_threads",
483483Details type: "number",
484484 description:
485485Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). "Maximum number of agent threads that can be open concurrently. Defaults to `6` when unset.",
486486 },
487487Key {
488488 key: "agents.max_depth",
489489`features.runtime_metrics` type: "number",
490490 description:
491491Type / Values "Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1).",
492492 },
493493`boolean` {
494494 key: "agents.job_max_runtime_seconds",
495495Details type: "number",
496496 description:
497497Show runtime metrics summary in TUI turn separators (experimental). "Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker.",
498498 },
499499Key {
500500 key: "agents.<name>.description",
501501`features.search_tool` type: "string",
502502 description:
503503Type / Values "Role guidance shown to Codex when choosing and spawning that agent type.",
504504 },
505505`boolean` {
506506 key: "agents.<name>.config_file",
507507Details type: "string (path)",
508508 description:
509509Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). "Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role.",
510510 },
511511Key {
512512 key: "agents.<name>.nickname_candidates",
513513`features.shell_snapshot` type: "array<string>",
514514 description:
515515Type / Values "Optional pool of display nicknames for spawned agents in that role.",
516516 },
517517`boolean` {
518518 key: "memories.generate_memories",
519519Details type: "boolean",
520520 description:
521521Snapshot shell environment to speed up repeated commands (beta). "When `false`, newly created threads are not stored as memory-generation inputs. Defaults to `true`.",
522522 },
523523Key {
524524 key: "memories.use_memories",
525525`features.shell_tool` type: "boolean",
526526 description:
527527Type / Values "When `false`, Codex skips injecting existing memories into future sessions. Defaults to `true`.",
528528 },
529529`boolean` {
530530 key: "memories.disable_on_external_context",
531531Details type: "boolean",
532532 description:
533533Enable the default `shell` tool for running commands (stable; on by default). "When `true`, threads that use external context such as MCP tool calls, web search, or tool search are kept out of memory generation. Defaults to `false`. Legacy alias: `memories.no_memories_if_mcp_or_web_search`.",
534534 },
535535Key {
536536 key: "memories.max_raw_memories_for_consolidation",
537537`features.unified_exec` type: "number",
538538 description:
539539Type / Values "Maximum recent raw memories retained for global consolidation. Defaults to `256` and is capped at `4096`.",
540540 },
541541`boolean` {
542542 key: "memories.max_unused_days",
543543Details type: "number",
544544 description:
545545Use the unified PTY-backed exec tool (beta). "Maximum days since a memory was last used before it becomes ineligible for consolidation. Defaults to `30` and is clamped to `0`-`365`.",
546546 },
547547Key {
548548 key: "memories.max_rollout_age_days",
549549`features.use_linux_sandbox_bwrap` type: "number",
550550 description:
551551Type / Values "Maximum age of threads considered for memory generation. Defaults to `30` and is clamped to `0`-`90`.",
552552 },
553553`boolean` {
554554 key: "memories.max_rollouts_per_startup",
555555Details type: "number",
556556 description:
557557Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). "Maximum rollout candidates processed per startup pass. Defaults to `16` and is capped at `128`.",
558558 },
559559Key {
560560 key: "memories.min_rollout_idle_hours",
561561`features.web_search` type: "number",
562562 description:
563563Type / Values "Minimum idle time before a thread is considered for memory generation. Defaults to `6` and is clamped to `1`-`48`.",
564564 },
565565`boolean` {
566566 key: "memories.min_rate_limit_remaining_percent",
567567Details type: "number",
568568 description:
569569Deprecated legacy toggle; prefer the top-level `web_search` setting. "Minimum remaining percentage required in Codex rate-limit windows before memory generation starts. Defaults to `25` and is clamped to `0`-`100`.",
570570 },
571571Key {
572572 key: "memories.extract_model",
573573`features.web_search_cached` type: "string",
574574 description: "Optional model override for per-thread memory extraction.",
575575Type / Values },
576576 {
577577`boolean` key: "memories.consolidation_model",
578578 type: "string",
579579Details description: "Optional model override for global memory consolidation.",
580580 },
581581Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. {
582582 key: "features.unified_exec",
583583Key type: "boolean",
584584 description:
585585`features.web_search_request` "Use the unified PTY-backed exec tool (stable; enabled by default except on Windows).",
586586 },
587587Type / Values {
588588 key: "features.shell_snapshot",
589589`boolean` type: "boolean",
590590 description:
591591Details "Snapshot shell environment to speed up repeated commands (stable; on by default).",
592592 },
593593Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. {
594594 key: "features.undo",
595595Key type: "boolean",
596596 description: "Enable undo support (stable; off by default).",
597597`feedback.enabled` },
598598 {
599599Type / Values key: "features.multi_agent",
600600 type: "boolean",
601601`boolean` description:
602602 "Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait_agent`, and `close_agent`) (stable; on by default).",
603603Details },
604604 {
605605Enable feedback submission via `/feedback` across Codex surfaces (default: true). key: "features.personality",
606606 type: "boolean",
607607Key description:
608608 "Enable personality selection controls (stable; on by default).",
609609`file_opener` },
610610 {
611611Type / Values key: "features.network_proxy",
612612 type: "boolean | table",
613613`vscode | vscode-insiders | windsurf | cursor | none` description:
614614 "Enable sandboxed networking. Use a table form when setting network policy options such as `domains` (experimental; off by default).",
615615Details },
616616 {
617617URI scheme used to open citations from Codex output (default: `vscode`). key: "features.network_proxy.enabled",
618618 type: "boolean",
619619Key description: "Enable sandboxed networking. Defaults to `false`.",
620620 },
621621`forced_chatgpt_workspace_id` {
622622 key: "features.network_proxy.domains",
623623Type / Values type: "map<string, allow | deny>",
624624 description:
625625`string (uuid)` "Domain policy for sandboxed networking. Unset by default, which means no external destinations are allowed until you add `allow` rules. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. Add `deny` rules for blocked destinations; `deny` wins on conflicts.",
626626 },
627627Details {
628628 key: "features.network_proxy.unix_sockets",
629629Limit ChatGPT logins to a specific workspace identifier. type: "map<string, allow | none>",
630630 description:
631631Key "Unix socket policy for sandboxed networking. Unset by default; add `allow` entries for permitted sockets.",
632632 },
633633`forced_login_method` {
634634 key: "features.network_proxy.allow_local_binding",
635635Type / Values type: "boolean",
636636 description:
637637`chatgpt | api` "Allow broader local/private-network access. Defaults to `false`; exact local IP literal or `localhost` allow rules can still permit specific local targets.",
638638 },
639639Details {
640640 key: "features.network_proxy.enable_socks5",
641641Restrict Codex to a specific authentication method. type: "boolean",
642642 description: "Expose SOCKS5 support. Defaults to `true`.",
643643Key },
644644 {
645645`hide_agent_reasoning` key: "features.network_proxy.enable_socks5_udp",
646646 type: "boolean",
647647Type / Values description: "Allow UDP over SOCKS5. Defaults to `true`.",
648648 },
649649`boolean` {
650650 key: "features.network_proxy.allow_upstream_proxy",
651651Details type: "boolean",
652652 description:
653653Suppress reasoning events in both the TUI and `codex exec` output. "Allow chaining through an upstream proxy from the environment. Defaults to `true`.",
654654 },
655655Key {
656656 key: "features.network_proxy.dangerously_allow_non_loopback_proxy",
657657`history.max_bytes` type: "boolean",
658658 description:
659659Type / Values "Permit non-loopback listener addresses. Defaults to `false`; enabling it can expose proxy listeners beyond localhost.",
660660 },
661661`number` {
662662 key: "features.network_proxy.dangerously_allow_all_unix_sockets",
663663Details type: "boolean",
664664 description:
665665If set, caps the history file size in bytes by dropping oldest entries. "Permit arbitrary Unix socket destinations instead of allowlist-only access. Defaults to `false`; use only in tightly controlled environments.",
666666 },
667667Key {
668668 key: "features.network_proxy.proxy_url",
669669`history.persistence` type: "string",
670670 description:
671671Type / Values 'HTTP listener URL for sandboxed networking. Defaults to `"http://127.0.0.1:3128"`.',
672672 },
673673`save-all | none` {
674674 key: "features.network_proxy.socks_url",
675675Details type: "string",
676676 description:
677677Control whether Codex saves session transcripts to history.jsonl. 'SOCKS5 listener URL. Defaults to `"http://127.0.0.1:8081"`.',
678678 },
679679Key {
680680 key: "features.web_search",
681681`include_apply_patch_tool` type: "boolean",
682682 description:
683683Type / Values "Deprecated legacy toggle; prefer the top-level `web_search` setting.",
684684 },
685685`boolean` {
686686 key: "features.web_search_cached",
687687Details type: "boolean",
688688 description:
689689Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`.',
690690 },
691691Key {
692692 key: "features.web_search_request",
693693`instructions` type: "boolean",
694694 description:
695695Type / Values 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`.',
696696 },
697697`string` {
698698 key: "features.shell_tool",
699699Details type: "boolean",
700700 description:
701701Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. "Enable the default `shell` tool for running commands (stable; on by default).",
702702 },
703703Key {
704704 key: "features.enable_request_compression",
705705`log_dir` type: "boolean",
706706 description:
707707Type / Values "Compress streaming request bodies with zstd when supported (stable; on by default).",
708708 },
709709`string (path)` {
710710 key: "features.skill_mcp_dependency_install",
711711Details type: "boolean",
712712 description:
713713Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. "Allow prompting and installing missing MCP dependencies for skills (stable; on by default).",
714714 },
715715Key {
716716 key: "features.fast_mode",
717717`mcp_oauth_callback_port` type: "boolean",
718718 description:
719719Type / Values "Enable model-catalog service tier selection in the TUI, including Fast-tier commands when the active model advertises them (stable; on by default).",
720720 },
721721`integer` {
722722 key: "features.prevent_idle_sleep",
723723Details type: "boolean",
724724 description:
725725Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. "Prevent the machine from sleeping while a turn is actively running (experimental; off by default).",
726726 },
727727Key {
728728 key: "suppress_unstable_features_warning",
729729`mcp_oauth_credentials_store` type: "boolean",
730730 description:
731731Type / Values "Suppress the warning that appears when under-development feature flags are enabled.",
732732 },
733733`auto | file | keyring` {
734734 key: "model_providers.<id>",
735735Details type: "table",
736736 description:
737737Preferred store for MCP OAuth credentials. "Custom provider definition. Built-in provider IDs (`openai`, `ollama`, and `lmstudio`) are reserved and cannot be overridden.",
738738 },
739739Key {
740740 key: "model_providers.<id>.name",
741741`mcp_servers.<id>.args` type: "string",
742742 description: "Display name for a custom model provider.",
743743Type / Values },
744744 {
745745`array<string>` key: "model_providers.<id>.base_url",
746746 type: "string",
747747Details description: "API base URL for the model provider.",
748748 },
749749Arguments passed to the MCP stdio server command. {
750750 key: "model_providers.<id>.env_key",
751751Key type: "string",
752752 description: "Environment variable supplying the provider API key.",
753753`mcp_servers.<id>.bearer_token_env_var` },
754754 {
755755Type / Values key: "model_providers.<id>.env_key_instructions",
756756 type: "string",
757757`string` description: "Optional setup guidance for the provider API key.",
758758 },
759759Details {
760760 key: "model_providers.<id>.experimental_bearer_token",
761761Environment variable sourcing the bearer token for an MCP HTTP server. type: "string",
762762 description:
763763Key "Direct bearer token for the provider (discouraged; use `env_key`).",
764764 },
765765`mcp_servers.<id>.command` {
766766 key: "model_providers.<id>.requires_openai_auth",
767767Type / Values type: "boolean",
768768 description:
769769`string` "The provider uses OpenAI authentication (defaults to false).",
770770 },
771771Details {
772772 key: "model_providers.<id>.wire_api",
773773Launcher command for an MCP stdio server. type: "responses",
774774 description:
775775Key "Protocol used by the provider. `responses` is the only supported value, and it is the default when omitted.",
776776 },
777777`mcp_servers.<id>.cwd` {
778778 key: "model_providers.<id>.query_params",
779779Type / Values type: "map<string,string>",
780780 description: "Extra query parameters appended to provider requests.",
781781`string` },
782782 {
783783Details key: "model_providers.<id>.http_headers",
784784 type: "map<string,string>",
785785Working directory for the MCP stdio server process. description: "Static HTTP headers added to provider requests.",
786786 },
787787Key {
788788 key: "model_providers.<id>.env_http_headers",
789789`mcp_servers.<id>.disabled_tools` type: "map<string,string>",
790790 description:
791791Type / Values "HTTP headers populated from environment variables when present.",
792792 },
793793`array<string>` {
794794 key: "model_providers.<id>.request_max_retries",
795795Details type: "number",
796796 description:
797797Deny list applied after `enabled_tools` for the MCP server. "Retry count for HTTP requests to the provider (default: 4).",
798798 },
799799Key {
800800 key: "model_providers.<id>.stream_max_retries",
801801`mcp_servers.<id>.enabled` type: "number",
802802 description: "Retry count for SSE streaming interruptions (default: 5).",
803803Type / Values },
804804 {
805805`boolean` key: "model_providers.<id>.stream_idle_timeout_ms",
806806 type: "number",
807807Details description:
808808 "Idle timeout for SSE streams in milliseconds (default: 300000).",
809809Disable an MCP server without removing its configuration. },
810810 {
811811Key key: "model_providers.<id>.supports_websockets",
812812 type: "boolean",
813813`mcp_servers.<id>.enabled_tools` description:
814814 "Whether that provider supports the Responses API WebSocket transport.",
815815Type / Values },
816816 {
817817`array<string>` key: "model_providers.<id>.auth",
818818 type: "table",
819819Details description:
820820 "Command-backed bearer token configuration for a custom provider. Do not combine with `env_key`, `experimental_bearer_token`, or `requires_openai_auth`.",
821821Allow list of tool names exposed by the MCP server. },
822822 {
823823Key key: "model_providers.<id>.auth.command",
824824 type: "string",
825825`mcp_servers.<id>.env` description:
826826 "Command to run when Codex needs a bearer token. The command must print the token to stdout.",
827827Type / Values },
828828 {
829829`map<string,string>` key: "model_providers.<id>.auth.args",
830830 type: "array<string>",
831831Details description: "Arguments passed to the token command.",
832832 },
833833Environment variables forwarded to the MCP stdio server. {
834834 key: "model_providers.<id>.auth.timeout_ms",
835835Key type: "number",
836836 description:
837837`mcp_servers.<id>.env_http_headers` "Maximum token command runtime in milliseconds (default: 5000).",
838838 },
839839Type / Values {
840840 key: "model_providers.<id>.auth.refresh_interval_ms",
841841`map<string,string>` type: "number",
842842 description:
843843Details "How often Codex proactively refreshes the token in milliseconds (default: 300000). Set to `0` to refresh only after an authentication retry.",
844844 },
845845HTTP headers populated from environment variables for an MCP HTTP server. {
846846 key: "model_providers.<id>.auth.cwd",
847847Key type: "string (path)",
848848 description: "Working directory for the token command.",
849849`mcp_servers.<id>.env_vars` },
850850 {
851851Type / Values key: "model_providers.amazon-bedrock.aws.profile",
852852 type: "string",
853853`array<string>` description:
854854 "AWS profile name used by the built-in `amazon-bedrock` provider.",
855855Details },
856856 {
857857Additional environment variables to whitelist for an MCP stdio server. key: "model_providers.amazon-bedrock.aws.region",
858858 type: "string",
859859Key description: "AWS region used by the built-in `amazon-bedrock` provider.",
860860 },
861861`mcp_servers.<id>.http_headers` {
862862 key: "model_reasoning_effort",
863863Type / Values type: "minimal | low | medium | high | xhigh",
864864 description:
865865`map<string,string>` "Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent).",
866866 },
867867Details {
868868 key: "plan_mode_reasoning_effort",
869869Static HTTP headers included with each MCP HTTP request. type: "none | minimal | low | medium | high | xhigh",
870870 description:
871871Key "Plan-mode-specific reasoning override. When unset, Plan mode uses its built-in preset default.",
872872 },
873873`mcp_servers.<id>.required` {
874874 key: "model_reasoning_summary",
875875Type / Values type: "auto | concise | detailed | none",
876876 description:
877877`boolean` "Select reasoning summary detail or disable summaries entirely.",
878878 },
879879Details {
880880 key: "model_verbosity",
881881When true, fail startup/resume if this enabled MCP server cannot initialize. type: "low | medium | high",
882882 description:
883883Key "Optional GPT-5 Responses API verbosity override; when unset, the selected model/preset default is used.",
884884 },
885885`mcp_servers.<id>.startup_timeout_ms` {
886886 key: "model_supports_reasoning_summaries",
887887Type / Values type: "boolean",
888888 description: "Force Codex to send or not send reasoning metadata.",
889889`number` },
890890 {
891891Details key: "shell_environment_policy.inherit",
892892 type: "all | core | none",
893893Alias for `startup_timeout_sec` in milliseconds. description:
894894 "Baseline environment inheritance when spawning subprocesses.",
895895Key },
896896 {
897897`mcp_servers.<id>.startup_timeout_sec` key: "shell_environment_policy.ignore_default_excludes",
898898 type: "boolean",
899899Type / Values description:
900900 "Keep variables containing KEY/SECRET/TOKEN before other filters run.",
901901`number` },
902902 {
903903Details key: "shell_environment_policy.exclude",
904904 type: "array<string>",
905905Override the default 10s startup timeout for an MCP server. description:
906906 "Glob patterns for removing environment variables after the defaults.",
907907Key },
908908 {
909909`mcp_servers.<id>.tool_timeout_sec` key: "shell_environment_policy.include_only",
910910 type: "array<string>",
911911Type / Values description:
912912 "Whitelist of patterns; when set only matching variables are kept.",
913913`number` },
914914 {
915915Details key: "shell_environment_policy.set",
916916 type: "map<string,string>",
917917Override the default 60s per-tool timeout for an MCP server. description:
918918 "Explicit environment overrides injected into every subprocess.",
919919Key },
920920 {
921921`mcp_servers.<id>.url` key: "shell_environment_policy.experimental_use_profile",
922922 type: "boolean",
923923Type / Values description: "Use the user shell profile when spawning subprocesses.",
924924 },
925925`string` {
926926 key: "project_root_markers",
927927Details type: "array<string>",
928928 description:
929929Endpoint for an MCP streamable HTTP server. "List of project root marker filenames; used when searching parent directories for the project root.",
930930 },
931931Key {
932932 key: "project_doc_max_bytes",
933933`model` type: "number",
934934 description:
935935Type / Values "Maximum bytes read from `AGENTS.md` when building project instructions.",
936936 },
937937`string` {
938938 key: "project_doc_fallback_filenames",
939939Details type: "array<string>",
940940 description: "Additional filenames to try when `AGENTS.md` is missing.",
941941Model to use (e.g., `gpt-5-codex`). },
942942 {
943943Key key: "profile",
944944 type: "string",
945945`model_auto_compact_token_limit` description:
946946 "Default profile applied at startup (equivalent to `--profile`).",
947947Type / Values },
948948 {
949949`number` key: "profiles.<name>.*",
950950 type: "various",
951951Details description:
952952 "Profile-scoped overrides for any of the supported configuration keys.",
953953Token threshold that triggers automatic history compaction (unset uses model defaults). },
954954 {
955955Key key: "profiles.<name>.service_tier",
956956 type: "string",
957957`model_context_window` description: "Profile-scoped service tier preference for new turns.",
958958 },
959959Type / Values {
960960 key: "profiles.<name>.plan_mode_reasoning_effort",
961961`number` type: "none | minimal | low | medium | high | xhigh",
962962 description: "Profile-scoped Plan-mode reasoning override.",
963963Details },
964964 {
965965Context window tokens available to the active model. key: "profiles.<name>.web_search",
966966 type: "disabled | cached | live",
967967Key description:
968968 'Profile-scoped web search mode override (default: `"cached"`).',
969969`model_instructions_file` },
970970 {
971971Type / Values key: "profiles.<name>.personality",
972972 type: "none | friendly | pragmatic",
973973`string (path)` description:
974974 "Profile-scoped communication style override for supported models.",
975975Details },
976976 {
977977Replacement for built-in instructions instead of `AGENTS.md`. key: "profiles.<name>.model_catalog_json",
978978 type: "string (path)",
979979Key description:
980980 "Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).",
981981`model_provider` },
982982 {
983983Type / Values key: "profiles.<name>.model_instructions_file",
984984 type: "string (path)",
985985`string` description:
986986 "Profile-scoped replacement for the built-in instruction file.",
987987Details },
988988 {
989989Provider id from `model_providers` (default: `openai`). key: "profiles.<name>.experimental_use_unified_exec_tool",
990990 type: "boolean",
991991Key description:
992992 "Legacy name for enabling unified exec; prefer `[features].unified_exec`.",
993993`model_providers.<id>.base_url` },
994994 {
995995Type / Values key: "profiles.<name>.oss_provider",
996996 type: "lmstudio | ollama",
997997`string` description: "Profile-scoped OSS provider for `--oss` sessions.",
998998 },
999999Details {
10001000 key: "profiles.<name>.tools_view_image",
10011001API base URL for the model provider. type: "boolean",
10021002 description: "Enable or disable the `view_image` tool in that profile.",
10031003Key },
10041004 {
10051005`model_providers.<id>.env_http_headers` key: "profiles.<name>.analytics.enabled",
10061006 type: "boolean",
10071007Type / Values description: "Profile-scoped analytics enablement override.",
10081008 },
10091009`map<string,string>` {
10101010 key: "profiles.<name>.windows.sandbox",
10111011Details type: "unelevated | elevated",
10121012 description: "Profile-scoped Windows sandbox mode override.",
10131013HTTP headers populated from environment variables when present. },
10141014 {
10151015Key key: "history.persistence",
10161016 type: "save-all | none",
10171017`model_providers.<id>.env_key` description:
10181018 "Control whether Codex saves session transcripts to history.jsonl.",
10191019Type / Values },
10201020 {
10211021`string` key: "tool_output_token_limit",
10221022 type: "number",
10231023Details description:
10241024 "Token budget for storing individual tool/function outputs in history.",
10251025Environment variable supplying the provider API key. },
10261026 {
10271027Key key: "background_terminal_max_timeout",
10281028 type: "number",
10291029`model_providers.<id>.env_key_instructions` description:
10301030 "Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key.",
10311031Type / Values },
10321032 {
10331033`string` key: "history.max_bytes",
10341034 type: "number",
10351035Details description:
10361036 "If set, caps the history file size in bytes by dropping oldest entries.",
10371037Optional setup guidance for the provider API key. },
10381038 {
10391039Key key: "file_opener",
10401040 type: "vscode | vscode-insiders | windsurf | cursor | none",
10411041`model_providers.<id>.experimental_bearer_token` description:
10421042 "URI scheme used to open citations from Codex output (default: `vscode`).",
10431043Type / Values },
10441044 {
10451045`string` key: "otel.environment",
10461046 type: "string",
10471047Details description:
10481048 "Environment tag applied to emitted OpenTelemetry events (default: `dev`).",
10491049Direct bearer token for the provider (discouraged; use `env_key`). },
10501050 {
10511051Key key: "otel.exporter",
10521052 type: "none | otlp-http | otlp-grpc",
10531053`model_providers.<id>.http_headers` description:
10541054 "Select the OpenTelemetry exporter and provide any endpoint metadata.",
10551055Type / Values },
10561056 {
10571057`map<string,string>` key: "otel.trace_exporter",
10581058 type: "none | otlp-http | otlp-grpc",
10591059Details description:
10601060 "Select the OpenTelemetry trace exporter and provide any endpoint metadata.",
10611061Static HTTP headers added to provider requests. },
10621062 {
10631063Key key: "otel.metrics_exporter",
10641064 type: "none | statsig | otlp-http | otlp-grpc",
10651065`model_providers.<id>.name` description:
10661066 "Select the OpenTelemetry metrics exporter (defaults to `statsig`).",
10671067Type / Values },
10681068 {
10691069`string` key: "otel.log_user_prompt",
10701070 type: "boolean",
10711071Details description:
10721072 "Opt in to exporting raw user prompts with OpenTelemetry logs.",
10731073Display name for a custom model provider. },
10741074 {
10751075Key key: "otel.exporter.<id>.endpoint",
10761076 type: "string",
10771077`model_providers.<id>.query_params` description: "Exporter endpoint for OTEL logs.",
10781078 },
10791079Type / Values {
10801080 key: "otel.exporter.<id>.protocol",
10811081`map<string,string>` type: "binary | json",
10821082 description: "Protocol used by the OTLP/HTTP exporter.",
10831083Details },
10841084 {
10851085Extra query parameters appended to provider requests. key: "otel.exporter.<id>.headers",
10861086 type: "map<string,string>",
10871087Key description: "Static headers included with OTEL exporter requests.",
10881088 },
10891089`model_providers.<id>.request_max_retries` {
10901090 key: "otel.trace_exporter.<id>.endpoint",
10911091Type / Values type: "string",
10921092 description: "Trace exporter endpoint for OTEL logs.",
10931093`number` },
10941094 {
10951095Details key: "otel.trace_exporter.<id>.protocol",
10961096 type: "binary | json",
10971097Retry count for HTTP requests to the provider (default: 4). description: "Protocol used by the OTLP/HTTP trace exporter.",
10981098 },
10991099Key {
11001100 key: "otel.trace_exporter.<id>.headers",
11011101`model_providers.<id>.requires_openai_auth` type: "map<string,string>",
11021102 description: "Static headers included with OTEL trace exporter requests.",
11031103Type / Values },
11041104 {
11051105`boolean` key: "otel.exporter.<id>.tls.ca-certificate",
11061106 type: "string",
11071107Details description: "CA certificate path for OTEL exporter TLS.",
11081108 },
11091109The provider uses OpenAI authentication (defaults to false). {
11101110 key: "otel.exporter.<id>.tls.client-certificate",
11111111Key type: "string",
11121112 description: "Client certificate path for OTEL exporter TLS.",
11131113`model_providers.<id>.stream_idle_timeout_ms` },
11141114 {
11151115Type / Values key: "otel.exporter.<id>.tls.client-private-key",
11161116 type: "string",
11171117`number` description: "Client private key path for OTEL exporter TLS.",
11181118 },
11191119Details {
11201120 key: "otel.trace_exporter.<id>.tls.ca-certificate",
11211121Idle timeout for SSE streams in milliseconds (default: 300000). type: "string",
11221122 description: "CA certificate path for OTEL trace exporter TLS.",
11231123Key },
11241124 {
11251125`model_providers.<id>.stream_max_retries` key: "otel.trace_exporter.<id>.tls.client-certificate",
11261126 type: "string",
11271127Type / Values description: "Client certificate path for OTEL trace exporter TLS.",
11281128 },
11291129`number` {
11301130 key: "otel.trace_exporter.<id>.tls.client-private-key",
11311131Details type: "string",
11321132 description: "Client private key path for OTEL trace exporter TLS.",
11331133Retry count for SSE streaming interruptions (default: 5). },
11341134 {
11351135Key key: "tui",
11361136 type: "table",
11371137`model_providers.<id>.wire_api` description:
11381138 "TUI-specific options such as enabling inline desktop notifications.",
11391139Type / Values },
11401140 {
11411141`chat | responses` key: "tui.notifications",
11421142 type: "boolean | array<string>",
11431143Details description:
11441144 "Enable TUI notifications; optionally restrict to specific event types.",
11451145Protocol used by the provider (defaults to `chat` if omitted). },
11461146 {
11471147Key key: "tui.notification_method",
11481148 type: "auto | osc9 | bel",
11491149`model_reasoning_effort` description:
11501150 "Notification method for terminal notifications (default: auto).",
11511151Type / Values },
11521152 {
11531153`minimal | low | medium | high | xhigh` key: "tui.notification_condition",
11541154 type: "unfocused | always",
11551155Details description:
11561156 "Control whether TUI notifications fire only when the terminal is unfocused or regardless of focus. Defaults to `unfocused`.",
11571157Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). },
11581158 {
11591159Key key: "tui.animations",
11601160 type: "boolean",
11611161`model_reasoning_summary` description:
11621162 "Enable terminal animations (welcome screen, shimmer, spinner) (default: true).",
11631163Type / Values },
11641164 {
11651165`auto | concise | detailed | none` key: "tui.alternate_screen",
11661166 type: "auto | always | never",
11671167Details description:
11681168 "Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).",
11691169Select reasoning summary detail or disable summaries entirely. },
11701170 {
11711171Key key: "tui.vim_mode_default",
11721172 type: "boolean",
11731173`model_supports_reasoning_summaries` description:
11741174 "Start the composer in Vim normal mode instead of insert mode (default: false). You can still toggle it per session with `/vim`.",
11751175Type / Values },
11761176 {
11771177`boolean` key: "tui.raw_output_mode",
11781178 type: "boolean",
11791179Details description:
11801180 "Start the TUI in raw scrollback mode for copy-friendly terminal selection (default: false). You can toggle it with `/raw` or the default `alt-r` key binding.",
11811181Force Codex to send or not send reasoning metadata. },
11821182 {
11831183Key key: "tui.show_tooltips",
11841184 type: "boolean",
11851185`model_verbosity` description:
11861186 "Show onboarding tooltips in the TUI welcome screen (default: true).",
11871187Type / Values },
11881188 {
11891189`low | medium | high` key: "tui.status_line",
11901190 type: "array<string> | null",
11911191Details description:
11921192 "Ordered list of TUI footer status-line item identifiers. `null` disables the status line.",
11931193Control GPT-5 Responses API verbosity (defaults to `medium`). },
11941194 {
11951195Key key: "tui.terminal_title",
11961196 type: "array<string> | null",
11971197`notice.hide_full_access_warning` description:
11981198 'Ordered list of terminal window/tab title item identifiers. Defaults to `["spinner", "project"]`; `null` disables title updates.',
11991199Type / Values },
12001200 {
12011201`boolean` key: "tui.theme",
12021202 type: "string",
12031203Details description:
12041204 "Syntax-highlighting theme override (kebab-case theme name).",
12051205Track acknowledgement of the full access warning prompt. },
12061206 {
12071207Key key: "tui.keymap.<context>.<action>",
12081208 type: "string | array<string>",
12091209`notice.hide_gpt-5.1-codex-max_migration_prompt` description:
12101210 "Keyboard shortcut binding for a TUI action. Supported contexts include `global`, `chat`, `composer`, `editor`, `pager`, `list`, and `approval`; context-specific bindings override `tui.keymap.global`.",
12111211Type / Values },
12121212 {
12131213`boolean` key: "tui.keymap.<context>.<action> = []",
12141214 type: "empty array",
12151215Details description:
12161216 "Unbind the action in that keymap context. Key names use normalized strings such as `ctrl-a`, `shift-enter`, `page-down`, or `minus`.",
12171217Track acknowledgement of the gpt-5.1-codex-max migration prompt. },
12181218 {
12191219Key key: "plugins.<plugin>.mcp_servers.<server>.enabled",
12201220 type: "boolean",
12211221`notice.hide_gpt5_1_migration_prompt` description:
12221222 "Enable or disable an MCP server bundled by an installed plugin without changing the plugin manifest.",
12231223Type / Values },
12241224 {
12251225`boolean` key: "plugins.<plugin>.mcp_servers.<server>.default_tools_approval_mode",
12261226 type: "auto | prompt | approve",
12271227Details description:
12281228 "Default approval behavior for tools on a plugin-provided MCP server.",
12291229Track acknowledgement of the GPT-5.1 migration prompt. },
12301230 {
12311231Key key: "plugins.<plugin>.mcp_servers.<server>.enabled_tools",
12321232 type: "array<string>",
12331233`notice.hide_rate_limit_model_nudge` description:
12341234 "Allow list of tools exposed from a plugin-provided MCP server.",
12351235Type / Values },
12361236 {
12371237`boolean` key: "plugins.<plugin>.mcp_servers.<server>.disabled_tools",
12381238 type: "array<string>",
12391239Details description:
12401240 "Deny list applied after `enabled_tools` for a plugin-provided MCP server.",
12411241Track opt-out of the rate limit model switch reminder. },
12421242 {
12431243Key key: "plugins.<plugin>.mcp_servers.<server>.tools.<tool>.approval_mode",
12441244 type: "auto | prompt | approve",
12451245`notice.hide_world_writable_warning` description:
12461246 "Per-tool approval behavior override for a plugin-provided MCP tool.",
12471247Type / Values },
12481248 {
12491249`boolean` key: "tui.model_availability_nux.<model>",
12501250 type: "integer",
12511251Details description: "Internal startup-tooltip state keyed by model slug.",
12521252 },
12531253Track acknowledgement of the Windows world-writable directories warning. {
12541254 key: "hide_agent_reasoning",
12551255Key type: "boolean",
12561256 description:
12571257`notice.model_migrations` "Suppress reasoning events in both the TUI and `codex exec` output.",
12581258 },
12591259Type / Values {
12601260 key: "show_raw_agent_reasoning",
12611261`map<string,string>` type: "boolean",
12621262 description:
12631263Details "Surface raw reasoning content when the active model emits it.",
12641264 },
12651265Track acknowledged model migrations as old->new mappings. {
12661266 key: "disable_paste_burst",
12671267Key type: "boolean",
12681268 description: "Disable burst-paste detection in the TUI.",
12691269`notify` },
12701270 {
12711271Type / Values key: "windows_wsl_setup_acknowledged",
12721272 type: "boolean",
12731273`array<string>` description: "Track Windows onboarding acknowledgement (Windows only).",
12741274 },
12751275Details {
12761276 key: "chatgpt_base_url",
12771277Command invoked for notifications; receives a JSON payload from Codex. type: "string",
12781278 description: "Override the base URL used during the ChatGPT login flow.",
12791279Key },
12801280 {
12811281`oss_provider` key: "cli_auth_credentials_store",
12821282 type: "file | keyring | auto",
12831283Type / Values description:
12841284 "Control where the CLI stores cached credentials (file-based auth.json vs OS keychain).",
12851285`lmstudio | ollama` },
12861286 {
12871287Details key: "mcp_oauth_credentials_store",
12881288 type: "auto | file | keyring",
12891289Default local provider used when running with `--oss` (defaults to prompting if unset). description: "Preferred store for MCP OAuth credentials.",
12901290 },
12911291Key {
12921292 key: "mcp_oauth_callback_port",
12931293`otel.environment` type: "integer",
12941294 description:
12951295Type / Values "Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS.",
12961296 },
12971297`string` {
12981298 key: "mcp_oauth_callback_url",
12991299Details type: "string",
13001300 description:
13011301Environment tag applied to emitted OpenTelemetry events (default: `dev`). "Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port.",
13021302 },
13031303Key {
13041304 key: "experimental_use_unified_exec_tool",
13051305`otel.exporter` type: "boolean",
13061306 description:
13071307Type / Values "Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`.",
13081308 },
13091309`none | otlp-http | otlp-grpc` {
13101310 key: "tools.web_search",
13111311Details type: 'boolean | { context_size = "low|medium|high", allowed_domains = [string], location = { country, region, city, timezone } }',
13121312 description:
13131313Select the OpenTelemetry exporter and provide any endpoint metadata. "Optional web search tool configuration. The legacy boolean form is still accepted, but the object form lets you set search context size, allowed domains, and approximate user location.",
13141314 },
13151315Key {
13161316 key: "tools.view_image",
13171317`otel.exporter.<id>.endpoint` type: "boolean",
13181318 description: "Enable the local-image attachment tool `view_image`.",
13191319Type / Values },
13201320 {
13211321`string` key: "web_search",
13221322 type: "disabled | cached | live",
13231323Details description:
13241324 'Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.',
13251325Exporter endpoint for OTEL logs. },
13261326 {
13271327Key key: "default_permissions",
13281328 type: "string",
13291329`otel.exporter.<id>.headers` description:
13301330 "Name of the default permissions profile to apply to sandboxed tool calls. Built-ins are `:read-only`, `:workspace`, and `:danger-no-sandbox`; custom profile names require matching `[permissions.<name>]` tables.",
13311331Type / Values },
13321332 {
13331333`map<string,string>` key: "permissions.<name>.filesystem",
13341334 type: "table",
13351335Details description:
13361336 "Named filesystem permission profile. Each key is an absolute path or special token such as `:minimal` or `:project_roots`.",
13371337Static headers included with OTEL exporter requests. },
13381338 {
13391339Key key: "permissions.<name>.filesystem.glob_scan_max_depth",
13401340 type: "number",
13411341`otel.exporter.<id>.protocol` description:
13421342 "Maximum depth for expanding deny-read glob patterns on platforms that snapshot matches before sandbox startup. Must be at least `1` when set.",
13431343Type / Values },
13441344 {
13451345`binary | json` key: "permissions.<name>.filesystem.<path-or-glob>",
13461346 type: '"read" | "write" | "none" | table',
13471347Details description:
13481348 'Grant direct access for a path, glob pattern, or special token, or scope nested entries under that root. Use `"none"` to deny reads for matching paths.',
13491349Protocol used by the OTLP/HTTP exporter. },
13501350 {
13511351Key key: 'permissions.<name>.filesystem.":project_roots".<subpath-or-glob>',
13521352 type: '"read" | "write" | "none"',
13531353`otel.exporter.<id>.tls.ca-certificate` description:
13541354 'Scoped filesystem access relative to the detected project roots. Use `"."` for the root itself; glob subpaths such as `"**/*.env"` can deny reads with `"none"`.',
13551355Type / Values },
13561356 {
13571357`string` key: "permissions.<name>.network.enabled",
13581358 type: "boolean",
13591359Details description: "Enable network access for this named permissions profile.",
13601360 },
13611361CA certificate path for OTEL exporter TLS. {
13621362 key: "permissions.<name>.network.proxy_url",
13631363Key type: "string",
13641364 description:
13651365`otel.exporter.<id>.tls.client-certificate` "HTTP listener URL used when this permissions profile enables sandboxed networking.",
13661366 },
13671367Type / Values {
13681368 key: "permissions.<name>.network.enable_socks5",
13691369`string` type: "boolean",
13701370 description:
13711371Details "Expose SOCKS5 support when this permissions profile enables sandboxed networking.",
13721372 },
13731373Client certificate path for OTEL exporter TLS. {
13741374 key: "permissions.<name>.network.socks_url",
13751375Key type: "string",
13761376 description: "SOCKS5 proxy endpoint used by this permissions profile.",
13771377`otel.exporter.<id>.tls.client-private-key` },
13781378 {
13791379Type / Values key: "permissions.<name>.network.enable_socks5_udp",
13801380 type: "boolean",
13811381`string` description: "Allow UDP over the SOCKS5 listener when enabled.",
13821382 },
13831383Details {
13841384 key: "permissions.<name>.network.allow_upstream_proxy",
13851385Client private key path for OTEL exporter TLS. type: "boolean",
13861386 description:
13871387Key "Allow sandboxed networking to chain through another upstream proxy.",
13881388 },
13891389`otel.log_user_prompt` {
13901390 key: "permissions.<name>.network.dangerously_allow_non_loopback_proxy",
13911391Type / Values type: "boolean",
13921392 description:
13931393`boolean` "Permit non-loopback bind addresses for sandboxed networking listeners. Enabling it can expose listeners beyond localhost.",
13941394 },
13951395Details {
13961396 key: "permissions.<name>.network.dangerously_allow_all_unix_sockets",
13971397Opt in to exporting raw user prompts with OpenTelemetry logs. type: "boolean",
13981398 description:
13991399Key "Allow arbitrary Unix socket destinations instead of the default restricted set. Use only in tightly controlled environments.",
14001400 },
14011401`otel.trace_exporter` {
14021402 key: "permissions.<name>.network.domains",
14031403Type / Values type: "map<string, allow | deny>",
14041404 description:
14051405`none | otlp-http | otlp-grpc` "Domain rules for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules. `deny` wins on conflicts.",
14061406 },
14071407Details {
14081408 key: "permissions.<name>.network.unix_sockets",
14091409Select the OpenTelemetry trace exporter and provide any endpoint metadata. type: "map<string, allow | none>",
14101410 description:
14111411Key "Unix socket rules for sandboxed networking. Use socket paths as keys, with `allow` or `none` values.",
14121412 },
14131413`otel.trace_exporter.<id>.endpoint` {
14141414 key: "permissions.<name>.network.allow_local_binding",
14151415Type / Values type: "boolean",
14161416 description:
14171417`string` "Permit broader local/private-network access through sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",
14181418 },
14191419Details {
14201420 key: "projects.<path>.trust_level",
14211421Trace exporter endpoint for OTEL logs. type: "string",
14221422 description:
14231423Key 'Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers, including project-local config, hooks, and rules.',
14241424 },
14251425`otel.trace_exporter.<id>.headers` {
14261426 key: "notice.hide_full_access_warning",
14271427Type / Values type: "boolean",
14281428 description: "Track acknowledgement of the full access warning prompt.",
14291429`map<string,string>` },
14301430 {
14311431Details key: "notice.hide_world_writable_warning",
14321432 type: "boolean",
14331433Static headers included with OTEL trace exporter requests. description:
14341434 "Track acknowledgement of the Windows world-writable directories warning.",
14351435Key },
14361436 {
14371437`otel.trace_exporter.<id>.protocol` key: "notice.hide_rate_limit_model_nudge",
14381438 type: "boolean",
14391439Type / Values description: "Track opt-out of the rate limit model switch reminder.",
14401440 },
14411441`binary | json` {
14421442 key: "notice.hide_gpt5_1_migration_prompt",
14431443Details type: "boolean",
14441444 description: "Track acknowledgement of the GPT-5.1 migration prompt.",
14451445Protocol used by the OTLP/HTTP trace exporter. },
14461446 {
14471447Key key: "notice.hide_gpt-5.1-codex-max_migration_prompt",
14481448 type: "boolean",
14491449`otel.trace_exporter.<id>.tls.ca-certificate` description:
14501450 "Track acknowledgement of the gpt-5.1-codex-max migration prompt.",
14511451Type / Values },
14521452 {
14531453`string` key: "notice.model_migrations",
14541454 type: "map<string,string>",
14551455Details description: "Track acknowledged model migrations as old->new mappings.",
14561456 },
14571457CA certificate path for OTEL trace exporter TLS. {
14581458 key: "forced_login_method",
14591459Key type: "chatgpt | api",
14601460 description: "Restrict Codex to a specific authentication method.",
14611461`otel.trace_exporter.<id>.tls.client-certificate` },
14621462 {
14631463Type / Values key: "forced_chatgpt_workspace_id",
14641464 type: "string (uuid)",
14651465`string` description: "Limit ChatGPT logins to a specific workspace identifier.",
14661466 },
14671467Details ]}
14681468 client:load
14691469Client certificate path for OTEL trace exporter TLS./>
1470
1471Key
1472
1473`otel.trace_exporter.<id>.tls.client-private-key`
1474
1475Type / Values
1476
1477`string`
1478
1479Details
1480
1481Client private key path for OTEL trace exporter TLS.
1482
1483Key
1484
1485`personality`
1486
1487Type / Values
1488
1489`none | friendly | pragmatic`
1490
1491Details
1492
1493Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.
1494
1495Key
1496
1497`profile`
1498
1499Type / Values
1500
1501`string`
1502
1503Details
1504
1505Default profile applied at startup (equivalent to `--profile`).
1506
1507Key
1508
1509`profiles.<name>.*`
1510
1511Type / Values
1512
1513`various`
1514
1515Details
1516
1517Profile-scoped overrides for any of the supported configuration keys.
1518
1519Key
1520
1521`profiles.<name>.experimental_use_freeform_apply_patch`
1522
1523Type / Values
1524
1525`boolean`
1526
1527Details
1528
1529Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.
1530
1531Key
1532
1533`profiles.<name>.experimental_use_unified_exec_tool`
1534
1535Type / Values
1536
1537`boolean`
1538
1539Details
1540
1541Legacy name for enabling unified exec; prefer `[features].unified_exec`.
1542
1543Key
1544
1545`profiles.<name>.include_apply_patch_tool`
1546
1547Type / Values
1548
1549`boolean`
1550
1551Details
1552
1553Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.
1554
1555Key
1556
1557`profiles.<name>.oss_provider`
1558
1559Type / Values
1560
1561`lmstudio | ollama`
1562
1563Details
1564
1565Profile-scoped OSS provider for `--oss` sessions.
1566
1567Key
1568
1569`profiles.<name>.personality`
1570
1571Type / Values
1572
1573`none | friendly | pragmatic`
1574
1575Details
1576
1577Profile-scoped communication style override for supported models.
1578
1579Key
1580
1581`profiles.<name>.web_search`
1582
1583Type / Values
1584
1585`disabled | cached | live`
1586
1587Details
1588
1589Profile-scoped web search mode override (default: `"cached"`).
1590
1591Key
1592
1593`project_doc_fallback_filenames`
1594
1595Type / Values
1596
1597`array<string>`
1598
1599Details
1600
1601Additional filenames to try when `AGENTS.md` is missing.
1602
1603Key
1604
1605`project_doc_max_bytes`
1606
1607Type / Values
1608
1609`number`
1610
1611Details
1612
1613Maximum bytes read from `AGENTS.md` when building project instructions.
1614
1615Key
1616
1617`project_root_markers`
1618
1619Type / Values
1620
1621`array<string>`
1622
1623Details
1624
1625List of project root marker filenames; used when searching parent directories for the project root.
1626
1627Key
1628
1629`projects.<path>.trust_level`
1630
1631Type / Values
1632
1633`string`
1634
1635Details
1636
1637Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers.
1638
1639Key
1640
1641`review_model`
1642
1643Type / Values
1644
1645`string`
1646
1647Details
1648
1649Optional model override used by `/review` (defaults to the current session model).
1650
1651Key
1652
1653`sandbox_mode`
1654
1655Type / Values
1656
1657`read-only | workspace-write | danger-full-access`
1658
1659Details
1660
1661Sandbox policy for filesystem and network access during command execution.
1662
1663Key
1664
1665`sandbox_workspace_write.exclude_slash_tmp`
1666
1667Type / Values
1668
1669`boolean`
1670
1671Details
1672
1673Exclude `/tmp` from writable roots in workspace-write mode.
1674
1675Key
1676
1677`sandbox_workspace_write.exclude_tmpdir_env_var`
1678
1679Type / Values
1680
1681`boolean`
1682
1683Details
1684
1685Exclude `$TMPDIR` from writable roots in workspace-write mode.
1686
1687Key
1688
1689`sandbox_workspace_write.network_access`
1690
1691Type / Values
1692
1693`boolean`
1694
1695Details
1696
1697Allow outbound network access inside the workspace-write sandbox.
1698
1699Key
1700
1701`sandbox_workspace_write.writable_roots`
1702
1703Type / Values
1704
1705`array<string>`
1706
1707Details
1708
1709Additional writable roots when `sandbox_mode = "workspace-write"`.
1710
1711Key
1712
1713`shell_environment_policy.exclude`
1714
1715Type / Values
1716
1717`array<string>`
1718
1719Details
1720
1721Glob patterns for removing environment variables after the defaults.
1722
1723Key
1724
1725`shell_environment_policy.experimental_use_profile`
1726
1727Type / Values
1728
1729`boolean`
1730
1731Details
1732
1733Use the user shell profile when spawning subprocesses.
1734
1735Key
1736
1737`shell_environment_policy.ignore_default_excludes`
1738
1739Type / Values
1740
1741`boolean`
1742
1743Details
1744
1745Keep variables containing KEY/SECRET/TOKEN before other filters run.
1746
1747Key
1748
1749`shell_environment_policy.include_only`
1750
1751Type / Values
1752
1753`array<string>`
1754
1755Details
1756
1757Whitelist of patterns; when set only matching variables are kept.
1758
1759Key
1760
1761`shell_environment_policy.inherit`
1762
1763Type / Values
1764
1765`all | core | none`
1766
1767Details
1768
1769Baseline environment inheritance when spawning subprocesses.
1770
1771Key
1772
1773`shell_environment_policy.set`
1774
1775Type / Values
1776
1777`map<string,string>`
1778
1779Details
1780
1781Explicit environment overrides injected into every subprocess.
1782
1783Key
1784
1785`show_raw_agent_reasoning`
1786
1787Type / Values
1788
1789`boolean`
1790
1791Details
1792
1793Surface raw reasoning content when the active model emits it.
1794
1795Key
1796
1797`skills.config`
1798
1799Type / Values
1800
1801`array<object>`
1802
1803Details
1804
1805Per-skill enablement overrides stored in config.toml.
1806
1807Key
1808
1809`skills.config.<index>.enabled`
1810
1811Type / Values
1812
1813`boolean`
1814
1815Details
1816
1817Enable or disable the referenced skill.
1818
1819Key
1820
1821`skills.config.<index>.path`
1822
1823Type / Values
1824
1825`string (path)`
1826
1827Details
1828
1829Path to a skill folder containing `SKILL.md`.
1830
1831Key
1832
1833`suppress_unstable_features_warning`
1834
1835Type / Values
1836
1837`boolean`
1838
1839Details
1840
1841Suppress the warning that appears when under-development feature flags are enabled.
1842
1843Key
1844
1845`tool_output_token_limit`
1846
1847Type / Values
1848
1849`number`
1850
1851Details
1852
1853Token budget for storing individual tool/function outputs in history.
1854
1855Key
1856
1857`tools.web_search`
1858
1859Type / Values
1860
1861`boolean`
1862
1863Details
1864
1865Deprecated legacy toggle for web search; prefer the top-level `web_search` setting.
1866
1867Key
1868
1869`tui`
1870
1871Type / Values
1872
1873`table`
1874
1875Details
1876
1877TUI-specific options such as enabling inline desktop notifications.
1878
1879Key
1880
1881`tui.alternate_screen`
1882
1883Type / Values
1884
1885`auto | always | never`
1886
1887Details
1888
1889Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).
1890
1891Key
1892
1893`tui.animations`
1894
1895Type / Values
1896
1897`boolean`
1898
1899Details
1900
1901Enable terminal animations (welcome screen, shimmer, spinner) (default: true).
1902
1903Key
1904
1905`tui.notification_method`
1906
1907Type / Values
1908
1909`auto | osc9 | bel`
1910
1911Details
1912
1913Notification method for unfocused terminal notifications (default: auto).
1914
1915Key
1916
1917`tui.notifications`
1918
1919Type / Values
1920
1921`boolean | array<string>`
1922
1923Details
1924
1925Enable TUI notifications; optionally restrict to specific event types.
1926
1927Key
1928
1929`tui.show_tooltips`
1930
1931Type / Values
1932
1933`boolean`
1934
1935Details
1936
1937Show onboarding tooltips in the TUI welcome screen (default: true).
1938
1939Key
1940
1941`tui.status_line`
1942
1943Type / Values
1944
1945`array<string> | null`
1946
1947Details
1948
1949Ordered list of TUI footer status-line item identifiers. `null` disables the status line.
1950
1951Key
1952
1953`web_search`
1954
1955Type / Values
1956
1957`disabled | cached | live`
1958
1959Details
1960
1961Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.
1962
1963Key
1964
1965`windows_wsl_setup_acknowledged`
1966
1967Type / Values
1968
1969`boolean`
1970
1971Details
1972
1973Track Windows onboarding acknowledgement (Windows only).
1974
1975Expand to view all
1976 1470
1977You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).1471You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).
1978 1472
1986 1480
1987## `requirements.toml`1481## `requirements.toml`
1988 1482
19891483`requirements.toml` is an admin-enforced configuration file that constrains security-sensitive settings users can’t override. For details, locations, and examples, see [Admin-enforced requirements](https://developers.openai.com/codex/security#admin-enforced-requirements-requirementstoml).`requirements.toml` is an admin-enforced configuration file that constrains security-sensitive settings users can't override. For details, locations, and examples, see [Admin-enforced requirements](https://developers.openai.com/codex/enterprise/managed-configuration#admin-enforced-requirements-requirementstoml).
1990 1484
1991For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched1485For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched
1992requirements. See the security page for precedence details.1486requirements. See the security page for precedence details.
1993 1487
19941488| Key | Type / Values | Details |Use `[features]` in `requirements.toml` to pin feature flags by the same
19951489| --- | --- | --- |canonical keys that `config.toml` uses. Omitted keys remain unconstrained.
19961490| `allowed_approval_policies` | `array<string>` | Allowed values for `approval\_policy`. |
19971491| `allowed_sandbox_modes` | `array<string>` | Allowed values for `sandbox_mode`. |<ConfigTable
19981492| `allowed_web_search_modes` | `array<string>` | Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. | options={[
19991493| `mcp_servers` | `table` | Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. | {
20001494| `mcp_servers.<id>.identity` | `table` | Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). | key: "allowed_approval_policies",
20011495| `mcp_servers.<id>.identity.command` | `string` | Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. | type: "array<string>",
20021496| `mcp_servers.<id>.identity.url` | `string` | Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. | description:
20031497| `rules` | `table` | Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. | "Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `granular`).",
20041498| `rules.prefix_rules` | `array<table>` | List of enforced prefix rules. Each rule must include `pattern` and `decision`. | },
20051499| `rules.prefix_rules[].decision` | `prompt | forbidden` | Required. Requirements rules can only prompt or forbid (not allow). | {
20061500| `rules.prefix_rules[].justification` | `string` | Optional non-empty rationale surfaced in approval prompts or rejection messages. | key: "allowed_approvals_reviewers",
20071501| `rules.prefix_rules[].pattern` | `array<table>` | Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. | type: "array<string>",
20081502| `rules.prefix_rules[].pattern[].any_of` | `array<string>` | A list of allowed alternative tokens at this position. | description:
20091503| `rules.prefix_rules[].pattern[].token` | `string` | A single literal token at this position. | "Allowed values for `approvals_reviewer`, such as `user` and `auto_review`.",
20101504 },
20111505Key {
20121506 key: "guardian_policy_config",
20131507`allowed_approval_policies` type: "string",
20141508 description:
20151509Type / Values "Managed Markdown policy instructions for automatic review. This takes precedence over local `[auto_review].policy`. Blank values are ignored.",
20161510 },
20171511`array<string>` {
20181512 key: "allowed_sandbox_modes",
20191513Details type: "array<string>",
20201514 description: "Allowed values for `sandbox_mode`.",
20211515Allowed values for `approval\_policy`. },
20221516 {
20231517Key key: "remote_sandbox_config",
20241518 type: "array<table>",
20251519`allowed_sandbox_modes` description:
20261520 "Host-specific sandbox requirements. The first entry whose `hostname_patterns` match the resolved host name overrides top-level `allowed_sandbox_modes` for that requirements source. Host-specific entries currently override sandbox modes only.",
20271521Type / Values },
20281522 {
20291523`array<string>` key: "remote_sandbox_config[].hostname_patterns",
20301524 type: "array<string>",
20311525Details description:
20321526 "Case-insensitive host name patterns. Supports `*` for any sequence of characters and `?` for one character.",
20331527Allowed values for `sandbox_mode`. },
20341528 {
20351529Key key: "remote_sandbox_config[].allowed_sandbox_modes",
20361530 type: "array<string>",
20371531`allowed_web_search_modes` description:
20381532 "Allowed sandbox modes to apply when this host-specific entry matches.",
20391533Type / Values },
20401534 {
20411535`array<string>` key: "allowed_web_search_modes",
20421536 type: "array<string>",
20431537Details description:
20441538 "Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`.",
20451539Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. },
20461540 {
20471541Key key: "features",
20481542 type: "table",
20491543`mcp_servers` description:
20501544 "Pinned feature values keyed by the canonical names from `config.toml`'s `[features]` table.",
20511545Type / Values },
20521546 {
20531547`table` key: "features.<name>",
20541548 type: "boolean",
20551549Details description:
20561550 "Require a specific canonical feature key to stay enabled or disabled.",
20571551Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. },
20581552 {
20591553Key key: "features.in_app_browser",
20601554 type: "boolean",
20611555`mcp_servers.<id>.identity` description:
20621556 "Set to `false` in `requirements.toml` to disable the in-app browser pane.",
20631557Type / Values },
20641558 {
20651559`table` key: "features.browser_use",
20661560 type: "boolean",
20671561Details description:
20681562 "Set to `false` in `requirements.toml` to disable Browser Use and Browser Agent availability.",
20691563Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). },
20701564 {
20711565Key key: "features.computer_use",
20721566 type: "boolean",
20731567`mcp_servers.<id>.identity.command` description:
20741568 "Set to `false` in `requirements.toml` to disable Computer Use availability and related install or enablement flows.",
20751569Type / Values },
20761570 {
20771571`string` key: "experimental_network",
20781572 type: "table",
20791573Details description:
20801574 "Network access requirements enforced from `requirements.toml`. These constraints are separate from `features.network_proxy` and can configure sandboxed networking without the user feature flag.",
20811575Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. },
20821576 {
20831577Key key: "experimental_network.enabled",
20841578 type: "boolean",
20851579`mcp_servers.<id>.identity.url` description:
20861580 "Enable sandboxed networking requirements. This does not grant network access when the active sandbox keeps command networking off.",
20871581Type / Values },
20881582 {
20891583`string` key: "experimental_network.http_port",
20901584 type: "integer",
20911585Details description:
20921586 "Loopback HTTP listener port to use for `[experimental_network]` requirements.",
20931587Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. },
20941588 {
20951589Key key: "experimental_network.socks_port",
20961590 type: "integer",
20971591`rules` description:
20981592 "Loopback SOCKS5 listener port to use for `[experimental_network]` requirements.",
20991593Type / Values },
21001594 {
21011595`table` key: "experimental_network.allow_upstream_proxy",
21021596 type: "boolean",
21031597Details description:
21041598 "Allow sandboxed networking to chain through an upstream proxy from the environment.",
21051599Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. },
21061600 {
21071601Key key: "experimental_network.dangerously_allow_non_loopback_proxy",
21081602 type: "boolean",
21091603`rules.prefix_rules` description:
21101604 "Permit non-loopback listener addresses for `[experimental_network]` requirements. Enabling it can expose listeners beyond localhost.",
21111605Type / Values },
21121606 {
21131607`array<table>` key: "experimental_network.dangerously_allow_all_unix_sockets",
21141608 type: "boolean",
21151609Details description:
21161610 "Permit arbitrary Unix socket destinations instead of allowlist-only access. Use only in tightly controlled environments.",
21171611List of enforced prefix rules. Each rule must include `pattern` and `decision`. },
21181612 {
21191613Key key: "experimental_network.domains",
21201614 type: "map<string, allow | deny>",
21211615`rules.prefix_rules[].decision` description:
21221616 "Map-shaped administrator domain policy for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. `deny` wins on conflicts. Do not combine this with `experimental_network.allowed_domains` or `experimental_network.denied_domains`.",
21231617Type / Values },
21241618 {
21251619`prompt | forbidden` key: "experimental_network.allowed_domains",
21261620 type: "array<string>",
21271621Details description:
21281622 "List-shaped administrator allow rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",
21291623Required. Requirements rules can only prompt or forbid (not allow). },
21301624 {
21311625Key key: "experimental_network.denied_domains",
21321626 type: "array<string>",
21331627`rules.prefix_rules[].justification` description:
21341628 "List-shaped administrator deny rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",
21351629Type / Values },
21361630 {
21371631`string` key: "experimental_network.managed_allowed_domains_only",
21381632 type: "boolean",
21391633Details description:
21401634 "When `true`, only administrator-managed allow rules remain effective while sandboxed networking requirements are active; user allowlist additions are ignored. Without managed allow rules, user-added domain allow rules do not remain effective.",
21411635Optional non-empty rationale surfaced in approval prompts or rejection messages. },
21421636 {
21431637Key key: "experimental_network.unix_sockets",
21441638 type: "map<string, allow | none>",
21451639`rules.prefix_rules[].pattern` description:
21461640 "Administrator-managed Unix socket policy for sandboxed networking.",
21471641Type / Values },
21481642 {
21491643`array<table>` key: "experimental_network.allow_local_binding",
21501644 type: "boolean",
21511645Details description:
21521646 "Permit broader local/private-network access for sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",
21531647Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. },
21541648 {
21551649Key key: "hooks",
21561650 type: "table",
21571651`rules.prefix_rules[].pattern[].any_of` description:
21581652 "Admin-enforced managed lifecycle hooks. Requires a managed hook directory and uses the same event schema as inline `[hooks]` in `config.toml`.",
21591653Type / Values },
21601654 {
21611655`array<string>` key: "hooks.managed_dir",
21621656 type: "string (absolute path)",
21631657Details description:
21641658 "Directory containing managed hook scripts on macOS and Linux. Codex validates that it is absolute and exists before loading managed hooks.",
21651659A list of allowed alternative tokens at this position. },
21661660 {
21671661Key key: "hooks.windows_managed_dir",
21681662 type: "string (absolute path)",
21691663`rules.prefix_rules[].pattern[].token` description:
21701664 "Directory containing managed hook scripts on Windows. Codex validates that it is absolute and exists before loading managed hooks.",
21711665Type / Values },
21721666 {
21731667`string` key: "hooks.<Event>",
21741668 type: "array<table>",
21751669Details description:
21761670 "Matcher groups for a hook event such as `PreToolUse`, `PermissionRequest`, `PostToolUse`, `SessionStart`, `UserPromptSubmit`, or `Stop`.",
21771671A single literal token at this position. },
21781672 {
21791673Expand to view all key: "hooks.<Event>[].hooks",
1674 type: "array<table>",
1675 description:
1676 "Hook handlers for a matcher group. Command hooks are currently supported; prompt and agent hook handlers are parsed but skipped.",
1677 },
1678 {
1679 key: "permissions.filesystem.deny_read",
1680 type: "array<string>",
1681 description:
1682 "Admin-enforced filesystem read denials. Entries can be paths or glob patterns, and users cannot weaken them with local config.",
1683 },
1684 {
1685 key: "mcp_servers",
1686 type: "table",
1687 description:
1688 "Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled.",
1689 },
1690 {
1691 key: "mcp_servers.<id>.identity",
1692 type: "table",
1693 description:
1694 "Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP).",
1695 },
1696 {
1697 key: "mcp_servers.<id>.identity.command",
1698 type: "string",
1699 description:
1700 "Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command.",
1701 },
1702 {
1703 key: "mcp_servers.<id>.identity.url",
1704 type: "string",
1705 description:
1706 "Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL.",
1707 },
1708 {
1709 key: "rules",
1710 type: "table",
1711 description:
1712 "Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive.",
1713 },
1714 {
1715 key: "rules.prefix_rules",
1716 type: "array<table>",
1717 description:
1718 "List of enforced prefix rules. Each rule must include `pattern` and `decision`.",
1719 },
1720 {
1721 key: "rules.prefix_rules[].pattern",
1722 type: "array<table>",
1723 description:
1724 "Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`.",
1725 },
1726 {
1727 key: "rules.prefix_rules[].pattern[].token",
1728 type: "string",
1729 description: "A single literal token at this position.",
1730 },
1731 {
1732 key: "rules.prefix_rules[].pattern[].any_of",
1733 type: "array<string>",
1734 description: "A list of allowed alternative tokens at this position.",
1735 },
1736 {
1737 key: "rules.prefix_rules[].decision",
1738 type: "prompt | forbidden",
1739 description:
1740 "Required. Requirements rules can only prompt or forbid (not allow).",
1741 },
1742 {
1743 key: "rules.prefix_rules[].justification",
1744 type: "string",
1745 description:
1746 "Optional non-empty rationale surfaced in approval prompts or rejection messages.",
1747 },
1748 ]}
1749 client:load
1750/>