config-reference.md +1725 −2156
6 6
7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.
8 8
99For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/security#network-access).Project-scoped config can't override machine-local provider, auth,
1010 notification, profile, or telemetry routing keys. Codex ignores
1111| Key | Type / Values | Details |`openai_base_url`, `chatgpt_base_url`, `model_provider`, `model_providers`,
1212| --- | --- | --- |`notify`, `profile`, `profiles`, `experimental_realtime_ws_base_url`, and
1313| `agents.<name>.config_file` | `string (path)` | Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. |`otel` when they appear in a project-local `.codex/config.toml`; put those in
1414| `agents.<name>.description` | `string` | Role guidance shown to Codex when choosing and spawning that agent type. |user-level config instead.
1515| `agents.max_threads` | `number` | Maximum number of agent threads that can be open concurrently. |
1616| `approval_policy` | `untrusted | on-request | never` | Controls when Codex pauses for approval before executing commands. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. |For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/agent-approvals-security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/agent-approvals-security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/agent-approvals-security#network-access).
1717| `apps.<id>.disabled_reason` | `unknown | user` | Optional reason attached when an app/connector is disabled. |
1818| `apps.<id>.enabled` | `boolean` | Enable or disable a specific app/connector by id (default: true). |<ConfigTable
1919| `chatgpt_base_url` | `string` | Override the base URL used during the ChatGPT login flow. | options={[
2020| `check_for_update_on_startup` | `boolean` | Check for Codex updates on startup (set to false only when updates are centrally managed). | {
2121| `cli_auth_credentials_store` | `file | keyring | auto` | Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). | key: "model",
2222| `compact_prompt` | `string` | Inline override for the history compaction prompt. | type: "string",
2323| `developer_instructions` | `string` | Additional developer instructions injected into the session (optional). | description: "Model to use (e.g., `gpt-5.5`).",
2424| `disable_paste_burst` | `boolean` | Disable burst-paste detection in the TUI. | },
2525| `experimental_compact_prompt_file` | `string (path)` | Load the compaction prompt override from a file (experimental). | {
2626| `experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. | key: "review_model",
2727| `experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. | type: "string",
2828| `features.apply_patch_freeform` | `boolean` | Expose the freeform `apply_patch` tool (experimental). | description:
2929| `features.apps` | `boolean` | Enable ChatGPT Apps/connectors support (experimental). | "Optional model override used by `/review` (defaults to the current session model).",
3030| `features.apps_mcp_gateway` | `boolean` | Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). | },
3131| `features.child_agents_md` | `boolean` | Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). | {
3232| `features.collaboration_modes` | `boolean` | Enable collaboration modes such as plan mode (stable; on by default). | key: "model_provider",
3333| `features.elevated_windows_sandbox` | `boolean` | Enable the elevated Windows sandbox pipeline (experimental). | type: "string",
3434| `features.experimental_windows_sandbox` | `boolean` | Run the Windows restricted-token sandbox (experimental). | description: "Provider id from `model_providers` (default: `openai`).",
3535| `features.multi_agent` | `boolean` | Enable multi-agent collaboration tools (`spawn\_agent`, `send\_input`, `resume\_agent`, `wait`, and `close\_agent`) (experimental; off by default). | },
3636| `features.personality` | `boolean` | Enable personality selection controls (stable; on by default). | {
3737| `features.powershell_utf8` | `boolean` | Force PowerShell UTF-8 output (defaults to true). | key: "openai_base_url",
3838| `features.remote_models` | `boolean` | Refresh remote model list before showing readiness (experimental). | type: "string",
3939| `features.request_rule` | `boolean` | Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). | description:
4040| `features.runtime_metrics` | `boolean` | Show runtime metrics summary in TUI turn separators (experimental). | "Base URL override for the built-in `openai` model provider.",
4141| `features.search_tool` | `boolean` | Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). | },
4242| `features.shell_snapshot` | `boolean` | Snapshot shell environment to speed up repeated commands (beta). | {
4343| `features.shell_tool` | `boolean` | Enable the default `shell` tool for running commands (stable; on by default). | key: "model_context_window",
4444| `features.unified_exec` | `boolean` | Use the unified PTY-backed exec tool (beta). | type: "number",
4545| `features.use_linux_sandbox_bwrap` | `boolean` | Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). | description: "Context window tokens available to the active model.",
4646| `features.web_search` | `boolean` | Deprecated legacy toggle; prefer the top-level `web_search` setting. | },
4747| `features.web_search_cached` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. | {
4848| `features.web_search_request` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. | key: "model_auto_compact_token_limit",
4949| `feedback.enabled` | `boolean` | Enable feedback submission via `/feedback` across Codex surfaces (default: true). | type: "number",
5050| `file_opener` | `vscode | vscode-insiders | windsurf | cursor | none` | URI scheme used to open citations from Codex output (default: `vscode`). | description:
5151| `forced_chatgpt_workspace_id` | `string (uuid)` | Limit ChatGPT logins to a specific workspace identifier. | "Token threshold that triggers automatic history compaction (unset uses model defaults).",
5252| `forced_login_method` | `chatgpt | api` | Restrict Codex to a specific authentication method. | },
5353| `hide_agent_reasoning` | `boolean` | Suppress reasoning events in both the TUI and `codex exec` output. | {
5454| `history.max_bytes` | `number` | If set, caps the history file size in bytes by dropping oldest entries. | key: "model_catalog_json",
5555| `history.persistence` | `save-all | none` | Control whether Codex saves session transcripts to history.jsonl. | type: "string (path)",
5656| `include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | description:
5757| `instructions` | `string` | Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. | "Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile.",
5858| `log_dir` | `string (path)` | Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. | },
5959| `mcp_oauth_callback_port` | `integer` | Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. | {
6060| `mcp_oauth_credentials_store` | `auto | file | keyring` | Preferred store for MCP OAuth credentials. | key: "oss_provider",
6161| `mcp_servers.<id>.args` | `array<string>` | Arguments passed to the MCP stdio server command. | type: "lmstudio | ollama",
6262| `mcp_servers.<id>.bearer_token_env_var` | `string` | Environment variable sourcing the bearer token for an MCP HTTP server. | description:
6363| `mcp_servers.<id>.command` | `string` | Launcher command for an MCP stdio server. | "Default local provider used when running with `--oss` (defaults to prompting if unset).",
6464| `mcp_servers.<id>.cwd` | `string` | Working directory for the MCP stdio server process. | },
6565| `mcp_servers.<id>.disabled_tools` | `array<string>` | Deny list applied after `enabled_tools` for the MCP server. | {
6666| `mcp_servers.<id>.enabled` | `boolean` | Disable an MCP server without removing its configuration. | key: "approval_policy",
6767| `mcp_servers.<id>.enabled_tools` | `array<string>` | Allow list of tool names exposed by the MCP server. | type: "untrusted | on-request | never | { granular = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool, request_permissions = bool, skill_approval = bool } }",
6868| `mcp_servers.<id>.env` | `map<string,string>` | Environment variables forwarded to the MCP stdio server. | description:
6969| `mcp_servers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables for an MCP HTTP server. | "Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { granular = { ... } }` to allow or auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs.",
7070| `mcp_servers.<id>.env_vars` | `array<string>` | Additional environment variables to whitelist for an MCP stdio server. | },
7171| `mcp_servers.<id>.http_headers` | `map<string,string>` | Static HTTP headers included with each MCP HTTP request. | {
7272| `mcp_servers.<id>.required` | `boolean` | When true, fail startup/resume if this enabled MCP server cannot initialize. | key: "approval_policy.granular.sandbox_approval",
7373| `mcp_servers.<id>.startup_timeout_ms` | `number` | Alias for `startup_timeout_sec` in milliseconds. | type: "boolean",
7474| `mcp_servers.<id>.startup_timeout_sec` | `number` | Override the default 10s startup timeout for an MCP server. | description:
7575| `mcp_servers.<id>.tool_timeout_sec` | `number` | Override the default 60s per-tool timeout for an MCP server. | "When `true`, sandbox escalation approval prompts are allowed to surface.",
7676| `mcp_servers.<id>.url` | `string` | Endpoint for an MCP streamable HTTP server. | },
7777| `model` | `string` | Model to use (e.g., `gpt-5-codex`). | {
7878| `model_auto_compact_token_limit` | `number` | Token threshold that triggers automatic history compaction (unset uses model defaults). | key: "approval_policy.granular.rules",
7979| `model_context_window` | `number` | Context window tokens available to the active model. | type: "boolean",
8080| `model_instructions_file` | `string (path)` | Replacement for built-in instructions instead of `AGENTS.md`. | description:
8181| `model_provider` | `string` | Provider id from `model_providers` (default: `openai`). | "When `true`, approvals triggered by execpolicy `prompt` rules are allowed to surface.",
8282| `model_providers.<id>.base_url` | `string` | API base URL for the model provider. | },
8383| `model_providers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables when present. | {
8484| `model_providers.<id>.env_key` | `string` | Environment variable supplying the provider API key. | key: "approval_policy.granular.mcp_elicitations",
8585| `model_providers.<id>.env_key_instructions` | `string` | Optional setup guidance for the provider API key. | type: "boolean",
8686| `model_providers.<id>.experimental_bearer_token` | `string` | Direct bearer token for the provider (discouraged; use `env_key`). | description:
8787| `model_providers.<id>.http_headers` | `map<string,string>` | Static HTTP headers added to provider requests. | "When `true`, MCP elicitation prompts are allowed to surface instead of being auto-rejected.",
8888| `model_providers.<id>.name` | `string` | Display name for a custom model provider. | },
8989| `model_providers.<id>.query_params` | `map<string,string>` | Extra query parameters appended to provider requests. | {
9090| `model_providers.<id>.request_max_retries` | `number` | Retry count for HTTP requests to the provider (default: 4). | key: "approval_policy.granular.request_permissions",
9191| `model_providers.<id>.requires_openai_auth` | `boolean` | The provider uses OpenAI authentication (defaults to false). | type: "boolean",
9292| `model_providers.<id>.stream_idle_timeout_ms` | `number` | Idle timeout for SSE streams in milliseconds (default: 300000). | description:
9393| `model_providers.<id>.stream_max_retries` | `number` | Retry count for SSE streaming interruptions (default: 5). | "When `true`, prompts from the `request_permissions` tool are allowed to surface.",
9494| `model_providers.<id>.wire_api` | `chat | responses` | Protocol used by the provider (defaults to `chat` if omitted). | },
9595| `model_reasoning_effort` | `minimal | low | medium | high | xhigh` | Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). | {
9696| `model_reasoning_summary` | `auto | concise | detailed | none` | Select reasoning summary detail or disable summaries entirely. | key: "approval_policy.granular.skill_approval",
9797| `model_supports_reasoning_summaries` | `boolean` | Force Codex to send or not send reasoning metadata. | type: "boolean",
9898| `model_verbosity` | `low | medium | high` | Control GPT-5 Responses API verbosity (defaults to `medium`). | description:
9999| `notice.hide_full_access_warning` | `boolean` | Track acknowledgement of the full access warning prompt. | "When `true`, skill-script approval prompts are allowed to surface.",
100100| `notice.hide_gpt-5.1-codex-max_migration_prompt` | `boolean` | Track acknowledgement of the gpt-5.1-codex-max migration prompt. | },
101101| `notice.hide_gpt5_1_migration_prompt` | `boolean` | Track acknowledgement of the GPT-5.1 migration prompt. | {
102102| `notice.hide_rate_limit_model_nudge` | `boolean` | Track opt-out of the rate limit model switch reminder. | key: "approvals_reviewer",
103103| `notice.hide_world_writable_warning` | `boolean` | Track acknowledgement of the Windows world-writable directories warning. | type: "user | auto_review",
104104| `notice.model_migrations` | `map<string,string>` | Track acknowledged model migrations as old->new mappings. | description:
105105| `notify` | `array<string>` | Command invoked for notifications; receives a JSON payload from Codex. | "Who reviews eligible approval prompts under `on-request` or granular approval policies. Defaults to `user`; `auto_review` uses the reviewer subagent. This setting doesn't change sandboxing or review actions already allowed inside the sandbox.",
106106| `oss_provider` | `lmstudio | ollama` | Default local provider used when running with `--oss` (defaults to prompting if unset). | },
107107| `otel.environment` | `string` | Environment tag applied to emitted OpenTelemetry events (default: `dev`). | {
108108| `otel.exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry exporter and provide any endpoint metadata. | key: "auto_review.policy",
109109| `otel.exporter.<id>.endpoint` | `string` | Exporter endpoint for OTEL logs. | type: "string",
110110| `otel.exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL exporter requests. | description:
111111| `otel.exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP exporter. | "Local Markdown policy instructions for automatic review. Managed `guardian_policy_config` takes precedence. Blank values are ignored.",
112112| `otel.exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL exporter TLS. | },
113113| `otel.exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL exporter TLS. | {
114114| `otel.exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL exporter TLS. | key: "allow_login_shell",
115115| `otel.log_user_prompt` | `boolean` | Opt in to exporting raw user prompts with OpenTelemetry logs. | type: "boolean",
116116| `otel.trace_exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry trace exporter and provide any endpoint metadata. | description:
117117| `otel.trace_exporter.<id>.endpoint` | `string` | Trace exporter endpoint for OTEL logs. | "Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells.",
118118| `otel.trace_exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL trace exporter requests. | },
119119| `otel.trace_exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP trace exporter. | {
120120| `otel.trace_exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL trace exporter TLS. | key: "sandbox_mode",
121121| `otel.trace_exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL trace exporter TLS. | type: "read-only | workspace-write | danger-full-access",
122122| `otel.trace_exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL trace exporter TLS. | description:
123123| `personality` | `none | friendly | pragmatic` | Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`. | "Sandbox policy for filesystem and network access during command execution.",
124124| `profile` | `string` | Default profile applied at startup (equivalent to `--profile`). | },
125125| `profiles.<name>.*` | `various` | Profile-scoped overrides for any of the supported configuration keys. | {
126126| `profiles.<name>.experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | key: "sandbox_workspace_write.writable_roots",
127127| `profiles.<name>.experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec`. | type: "array<string>",
128128| `profiles.<name>.include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | description:
129129| `profiles.<name>.oss_provider` | `lmstudio | ollama` | Profile-scoped OSS provider for `--oss` sessions. | 'Additional writable roots when `sandbox_mode = "workspace-write"`.',
130130| `profiles.<name>.personality` | `none | friendly | pragmatic` | Profile-scoped communication style override for supported models. | },
131131| `profiles.<name>.web_search` | `disabled | cached | live` | Profile-scoped web search mode override (default: `"cached"`). | {
132132| `project_doc_fallback_filenames` | `array<string>` | Additional filenames to try when `AGENTS.md` is missing. | key: "sandbox_workspace_write.network_access",
133133| `project_doc_max_bytes` | `number` | Maximum bytes read from `AGENTS.md` when building project instructions. | type: "boolean",
134134| `project_root_markers` | `array<string>` | List of project root marker filenames; used when searching parent directories for the project root. | description:
135135| `projects.<path>.trust_level` | `string` | Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers. | "Allow outbound network access inside the workspace-write sandbox.",
136136| `review_model` | `string` | Optional model override used by `/review` (defaults to the current session model). | },
137137| `sandbox_mode` | `read-only | workspace-write | danger-full-access` | Sandbox policy for filesystem and network access during command execution. | {
138138| `sandbox_workspace_write.exclude_slash_tmp` | `boolean` | Exclude `/tmp` from writable roots in workspace-write mode. | key: "sandbox_workspace_write.exclude_tmpdir_env_var",
139139| `sandbox_workspace_write.exclude_tmpdir_env_var` | `boolean` | Exclude `$TMPDIR` from writable roots in workspace-write mode. | type: "boolean",
140140| `sandbox_workspace_write.network_access` | `boolean` | Allow outbound network access inside the workspace-write sandbox. | description:
141141| `sandbox_workspace_write.writable_roots` | `array<string>` | Additional writable roots when `sandbox_mode = "workspace-write"`. | "Exclude `$TMPDIR` from writable roots in workspace-write mode.",
142142| `shell_environment_policy.exclude` | `array<string>` | Glob patterns for removing environment variables after the defaults. | },
143143| `shell_environment_policy.experimental_use_profile` | `boolean` | Use the user shell profile when spawning subprocesses. | {
144144| `shell_environment_policy.ignore_default_excludes` | `boolean` | Keep variables containing KEY/SECRET/TOKEN before other filters run. | key: "sandbox_workspace_write.exclude_slash_tmp",
145145| `shell_environment_policy.include_only` | `array<string>` | Whitelist of patterns; when set only matching variables are kept. | type: "boolean",
146146| `shell_environment_policy.inherit` | `all | core | none` | Baseline environment inheritance when spawning subprocesses. | description:
147147| `shell_environment_policy.set` | `map<string,string>` | Explicit environment overrides injected into every subprocess. | "Exclude `/tmp` from writable roots in workspace-write mode.",
148148| `show_raw_agent_reasoning` | `boolean` | Surface raw reasoning content when the active model emits it. | },
149149| `skills.config` | `array<object>` | Per-skill enablement overrides stored in config.toml. | {
150150| `skills.config.<index>.enabled` | `boolean` | Enable or disable the referenced skill. | key: "windows.sandbox",
151151| `skills.config.<index>.path` | `string (path)` | Path to a skill folder containing `SKILL.md`. | type: "unelevated | elevated",
152152| `suppress_unstable_features_warning` | `boolean` | Suppress the warning that appears when under-development feature flags are enabled. | description:
153153| `tool_output_token_limit` | `number` | Token budget for storing individual tool/function outputs in history. | "Windows-only native sandbox mode when running Codex natively on Windows.",
154154| `tools.web_search` | `boolean` | Deprecated legacy toggle for web search; prefer the top-level `web_search` setting. | },
155155| `tui` | `table` | TUI-specific options such as enabling inline desktop notifications. | {
156156| `tui.alternate_screen` | `auto | always | never` | Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback). | key: "windows.sandbox_private_desktop",
157157| `tui.animations` | `boolean` | Enable terminal animations (welcome screen, shimmer, spinner) (default: true). | type: "boolean",
158158| `tui.notification_method` | `auto | osc9 | bel` | Notification method for unfocused terminal notifications (default: auto). | description:
159159| `tui.notifications` | `boolean | array<string>` | Enable TUI notifications; optionally restrict to specific event types. | "Run the final sandboxed child process on a private desktop by default on native Windows. Set `false` only for compatibility with the older `Winsta0\\\\Default` behavior.",
160160| `tui.show_tooltips` | `boolean` | Show onboarding tooltips in the TUI welcome screen (default: true). | },
161161| `tui.status_line` | `array<string> | null` | Ordered list of TUI footer status-line item identifiers. `null` disables the status line. | {
162162| `web_search` | `disabled | cached | live` | Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool. | key: "notify",
163163| `windows_wsl_setup_acknowledged` | `boolean` | Track Windows onboarding acknowledgement (Windows only). | type: "array<string>",
164164 description:
165165Key "Command invoked for notifications; receives a JSON payload from Codex.",
166166 },
167167`agents.<name>.config_file` {
168168 key: "check_for_update_on_startup",
169169Type / Values type: "boolean",
170170 description:
171171`string (path)` "Check for Codex updates on startup (set to false only when updates are centrally managed).",
172172 },
173173Details {
174174 key: "feedback.enabled",
175175Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. type: "boolean",
176176 description:
177177Key "Enable feedback submission via `/feedback` across Codex surfaces (default: true).",
178178 },
179179`agents.<name>.description` {
180180 key: "analytics.enabled",
181181Type / Values type: "boolean",
182182 description:
183183`string` "Enable or disable analytics for this machine/profile. When unset, the client default applies.",
184184 },
185185Details {
186186 key: "instructions",
187187Role guidance shown to Codex when choosing and spawning that agent type. type: "string",
188188 description:
189189Key "Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`.",
190190 },
191191`agents.max_threads` {
192192 key: "developer_instructions",
193193Type / Values type: "string",
194194 description:
195195`number` "Additional developer instructions injected into the session (optional).",
196196 },
197197Details {
198198 key: "log_dir",
199199Maximum number of agent threads that can be open concurrently. type: "string (path)",
200200 description:
201201Key "Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`.",
202202 },
203203`approval_policy` {
204204 key: "sqlite_home",
205205Type / Values type: "string (path)",
206206 description:
207207`untrusted | on-request | never` "Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state.",
208208 },
209209Details {
210210 key: "compact_prompt",
211211Controls when Codex pauses for approval before executing commands. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. type: "string",
212212 description: "Inline override for the history compaction prompt.",
213213Key },
214214 {
215215`apps.<id>.disabled_reason` key: "commit_attribution",
216216 type: "string",
217217Type / Values description:
218218 'Commit co-author trailer used when `[features].codex_git_commit` is enabled. Defaults to `Codex <noreply@openai.com>`; set `""` to disable.',
219219`unknown | user` },
220220 {
221221Details key: "model_instructions_file",
222222 type: "string (path)",
223223Optional reason attached when an app/connector is disabled. description:
224224 "Replacement for built-in instructions instead of `AGENTS.md`.",
225225Key },
226226 {
227227`apps.<id>.enabled` key: "personality",
228228 type: "none | friendly | pragmatic",
229229Type / Values description:
230230 "Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.",
231231`boolean` },
232232 {
233233Details key: "service_tier",
234234 type: "string",
235235Enable or disable a specific app/connector by id (default: true). description:
236236 "Preferred service tier for new turns. Built-in values include `flex` and `fast`; legacy `fast` config maps to the request value `priority`, and catalog-provided tier IDs can also be stored.",
237237Key },
238238 {
239239`chatgpt_base_url` key: "experimental_compact_prompt_file",
240240 type: "string (path)",
241241Type / Values description:
242242 "Load the compaction prompt override from a file (experimental).",
243243`string` },
244244 {
245245Details key: "skills.config",
246246 type: "array<object>",
247247Override the base URL used during the ChatGPT login flow. description: "Per-skill enablement overrides stored in config.toml.",
248248 },
249249Key {
250250 key: "skills.config.<index>.path",
251251`check_for_update_on_startup` type: "string (path)",
252252 description: "Path to a skill folder containing `SKILL.md`.",
253253Type / Values },
254254 {
255255`boolean` key: "skills.config.<index>.enabled",
256256 type: "boolean",
257257Details description: "Enable or disable the referenced skill.",
258258 },
259259Check for Codex updates on startup (set to false only when updates are centrally managed). {
260260 key: "apps.<id>.enabled",
261261Key type: "boolean",
262262 description:
263263`cli_auth_credentials_store` "Enable or disable a specific app/connector by id (default: true).",
264264 },
265265Type / Values {
266266 key: "apps._default.enabled",
267267`file | keyring | auto` type: "boolean",
268268 description:
269269Details "Default app enabled state for all apps unless overridden per app.",
270270 },
271271Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). {
272272 key: "apps._default.destructive_enabled",
273273Key type: "boolean",
274274 description:
275275`compact_prompt` "Default allow/deny for app tools with `destructive_hint = true`.",
276276 },
277277Type / Values {
278278 key: "apps._default.open_world_enabled",
279279`string` type: "boolean",
280280 description:
281281Details "Default allow/deny for app tools with `open_world_hint = true`.",
282282 },
283283Inline override for the history compaction prompt. {
284284 key: "apps.<id>.destructive_enabled",
285285Key type: "boolean",
286286 description:
287287`developer_instructions` "Allow or block tools in this app that advertise `destructive_hint = true`.",
288288 },
289289Type / Values {
290290 key: "apps.<id>.open_world_enabled",
291291`string` type: "boolean",
292292 description:
293293Details "Allow or block tools in this app that advertise `open_world_hint = true`.",
294294 },
295295Additional developer instructions injected into the session (optional). {
296296 key: "apps.<id>.default_tools_enabled",
297297Key type: "boolean",
298298 description:
299299`disable_paste_burst` "Default enabled state for tools in this app unless a per-tool override exists.",
300300 },
301301Type / Values {
302302 key: "apps.<id>.default_tools_approval_mode",
303303`boolean` type: "auto | prompt | approve",
304304 description:
305305Details "Default approval behavior for tools in this app unless a per-tool override exists.",
306306 },
307307Disable burst-paste detection in the TUI. {
308308 key: "apps.<id>.tools.<tool>.enabled",
309309Key type: "boolean",
310310 description:
311311`experimental_compact_prompt_file` "Per-tool enabled override for an app tool (for example `repos/list`).",
312312 },
313313Type / Values {
314314 key: "apps.<id>.tools.<tool>.approval_mode",
315315`string (path)` type: "auto | prompt | approve",
316316 description: "Per-tool approval behavior override for a single app tool.",
317317Details },
318318 {
319319Load the compaction prompt override from a file (experimental). key: "tool_suggest.discoverables",
320320 type: "array<table>",
321321Key description:
322322 'Allow tool suggestions for additional discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
323323`experimental_use_freeform_apply_patch` },
324324 {
325325Type / Values key: "tool_suggest.disabled_tools",
326326 type: "array<table>",
327327`boolean` description:
328328 'Disable suggestions for specific discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
329329Details },
330330 {
331331Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. key: "features.apps",
332332 type: "boolean",
333333Key description: "Enable ChatGPT Apps/connectors support (experimental).",
334334 },
335335`experimental_use_unified_exec_tool` {
336336 key: "features.hooks",
337337Type / Values type: "boolean",
338338 description:
339339`boolean` "Enable lifecycle hooks loaded from `hooks.json` or inline `[hooks]` config. `features.codex_hooks` is a deprecated alias.",
340340 },
341341Details {
342342 key: "features.codex_git_commit",
343343Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. type: "boolean",
344344 description:
345345Key "Enable Codex-generated git commits. When enabled, Codex uses `commit_attribution` to append a `Co-authored-by:` trailer to generated commit messages.",
346346 },
347347`features.apply_patch_freeform` {
348348 key: "hooks",
349349Type / Values type: "table",
350350 description:
351351`boolean` "Lifecycle hooks configured inline in `config.toml`. Uses the same event schema as `hooks.json`; see the Hooks guide for examples and supported events.",
352352 },
353353Details {
354354 key: "features.plugin_hooks",
355355Expose the freeform `apply_patch` tool (experimental). type: "boolean",
356356 description:
357357Key "Opt into lifecycle hooks bundled with enabled plugins. Off by default in this release; set to `true` to opt in.",
358358 },
359359`features.apps` {
360360 key: "features.memories",
361361Type / Values type: "boolean",
362362 description: "Enable [Memories](https://developers.openai.com/codex/memories) (off by default).",
363363`boolean` },
364364 {
365365Details key: "mcp_servers.<id>.command",
366366 type: "string",
367367Enable ChatGPT Apps/connectors support (experimental). description: "Launcher command for an MCP stdio server.",
368368 },
369369Key {
370370 key: "mcp_servers.<id>.args",
371371`features.apps_mcp_gateway` type: "array<string>",
372372 description: "Arguments passed to the MCP stdio server command.",
373373Type / Values },
374374 {
375375`boolean` key: "mcp_servers.<id>.env",
376376 type: "map<string,string>",
377377Details description: "Environment variables forwarded to the MCP stdio server.",
378378 },
379379Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). {
380380 key: "mcp_servers.<id>.env_vars",
381381Key type: 'array<string | { name = string, source = "local" | "remote" }>',
382382 description:
383383`features.child_agents_md` 'Additional environment variables to whitelist for an MCP stdio server. String entries default to `source = "local"`; use `source = "remote"` only with executor-backed remote stdio.',
384384 },
385385Type / Values {
386386 key: "mcp_servers.<id>.cwd",
387387`boolean` type: "string",
388388 description: "Working directory for the MCP stdio server process.",
389389Details },
390390 {
391391Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). key: "mcp_servers.<id>.url",
392392 type: "string",
393393Key description: "Endpoint for an MCP streamable HTTP server.",
394394 },
395395`features.collaboration_modes` {
396396 key: "mcp_servers.<id>.bearer_token_env_var",
397397Type / Values type: "string",
398398 description:
399399`boolean` "Environment variable sourcing the bearer token for an MCP HTTP server.",
400400 },
401401Details {
402402 key: "mcp_servers.<id>.http_headers",
403403Enable collaboration modes such as plan mode (stable; on by default). type: "map<string,string>",
404404 description: "Static HTTP headers included with each MCP HTTP request.",
405405Key },
406406 {
407407`features.elevated_windows_sandbox` key: "mcp_servers.<id>.env_http_headers",
408408 type: "map<string,string>",
409409Type / Values description:
410410 "HTTP headers populated from environment variables for an MCP HTTP server.",
411411`boolean` },
412412 {
413413Details key: "mcp_servers.<id>.enabled",
414414 type: "boolean",
415415Enable the elevated Windows sandbox pipeline (experimental). description: "Disable an MCP server without removing its configuration.",
416416 },
417417Key {
418418 key: "mcp_servers.<id>.required",
419419`features.experimental_windows_sandbox` type: "boolean",
420420 description:
421421Type / Values "When true, fail startup/resume if this enabled MCP server cannot initialize.",
422422 },
423423`boolean` {
424424 key: "mcp_servers.<id>.startup_timeout_sec",
425425Details type: "number",
426426 description:
427427Run the Windows restricted-token sandbox (experimental). "Override the default 10s startup timeout for an MCP server.",
428428 },
429429Key {
430430 key: "mcp_servers.<id>.startup_timeout_ms",
431431`features.multi_agent` type: "number",
432432 description: "Alias for `startup_timeout_sec` in milliseconds.",
433433Type / Values },
434434 {
435435`boolean` key: "mcp_servers.<id>.tool_timeout_sec",
436436 type: "number",
437437Details description:
438438 "Override the default 60s per-tool timeout for an MCP server.",
439439Enable multi-agent collaboration tools (`spawn\_agent`, `send\_input`, `resume\_agent`, `wait`, and `close\_agent`) (experimental; off by default). },
440440 {
441441Key key: "mcp_servers.<id>.enabled_tools",
442442 type: "array<string>",
443443`features.personality` description: "Allow list of tool names exposed by the MCP server.",
444444 },
445445Type / Values {
446446 key: "mcp_servers.<id>.disabled_tools",
447447`boolean` type: "array<string>",
448448 description:
449449Details "Deny list applied after `enabled_tools` for the MCP server.",
450450 },
451451Enable personality selection controls (stable; on by default). {
452452 key: "mcp_servers.<id>.default_tools_approval_mode",
453453Key type: "auto | prompt | approve",
454454 description:
455455`features.powershell_utf8` "Default approval behavior for MCP tools on this server unless a per-tool override exists.",
456456 },
457457Type / Values {
458458 key: "mcp_servers.<id>.tools.<tool>.approval_mode",
459459`boolean` type: "auto | prompt | approve",
460460 description:
461461Details "Per-tool approval behavior override for one MCP tool on this server.",
462462 },
463463Force PowerShell UTF-8 output (defaults to true). {
464464 key: "mcp_servers.<id>.scopes",
465465Key type: "array<string>",
466466 description:
467467`features.remote_models` "OAuth scopes to request when authenticating to that MCP server.",
468468 },
469469Type / Values {
470470 key: "mcp_servers.<id>.oauth_resource",
471471`boolean` type: "string",
472472 description:
473473Details "Optional RFC 8707 OAuth resource parameter to include during MCP login.",
474474 },
475475Refresh remote model list before showing readiness (experimental). {
476476 key: "mcp_servers.<id>.experimental_environment",
477477Key type: "local | remote",
478478 description:
479479`features.request_rule` "Experimental placement for an MCP server. `remote` starts stdio servers through a remote executor environment; streamable HTTP remote placement is not implemented.",
480480 },
481481Type / Values {
482482 key: "agents.max_threads",
483483`boolean` type: "number",
484484 description:
485485Details "Maximum number of agent threads that can be open concurrently. Defaults to `6` when unset.",
486486 },
487487Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). {
488488 key: "agents.max_depth",
489489Key type: "number",
490490 description:
491491`features.runtime_metrics` "Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1).",
492492 },
493493Type / Values {
494494 key: "agents.job_max_runtime_seconds",
495495`boolean` type: "number",
496496 description:
497497Details "Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker.",
498498 },
499499Show runtime metrics summary in TUI turn separators (experimental). {
500500 key: "agents.<name>.description",
501501Key type: "string",
502502 description:
503503`features.search_tool` "Role guidance shown to Codex when choosing and spawning that agent type.",
504504 },
505505Type / Values {
506506 key: "agents.<name>.config_file",
507507`boolean` type: "string (path)",
508508 description:
509509Details "Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role.",
510510 },
511511Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). {
512512 key: "agents.<name>.nickname_candidates",
513513Key type: "array<string>",
514514 description:
515515`features.shell_snapshot` "Optional pool of display nicknames for spawned agents in that role.",
516516 },
517517Type / Values {
518518 key: "memories.generate_memories",
519519`boolean` type: "boolean",
520520 description:
521521Details "When `false`, newly created threads are not stored as memory-generation inputs. Defaults to `true`.",
522522 },
523523Snapshot shell environment to speed up repeated commands (beta). {
524524 key: "memories.use_memories",
525525Key type: "boolean",
526526 description:
527527`features.shell_tool` "When `false`, Codex skips injecting existing memories into future sessions. Defaults to `true`.",
528528 },
529529Type / Values {
530530 key: "memories.disable_on_external_context",
531531`boolean` type: "boolean",
532532 description:
533533Details "When `true`, threads that use external context such as MCP tool calls, web search, or tool search are kept out of memory generation. Defaults to `false`. Legacy alias: `memories.no_memories_if_mcp_or_web_search`.",
534534 },
535535Enable the default `shell` tool for running commands (stable; on by default). {
536536 key: "memories.max_raw_memories_for_consolidation",
537537Key type: "number",
538538 description:
539539`features.unified_exec` "Maximum recent raw memories retained for global consolidation. Defaults to `256` and is capped at `4096`.",
540540 },
541541Type / Values {
542542 key: "memories.max_unused_days",
543543`boolean` type: "number",
544544 description:
545545Details "Maximum days since a memory was last used before it becomes ineligible for consolidation. Defaults to `30` and is clamped to `0`-`365`.",
546546 },
547547Use the unified PTY-backed exec tool (beta). {
548548 key: "memories.max_rollout_age_days",
549549Key type: "number",
550550 description:
551551`features.use_linux_sandbox_bwrap` "Maximum age of threads considered for memory generation. Defaults to `30` and is clamped to `0`-`90`.",
552552 },
553553Type / Values {
554554 key: "memories.max_rollouts_per_startup",
555555`boolean` type: "number",
556556 description:
557557Details "Maximum rollout candidates processed per startup pass. Defaults to `16` and is capped at `128`.",
558558 },
559559Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). {
560560 key: "memories.min_rollout_idle_hours",
561561Key type: "number",
562562 description:
563563`features.web_search` "Minimum idle time before a thread is considered for memory generation. Defaults to `6` and is clamped to `1`-`48`.",
564564 },
565565Type / Values {
566566 key: "memories.min_rate_limit_remaining_percent",
567567`boolean` type: "number",
568568 description:
569569Details "Minimum remaining percentage required in Codex rate-limit windows before memory generation starts. Defaults to `25` and is clamped to `0`-`100`.",
570570 },
571571Deprecated legacy toggle; prefer the top-level `web_search` setting. {
572572 key: "memories.extract_model",
573573Key type: "string",
574574 description: "Optional model override for per-thread memory extraction.",
575575`features.web_search_cached` },
576576 {
577577Type / Values key: "memories.consolidation_model",
578578 type: "string",
579579`boolean` description: "Optional model override for global memory consolidation.",
580580 },
581581Details {
582582 key: "features.unified_exec",
583583Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. type: "boolean",
584584 description:
585585Key "Use the unified PTY-backed exec tool (stable; enabled by default except on Windows).",
586586 },
587587`features.web_search_request` {
588588 key: "features.shell_snapshot",
589589Type / Values type: "boolean",
590590 description:
591591`boolean` "Snapshot shell environment to speed up repeated commands (stable; on by default).",
592592 },
593593Details {
594594 key: "features.undo",
595595Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. type: "boolean",
596596 description: "Enable undo support (stable; off by default).",
597597Key },
598598 {
599599`feedback.enabled` key: "features.multi_agent",
600600 type: "boolean",
601601Type / Values description:
602602 "Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait_agent`, and `close_agent`) (stable; on by default).",
603603`boolean` },
604604 {
605605Details key: "features.personality",
606606 type: "boolean",
607607Enable feedback submission via `/feedback` across Codex surfaces (default: true). description:
608608 "Enable personality selection controls (stable; on by default).",
609609Key },
610610 {
611611`file_opener` key: "features.network_proxy",
612612 type: "boolean | table",
613613Type / Values description:
614614 "Enable sandboxed networking. Use a table form when setting network policy options such as `domains` (experimental; off by default).",
615615`vscode | vscode-insiders | windsurf | cursor | none` },
616616 {
617617Details key: "features.network_proxy.enabled",
618618 type: "boolean",
619619URI scheme used to open citations from Codex output (default: `vscode`). description: "Enable sandboxed networking. Defaults to `false`.",
620620 },
621621Key {
622622 key: "features.network_proxy.domains",
623623`forced_chatgpt_workspace_id` type: "map<string, allow | deny>",
624624 description:
625625Type / Values "Domain policy for sandboxed networking. Unset by default, which means no external destinations are allowed until you add `allow` rules. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. Add `deny` rules for blocked destinations; `deny` wins on conflicts.",
626626 },
627627`string (uuid)` {
628628 key: "features.network_proxy.unix_sockets",
629629Details type: "map<string, allow | none>",
630630 description:
631631Limit ChatGPT logins to a specific workspace identifier. "Unix socket policy for sandboxed networking. Unset by default; add `allow` entries for permitted sockets.",
632632 },
633633Key {
634634 key: "features.network_proxy.allow_local_binding",
635635`forced_login_method` type: "boolean",
636636 description:
637637Type / Values "Allow broader local/private-network access. Defaults to `false`; exact local IP literal or `localhost` allow rules can still permit specific local targets.",
638638 },
639639`chatgpt | api` {
640640 key: "features.network_proxy.enable_socks5",
641641Details type: "boolean",
642642 description: "Expose SOCKS5 support. Defaults to `true`.",
643643Restrict Codex to a specific authentication method. },
644644 {
645645Key key: "features.network_proxy.enable_socks5_udp",
646646 type: "boolean",
647647`hide_agent_reasoning` description: "Allow UDP over SOCKS5. Defaults to `true`.",
648648 },
649649Type / Values {
650650 key: "features.network_proxy.allow_upstream_proxy",
651651`boolean` type: "boolean",
652652 description:
653653Details "Allow chaining through an upstream proxy from the environment. Defaults to `true`.",
654654 },
655655Suppress reasoning events in both the TUI and `codex exec` output. {
656656 key: "features.network_proxy.dangerously_allow_non_loopback_proxy",
657657Key type: "boolean",
658658 description:
659659`history.max_bytes` "Permit non-loopback listener addresses. Defaults to `false`; enabling it can expose proxy listeners beyond localhost.",
660660 },
661661Type / Values {
662662 key: "features.network_proxy.dangerously_allow_all_unix_sockets",
663663`number` type: "boolean",
664664 description:
665665Details "Permit arbitrary Unix socket destinations instead of allowlist-only access. Defaults to `false`; use only in tightly controlled environments.",
666666 },
667667If set, caps the history file size in bytes by dropping oldest entries. {
668668 key: "features.network_proxy.proxy_url",
669669Key type: "string",
670670 description:
671671`history.persistence` 'HTTP listener URL for sandboxed networking. Defaults to `"http://127.0.0.1:3128"`.',
672672 },
673673Type / Values {
674674 key: "features.network_proxy.socks_url",
675675`save-all | none` type: "string",
676676 description:
677677Details 'SOCKS5 listener URL. Defaults to `"http://127.0.0.1:8081"`.',
678678 },
679679Control whether Codex saves session transcripts to history.jsonl. {
680680 key: "features.web_search",
681681Key type: "boolean",
682682 description:
683683`include_apply_patch_tool` "Deprecated legacy toggle; prefer the top-level `web_search` setting.",
684684 },
685685Type / Values {
686686 key: "features.web_search_cached",
687687`boolean` type: "boolean",
688688 description:
689689Details 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`.',
690690 },
691691Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. {
692692 key: "features.web_search_request",
693693Key type: "boolean",
694694 description:
695695`instructions` 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`.',
696696 },
697697Type / Values {
698698 key: "features.shell_tool",
699699`string` type: "boolean",
700700 description:
701701Details "Enable the default `shell` tool for running commands (stable; on by default).",
702702 },
703703Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. {
704704 key: "features.enable_request_compression",
705705Key type: "boolean",
706706 description:
707707`log_dir` "Compress streaming request bodies with zstd when supported (stable; on by default).",
708708 },
709709Type / Values {
710710 key: "features.skill_mcp_dependency_install",
711711`string (path)` type: "boolean",
712712 description:
713713Details "Allow prompting and installing missing MCP dependencies for skills (stable; on by default).",
714714 },
715715Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. {
716716 key: "features.fast_mode",
717717Key type: "boolean",
718718 description:
719719`mcp_oauth_callback_port` "Enable model-catalog service tier selection in the TUI, including Fast-tier commands when the active model advertises them (stable; on by default).",
720720 },
721721Type / Values {
722722 key: "features.prevent_idle_sleep",
723723`integer` type: "boolean",
724724 description:
725725Details "Prevent the machine from sleeping while a turn is actively running (experimental; off by default).",
726726 },
727727Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. {
728728 key: "suppress_unstable_features_warning",
729729Key type: "boolean",
730730 description:
731731`mcp_oauth_credentials_store` "Suppress the warning that appears when under-development feature flags are enabled.",
732732 },
733733Type / Values {
734734 key: "model_providers.<id>",
735735`auto | file | keyring` type: "table",
736736 description:
737737Details "Custom provider definition. Built-in provider IDs (`openai`, `ollama`, and `lmstudio`) are reserved and cannot be overridden.",
738738 },
739739Preferred store for MCP OAuth credentials. {
740740 key: "model_providers.<id>.name",
741741Key type: "string",
742742 description: "Display name for a custom model provider.",
743743`mcp_servers.<id>.args` },
744744 {
745745Type / Values key: "model_providers.<id>.base_url",
746746 type: "string",
747747`array<string>` description: "API base URL for the model provider.",
748748 },
749749Details {
750750 key: "model_providers.<id>.env_key",
751751Arguments passed to the MCP stdio server command. type: "string",
752752 description: "Environment variable supplying the provider API key.",
753753Key },
754754 {
755755`mcp_servers.<id>.bearer_token_env_var` key: "model_providers.<id>.env_key_instructions",
756756 type: "string",
757757Type / Values description: "Optional setup guidance for the provider API key.",
758758 },
759759`string` {
760760 key: "model_providers.<id>.experimental_bearer_token",
761761Details type: "string",
762762 description:
763763Environment variable sourcing the bearer token for an MCP HTTP server. "Direct bearer token for the provider (discouraged; use `env_key`).",
764764 },
765765Key {
766766 key: "model_providers.<id>.requires_openai_auth",
767767`mcp_servers.<id>.command` type: "boolean",
768768 description:
769769Type / Values "The provider uses OpenAI authentication (defaults to false).",
770770 },
771771`string` {
772772 key: "model_providers.<id>.wire_api",
773773Details type: "responses",
774774 description:
775775Launcher command for an MCP stdio server. "Protocol used by the provider. `responses` is the only supported value, and it is the default when omitted.",
776776 },
777777Key {
778778 key: "model_providers.<id>.query_params",
779779`mcp_servers.<id>.cwd` type: "map<string,string>",
780780 description: "Extra query parameters appended to provider requests.",
781781Type / Values },
782782 {
783783`string` key: "model_providers.<id>.http_headers",
784784 type: "map<string,string>",
785785Details description: "Static HTTP headers added to provider requests.",
786786 },
787787Working directory for the MCP stdio server process. {
788788 key: "model_providers.<id>.env_http_headers",
789789Key type: "map<string,string>",
790790 description:
791791`mcp_servers.<id>.disabled_tools` "HTTP headers populated from environment variables when present.",
792792 },
793793Type / Values {
794794 key: "model_providers.<id>.request_max_retries",
795795`array<string>` type: "number",
796796 description:
797797Details "Retry count for HTTP requests to the provider (default: 4).",
798798 },
799799Deny list applied after `enabled_tools` for the MCP server. {
800800 key: "model_providers.<id>.stream_max_retries",
801801Key type: "number",
802802 description: "Retry count for SSE streaming interruptions (default: 5).",
803803`mcp_servers.<id>.enabled` },
804804 {
805805Type / Values key: "model_providers.<id>.stream_idle_timeout_ms",
806806 type: "number",
807807`boolean` description:
808808 "Idle timeout for SSE streams in milliseconds (default: 300000).",
809809Details },
810810 {
811811Disable an MCP server without removing its configuration. key: "model_providers.<id>.supports_websockets",
812812 type: "boolean",
813813Key description:
814814 "Whether that provider supports the Responses API WebSocket transport.",
815815`mcp_servers.<id>.enabled_tools` },
816816 {
817817Type / Values key: "model_providers.<id>.auth",
818818 type: "table",
819819`array<string>` description:
820820 "Command-backed bearer token configuration for a custom provider. Do not combine with `env_key`, `experimental_bearer_token`, or `requires_openai_auth`.",
821821Details },
822822 {
823823Allow list of tool names exposed by the MCP server. key: "model_providers.<id>.auth.command",
824824 type: "string",
825825Key description:
826826 "Command to run when Codex needs a bearer token. The command must print the token to stdout.",
827827`mcp_servers.<id>.env` },
828828 {
829829Type / Values key: "model_providers.<id>.auth.args",
830830 type: "array<string>",
831831`map<string,string>` description: "Arguments passed to the token command.",
832832 },
833833Details {
834834 key: "model_providers.<id>.auth.timeout_ms",
835835Environment variables forwarded to the MCP stdio server. type: "number",
836836 description:
837837Key "Maximum token command runtime in milliseconds (default: 5000).",
838838 },
839839`mcp_servers.<id>.env_http_headers` {
840840 key: "model_providers.<id>.auth.refresh_interval_ms",
841841Type / Values type: "number",
842842 description:
843843`map<string,string>` "How often Codex proactively refreshes the token in milliseconds (default: 300000). Set to `0` to refresh only after an authentication retry.",
844844 },
845845Details {
846846 key: "model_providers.<id>.auth.cwd",
847847HTTP headers populated from environment variables for an MCP HTTP server. type: "string (path)",
848848 description: "Working directory for the token command.",
849849Key },
850850 {
851851`mcp_servers.<id>.env_vars` key: "model_providers.amazon-bedrock.aws.profile",
852852 type: "string",
853853Type / Values description:
854854 "AWS profile name used by the built-in `amazon-bedrock` provider.",
855855`array<string>` },
856856 {
857857Details key: "model_providers.amazon-bedrock.aws.region",
858858 type: "string",
859859Additional environment variables to whitelist for an MCP stdio server. description: "AWS region used by the built-in `amazon-bedrock` provider.",
860860 },
861861Key {
862862 key: "model_reasoning_effort",
863863`mcp_servers.<id>.http_headers` type: "minimal | low | medium | high | xhigh",
864864 description:
865865Type / Values "Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent).",
866866 },
867867`map<string,string>` {
868868 key: "plan_mode_reasoning_effort",
869869Details type: "none | minimal | low | medium | high | xhigh",
870870 description:
871871Static HTTP headers included with each MCP HTTP request. "Plan-mode-specific reasoning override. When unset, Plan mode uses its built-in preset default.",
872872 },
873873Key {
874874 key: "model_reasoning_summary",
875875`mcp_servers.<id>.required` type: "auto | concise | detailed | none",
876876 description:
877877Type / Values "Select reasoning summary detail or disable summaries entirely.",
878878 },
879879`boolean` {
880880 key: "model_verbosity",
881881Details type: "low | medium | high",
882882 description:
883883When true, fail startup/resume if this enabled MCP server cannot initialize. "Optional GPT-5 Responses API verbosity override; when unset, the selected model/preset default is used.",
884884 },
885885Key {
886886 key: "model_supports_reasoning_summaries",
887887`mcp_servers.<id>.startup_timeout_ms` type: "boolean",
888888 description: "Force Codex to send or not send reasoning metadata.",
889889Type / Values },
890890 {
891891`number` key: "shell_environment_policy.inherit",
892892 type: "all | core | none",
893893Details description:
894894 "Baseline environment inheritance when spawning subprocesses.",
895895Alias for `startup_timeout_sec` in milliseconds. },
896896 {
897897Key key: "shell_environment_policy.ignore_default_excludes",
898898 type: "boolean",
899899`mcp_servers.<id>.startup_timeout_sec` description:
900900 "Keep variables containing KEY/SECRET/TOKEN before other filters run.",
901901Type / Values },
902902 {
903903`number` key: "shell_environment_policy.exclude",
904904 type: "array<string>",
905905Details description:
906906 "Glob patterns for removing environment variables after the defaults.",
907907Override the default 10s startup timeout for an MCP server. },
908908 {
909909Key key: "shell_environment_policy.include_only",
910910 type: "array<string>",
911911`mcp_servers.<id>.tool_timeout_sec` description:
912912 "Whitelist of patterns; when set only matching variables are kept.",
913913Type / Values },
914914 {
915915`number` key: "shell_environment_policy.set",
916916 type: "map<string,string>",
917917Details description:
918918 "Explicit environment overrides injected into every subprocess.",
919919Override the default 60s per-tool timeout for an MCP server. },
920920 {
921921Key key: "shell_environment_policy.experimental_use_profile",
922922 type: "boolean",
923923`mcp_servers.<id>.url` description: "Use the user shell profile when spawning subprocesses.",
924924 },
925925Type / Values {
926926 key: "project_root_markers",
927927`string` type: "array<string>",
928928 description:
929929Details "List of project root marker filenames; used when searching parent directories for the project root.",
930930 },
931931Endpoint for an MCP streamable HTTP server. {
932932 key: "project_doc_max_bytes",
933933Key type: "number",
934934 description:
935935`model` "Maximum bytes read from `AGENTS.md` when building project instructions.",
936936 },
937937Type / Values {
938938 key: "project_doc_fallback_filenames",
939939`string` type: "array<string>",
940940 description: "Additional filenames to try when `AGENTS.md` is missing.",
941941Details },
942942 {
943943Model to use (e.g., `gpt-5-codex`). key: "profile",
944944 type: "string",
945945Key description:
946946 "Default profile applied at startup (equivalent to `--profile`).",
947947`model_auto_compact_token_limit` },
948948 {
949949Type / Values key: "profiles.<name>.*",
950950 type: "various",
951951`number` description:
952952 "Profile-scoped overrides for any of the supported configuration keys.",
953953Details },
954954 {
955955Token threshold that triggers automatic history compaction (unset uses model defaults). key: "profiles.<name>.service_tier",
956956 type: "string",
957957Key description: "Profile-scoped service tier preference for new turns.",
958958 },
959959`model_context_window` {
960960 key: "profiles.<name>.plan_mode_reasoning_effort",
961961Type / Values type: "none | minimal | low | medium | high | xhigh",
962962 description: "Profile-scoped Plan-mode reasoning override.",
963963`number` },
964964 {
965965Details key: "profiles.<name>.web_search",
966966 type: "disabled | cached | live",
967967Context window tokens available to the active model. description:
968968 'Profile-scoped web search mode override (default: `"cached"`).',
969969Key },
970970 {
971971`model_instructions_file` key: "profiles.<name>.personality",
972972 type: "none | friendly | pragmatic",
973973Type / Values description:
974974 "Profile-scoped communication style override for supported models.",
975975`string (path)` },
976976 {
977977Details key: "profiles.<name>.model_catalog_json",
978978 type: "string (path)",
979979Replacement for built-in instructions instead of `AGENTS.md`. description:
980980 "Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).",
981981Key },
982982 {
983983`model_provider` key: "profiles.<name>.model_instructions_file",
984984 type: "string (path)",
985985Type / Values description:
986986 "Profile-scoped replacement for the built-in instruction file.",
987987`string` },
988988 {
989989Details key: "profiles.<name>.experimental_use_unified_exec_tool",
990990 type: "boolean",
991991Provider id from `model_providers` (default: `openai`). description:
992992 "Legacy name for enabling unified exec; prefer `[features].unified_exec`.",
993993Key },
994994 {
995995`model_providers.<id>.base_url` key: "profiles.<name>.oss_provider",
996996 type: "lmstudio | ollama",
997997Type / Values description: "Profile-scoped OSS provider for `--oss` sessions.",
998998 },
999999`string` {
10001000 key: "profiles.<name>.tools_view_image",
10011001Details type: "boolean",
10021002 description: "Enable or disable the `view_image` tool in that profile.",
10031003API base URL for the model provider. },
10041004 {
10051005Key key: "profiles.<name>.analytics.enabled",
10061006 type: "boolean",
10071007`model_providers.<id>.env_http_headers` description: "Profile-scoped analytics enablement override.",
10081008 },
10091009Type / Values {
10101010 key: "profiles.<name>.windows.sandbox",
10111011`map<string,string>` type: "unelevated | elevated",
10121012 description: "Profile-scoped Windows sandbox mode override.",
10131013Details },
10141014 {
10151015HTTP headers populated from environment variables when present. key: "history.persistence",
10161016 type: "save-all | none",
10171017Key description:
10181018 "Control whether Codex saves session transcripts to history.jsonl.",
10191019`model_providers.<id>.env_key` },
10201020 {
10211021Type / Values key: "tool_output_token_limit",
10221022 type: "number",
10231023`string` description:
10241024 "Token budget for storing individual tool/function outputs in history.",
10251025Details },
10261026 {
10271027Environment variable supplying the provider API key. key: "background_terminal_max_timeout",
10281028 type: "number",
10291029Key description:
10301030 "Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key.",
10311031`model_providers.<id>.env_key_instructions` },
10321032 {
10331033Type / Values key: "history.max_bytes",
10341034 type: "number",
10351035`string` description:
10361036 "If set, caps the history file size in bytes by dropping oldest entries.",
10371037Details },
10381038 {
10391039Optional setup guidance for the provider API key. key: "file_opener",
10401040 type: "vscode | vscode-insiders | windsurf | cursor | none",
10411041Key description:
10421042 "URI scheme used to open citations from Codex output (default: `vscode`).",
10431043`model_providers.<id>.experimental_bearer_token` },
10441044 {
10451045Type / Values key: "otel.environment",
10461046 type: "string",
10471047`string` description:
10481048 "Environment tag applied to emitted OpenTelemetry events (default: `dev`).",
10491049Details },
10501050 {
10511051Direct bearer token for the provider (discouraged; use `env_key`). key: "otel.exporter",
10521052 type: "none | otlp-http | otlp-grpc",
10531053Key description:
10541054 "Select the OpenTelemetry exporter and provide any endpoint metadata.",
10551055`model_providers.<id>.http_headers` },
10561056 {
10571057Type / Values key: "otel.trace_exporter",
10581058 type: "none | otlp-http | otlp-grpc",
10591059`map<string,string>` description:
10601060 "Select the OpenTelemetry trace exporter and provide any endpoint metadata.",
10611061Details },
10621062 {
10631063Static HTTP headers added to provider requests. key: "otel.metrics_exporter",
10641064 type: "none | statsig | otlp-http | otlp-grpc",
10651065Key description:
10661066 "Select the OpenTelemetry metrics exporter (defaults to `statsig`).",
10671067`model_providers.<id>.name` },
10681068 {
10691069Type / Values key: "otel.log_user_prompt",
10701070 type: "boolean",
10711071`string` description:
10721072 "Opt in to exporting raw user prompts with OpenTelemetry logs.",
10731073Details },
10741074 {
10751075Display name for a custom model provider. key: "otel.exporter.<id>.endpoint",
10761076 type: "string",
10771077Key description: "Exporter endpoint for OTEL logs.",
10781078 },
10791079`model_providers.<id>.query_params` {
10801080 key: "otel.exporter.<id>.protocol",
10811081Type / Values type: "binary | json",
10821082 description: "Protocol used by the OTLP/HTTP exporter.",
10831083`map<string,string>` },
10841084 {
10851085Details key: "otel.exporter.<id>.headers",
10861086 type: "map<string,string>",
10871087Extra query parameters appended to provider requests. description: "Static headers included with OTEL exporter requests.",
10881088 },
10891089Key {
10901090 key: "otel.trace_exporter.<id>.endpoint",
10911091`model_providers.<id>.request_max_retries` type: "string",
10921092 description: "Trace exporter endpoint for OTEL logs.",
10931093Type / Values },
10941094 {
10951095`number` key: "otel.trace_exporter.<id>.protocol",
10961096 type: "binary | json",
10971097Details description: "Protocol used by the OTLP/HTTP trace exporter.",
10981098 },
10991099Retry count for HTTP requests to the provider (default: 4). {
11001100 key: "otel.trace_exporter.<id>.headers",
11011101Key type: "map<string,string>",
11021102 description: "Static headers included with OTEL trace exporter requests.",
11031103`model_providers.<id>.requires_openai_auth` },
11041104 {
11051105Type / Values key: "otel.exporter.<id>.tls.ca-certificate",
11061106 type: "string",
11071107`boolean` description: "CA certificate path for OTEL exporter TLS.",
11081108 },
11091109Details {
11101110 key: "otel.exporter.<id>.tls.client-certificate",
11111111The provider uses OpenAI authentication (defaults to false). type: "string",
11121112 description: "Client certificate path for OTEL exporter TLS.",
11131113Key },
11141114 {
11151115`model_providers.<id>.stream_idle_timeout_ms` key: "otel.exporter.<id>.tls.client-private-key",
11161116 type: "string",
11171117Type / Values description: "Client private key path for OTEL exporter TLS.",
11181118 },
11191119`number` {
11201120 key: "otel.trace_exporter.<id>.tls.ca-certificate",
11211121Details type: "string",
11221122 description: "CA certificate path for OTEL trace exporter TLS.",
11231123Idle timeout for SSE streams in milliseconds (default: 300000). },
11241124 {
11251125Key key: "otel.trace_exporter.<id>.tls.client-certificate",
11261126 type: "string",
11271127`model_providers.<id>.stream_max_retries` description: "Client certificate path for OTEL trace exporter TLS.",
11281128 },
11291129Type / Values {
11301130 key: "otel.trace_exporter.<id>.tls.client-private-key",
11311131`number` type: "string",
11321132 description: "Client private key path for OTEL trace exporter TLS.",
11331133Details },
11341134 {
11351135Retry count for SSE streaming interruptions (default: 5). key: "tui",
11361136 type: "table",
11371137Key description:
11381138 "TUI-specific options such as enabling inline desktop notifications.",
11391139`model_providers.<id>.wire_api` },
11401140 {
11411141Type / Values key: "tui.notifications",
11421142 type: "boolean | array<string>",
11431143`chat | responses` description:
11441144 "Enable TUI notifications; optionally restrict to specific event types.",
11451145Details },
11461146 {
11471147Protocol used by the provider (defaults to `chat` if omitted). key: "tui.notification_method",
11481148 type: "auto | osc9 | bel",
11491149Key description:
11501150 "Notification method for terminal notifications (default: auto).",
11511151`model_reasoning_effort` },
11521152 {
11531153Type / Values key: "tui.notification_condition",
11541154 type: "unfocused | always",
11551155`minimal | low | medium | high | xhigh` description:
11561156 "Control whether TUI notifications fire only when the terminal is unfocused or regardless of focus. Defaults to `unfocused`.",
11571157Details },
11581158 {
11591159Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). key: "tui.animations",
11601160 type: "boolean",
11611161Key description:
11621162 "Enable terminal animations (welcome screen, shimmer, spinner) (default: true).",
11631163`model_reasoning_summary` },
11641164 {
11651165Type / Values key: "tui.alternate_screen",
11661166 type: "auto | always | never",
11671167`auto | concise | detailed | none` description:
11681168 "Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).",
11691169Details },
11701170 {
11711171Select reasoning summary detail or disable summaries entirely. key: "tui.vim_mode_default",
11721172 type: "boolean",
11731173Key description:
11741174 "Start the composer in Vim normal mode instead of insert mode (default: false). You can still toggle it per session with `/vim`.",
11751175`model_supports_reasoning_summaries` },
11761176 {
11771177Type / Values key: "tui.raw_output_mode",
11781178 type: "boolean",
11791179`boolean` description:
11801180 "Start the TUI in raw scrollback mode for copy-friendly terminal selection (default: false). You can toggle it with `/raw` or the default `alt-r` key binding.",
11811181Details },
11821182 {
11831183Force Codex to send or not send reasoning metadata. key: "tui.show_tooltips",
11841184 type: "boolean",
11851185Key description:
11861186 "Show onboarding tooltips in the TUI welcome screen (default: true).",
11871187`model_verbosity` },
11881188 {
11891189Type / Values key: "tui.status_line",
11901190 type: "array<string> | null",
11911191`low | medium | high` description:
11921192 "Ordered list of TUI footer status-line item identifiers. `null` disables the status line.",
11931193Details },
11941194 {
11951195Control GPT-5 Responses API verbosity (defaults to `medium`). key: "tui.terminal_title",
11961196 type: "array<string> | null",
11971197Key description:
11981198 'Ordered list of terminal window/tab title item identifiers. Defaults to `["spinner", "project"]`; `null` disables title updates.',
11991199`notice.hide_full_access_warning` },
12001200 {
12011201Type / Values key: "tui.theme",
12021202 type: "string",
12031203`boolean` description:
12041204 "Syntax-highlighting theme override (kebab-case theme name).",
12051205Details },
12061206 {
12071207Track acknowledgement of the full access warning prompt. key: "tui.keymap.<context>.<action>",
12081208 type: "string | array<string>",
12091209Key description:
12101210 "Keyboard shortcut binding for a TUI action. Supported contexts include `global`, `chat`, `composer`, `editor`, `pager`, `list`, and `approval`; context-specific bindings override `tui.keymap.global`.",
12111211`notice.hide_gpt-5.1-codex-max_migration_prompt` },
12121212 {
12131213Type / Values key: "tui.keymap.<context>.<action> = []",
12141214 type: "empty array",
12151215`boolean` description:
12161216 "Unbind the action in that keymap context. Key names use normalized strings such as `ctrl-a`, `shift-enter`, `page-down`, or `minus`.",
12171217Details },
12181218 {
12191219Track acknowledgement of the gpt-5.1-codex-max migration prompt. key: "plugins.<plugin>.mcp_servers.<server>.enabled",
12201220 type: "boolean",
12211221Key description:
12221222 "Enable or disable an MCP server bundled by an installed plugin without changing the plugin manifest.",
12231223`notice.hide_gpt5_1_migration_prompt` },
12241224 {
12251225Type / Values key: "plugins.<plugin>.mcp_servers.<server>.default_tools_approval_mode",
12261226 type: "auto | prompt | approve",
12271227`boolean` description:
12281228 "Default approval behavior for tools on a plugin-provided MCP server.",
12291229Details },
12301230 {
12311231Track acknowledgement of the GPT-5.1 migration prompt. key: "plugins.<plugin>.mcp_servers.<server>.enabled_tools",
12321232 type: "array<string>",
12331233Key description:
12341234 "Allow list of tools exposed from a plugin-provided MCP server.",
12351235`notice.hide_rate_limit_model_nudge` },
12361236 {
12371237Type / Values key: "plugins.<plugin>.mcp_servers.<server>.disabled_tools",
12381238 type: "array<string>",
12391239`boolean` description:
12401240 "Deny list applied after `enabled_tools` for a plugin-provided MCP server.",
12411241Details },
12421242 {
12431243Track opt-out of the rate limit model switch reminder. key: "plugins.<plugin>.mcp_servers.<server>.tools.<tool>.approval_mode",
12441244 type: "auto | prompt | approve",
12451245Key description:
12461246 "Per-tool approval behavior override for a plugin-provided MCP tool.",
12471247`notice.hide_world_writable_warning` },
12481248 {
12491249Type / Values key: "tui.model_availability_nux.<model>",
12501250 type: "integer",
12511251`boolean` description: "Internal startup-tooltip state keyed by model slug.",
12521252 },
12531253Details {
12541254 key: "hide_agent_reasoning",
12551255Track acknowledgement of the Windows world-writable directories warning. type: "boolean",
12561256 description:
12571257Key "Suppress reasoning events in both the TUI and `codex exec` output.",
12581258 },
12591259`notice.model_migrations` {
12601260 key: "show_raw_agent_reasoning",
12611261Type / Values type: "boolean",
12621262 description:
12631263`map<string,string>` "Surface raw reasoning content when the active model emits it.",
12641264 },
12651265Details {
12661266 key: "disable_paste_burst",
12671267Track acknowledged model migrations as old->new mappings. type: "boolean",
12681268 description: "Disable burst-paste detection in the TUI.",
12691269Key },
12701270 {
12711271`notify` key: "windows_wsl_setup_acknowledged",
12721272 type: "boolean",
12731273Type / Values description: "Track Windows onboarding acknowledgement (Windows only).",
12741274 },
12751275`array<string>` {
12761276 key: "chatgpt_base_url",
12771277Details type: "string",
12781278 description: "Override the base URL used during the ChatGPT login flow.",
12791279Command invoked for notifications; receives a JSON payload from Codex. },
12801280 {
12811281Key key: "cli_auth_credentials_store",
12821282 type: "file | keyring | auto",
12831283`oss_provider` description:
12841284 "Control where the CLI stores cached credentials (file-based auth.json vs OS keychain).",
12851285Type / Values },
12861286 {
12871287`lmstudio | ollama` key: "mcp_oauth_credentials_store",
12881288 type: "auto | file | keyring",
12891289Details description: "Preferred store for MCP OAuth credentials.",
12901290 },
12911291Default local provider used when running with `--oss` (defaults to prompting if unset). {
12921292 key: "mcp_oauth_callback_port",
12931293Key type: "integer",
12941294 description:
12951295`otel.environment` "Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS.",
12961296 },
12971297Type / Values {
12981298 key: "mcp_oauth_callback_url",
12991299`string` type: "string",
13001300 description:
13011301Details "Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port.",
13021302 },
13031303Environment tag applied to emitted OpenTelemetry events (default: `dev`). {
13041304 key: "experimental_use_unified_exec_tool",
13051305Key type: "boolean",
13061306 description:
13071307`otel.exporter` "Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`.",
13081308 },
13091309Type / Values {
13101310 key: "tools.web_search",
13111311`none | otlp-http | otlp-grpc` type: 'boolean | { context_size = "low|medium|high", allowed_domains = [string], location = { country, region, city, timezone } }',
13121312 description:
13131313Details "Optional web search tool configuration. The legacy boolean form is still accepted, but the object form lets you set search context size, allowed domains, and approximate user location.",
13141314 },
13151315Select the OpenTelemetry exporter and provide any endpoint metadata. {
13161316 key: "tools.view_image",
13171317Key type: "boolean",
13181318 description: "Enable the local-image attachment tool `view_image`.",
13191319`otel.exporter.<id>.endpoint` },
13201320 {
13211321Type / Values key: "web_search",
13221322 type: "disabled | cached | live",
13231323`string` description:
13241324 'Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.',
13251325Details },
13261326 {
13271327Exporter endpoint for OTEL logs. key: "default_permissions",
13281328 type: "string",
13291329Key description:
13301330 "Name of the default permissions profile to apply to sandboxed tool calls. Built-ins are `:read-only`, `:workspace`, and `:danger-no-sandbox`; custom profile names require matching `[permissions.<name>]` tables.",
13311331`otel.exporter.<id>.headers` },
13321332 {
13331333Type / Values key: "permissions.<name>.filesystem",
13341334 type: "table",
13351335`map<string,string>` description:
13361336 "Named filesystem permission profile. Each key is an absolute path or special token such as `:minimal` or `:project_roots`.",
13371337Details },
13381338 {
13391339Static headers included with OTEL exporter requests. key: "permissions.<name>.filesystem.glob_scan_max_depth",
13401340 type: "number",
13411341Key description:
13421342 "Maximum depth for expanding deny-read glob patterns on platforms that snapshot matches before sandbox startup. Must be at least `1` when set.",
13431343`otel.exporter.<id>.protocol` },
13441344 {
13451345Type / Values key: "permissions.<name>.filesystem.<path-or-glob>",
13461346 type: '"read" | "write" | "none" | table',
13471347`binary | json` description:
13481348 'Grant direct access for a path, glob pattern, or special token, or scope nested entries under that root. Use `"none"` to deny reads for matching paths.',
13491349Details },
13501350 {
13511351Protocol used by the OTLP/HTTP exporter. key: 'permissions.<name>.filesystem.":project_roots".<subpath-or-glob>',
13521352 type: '"read" | "write" | "none"',
13531353Key description:
13541354 'Scoped filesystem access relative to the detected project roots. Use `"."` for the root itself; glob subpaths such as `"**/*.env"` can deny reads with `"none"`.',
13551355`otel.exporter.<id>.tls.ca-certificate` },
13561356 {
13571357Type / Values key: "permissions.<name>.network.enabled",
13581358 type: "boolean",
13591359`string` description: "Enable network access for this named permissions profile.",
13601360 },
13611361Details {
13621362 key: "permissions.<name>.network.proxy_url",
13631363CA certificate path for OTEL exporter TLS. type: "string",
13641364 description:
13651365Key "HTTP listener URL used when this permissions profile enables sandboxed networking.",
13661366 },
13671367`otel.exporter.<id>.tls.client-certificate` {
13681368 key: "permissions.<name>.network.enable_socks5",
13691369Type / Values type: "boolean",
13701370 description:
13711371`string` "Expose SOCKS5 support when this permissions profile enables sandboxed networking.",
13721372 },
13731373Details {
13741374 key: "permissions.<name>.network.socks_url",
13751375Client certificate path for OTEL exporter TLS. type: "string",
13761376 description: "SOCKS5 proxy endpoint used by this permissions profile.",
13771377Key },
13781378 {
13791379`otel.exporter.<id>.tls.client-private-key` key: "permissions.<name>.network.enable_socks5_udp",
13801380 type: "boolean",
13811381Type / Values description: "Allow UDP over the SOCKS5 listener when enabled.",
13821382 },
13831383`string` {
13841384 key: "permissions.<name>.network.allow_upstream_proxy",
13851385Details type: "boolean",
13861386 description:
13871387Client private key path for OTEL exporter TLS. "Allow sandboxed networking to chain through another upstream proxy.",
13881388 },
13891389Key {
13901390 key: "permissions.<name>.network.dangerously_allow_non_loopback_proxy",
13911391`otel.log_user_prompt` type: "boolean",
13921392 description:
13931393Type / Values "Permit non-loopback bind addresses for sandboxed networking listeners. Enabling it can expose listeners beyond localhost.",
13941394 },
13951395`boolean` {
13961396 key: "permissions.<name>.network.dangerously_allow_all_unix_sockets",
13971397Details type: "boolean",
13981398 description:
13991399Opt in to exporting raw user prompts with OpenTelemetry logs. "Allow arbitrary Unix socket destinations instead of the default restricted set. Use only in tightly controlled environments.",
14001400 },
14011401Key {
14021402 key: "permissions.<name>.network.domains",
14031403`otel.trace_exporter` type: "map<string, allow | deny>",
14041404 description:
14051405Type / Values "Domain rules for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules. `deny` wins on conflicts.",
14061406 },
14071407`none | otlp-http | otlp-grpc` {
14081408 key: "permissions.<name>.network.unix_sockets",
14091409Details type: "map<string, allow | none>",
14101410 description:
14111411Select the OpenTelemetry trace exporter and provide any endpoint metadata. "Unix socket rules for sandboxed networking. Use socket paths as keys, with `allow` or `none` values.",
14121412 },
14131413Key {
14141414 key: "permissions.<name>.network.allow_local_binding",
14151415`otel.trace_exporter.<id>.endpoint` type: "boolean",
14161416 description:
14171417Type / Values "Permit broader local/private-network access through sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",
14181418 },
14191419`string` {
14201420 key: "projects.<path>.trust_level",
14211421Details type: "string",
14221422 description:
14231423Trace exporter endpoint for OTEL logs. 'Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers, including project-local config, hooks, and rules.',
14241424 },
14251425Key {
14261426 key: "notice.hide_full_access_warning",
14271427`otel.trace_exporter.<id>.headers` type: "boolean",
14281428 description: "Track acknowledgement of the full access warning prompt.",
14291429Type / Values },
14301430 {
14311431`map<string,string>` key: "notice.hide_world_writable_warning",
14321432 type: "boolean",
14331433Details description:
14341434 "Track acknowledgement of the Windows world-writable directories warning.",
14351435Static headers included with OTEL trace exporter requests. },
14361436 {
14371437Key key: "notice.hide_rate_limit_model_nudge",
14381438 type: "boolean",
14391439`otel.trace_exporter.<id>.protocol` description: "Track opt-out of the rate limit model switch reminder.",
14401440 },
14411441Type / Values {
14421442 key: "notice.hide_gpt5_1_migration_prompt",
14431443`binary | json` type: "boolean",
14441444 description: "Track acknowledgement of the GPT-5.1 migration prompt.",
14451445Details },
14461446 {
14471447Protocol used by the OTLP/HTTP trace exporter. key: "notice.hide_gpt-5.1-codex-max_migration_prompt",
14481448 type: "boolean",
14491449Key description:
14501450 "Track acknowledgement of the gpt-5.1-codex-max migration prompt.",
14511451`otel.trace_exporter.<id>.tls.ca-certificate` },
14521452 {
14531453Type / Values key: "notice.model_migrations",
14541454 type: "map<string,string>",
14551455`string` description: "Track acknowledged model migrations as old->new mappings.",
14561456 },
14571457Details {
14581458 key: "forced_login_method",
14591459CA certificate path for OTEL trace exporter TLS. type: "chatgpt | api",
14601460 description: "Restrict Codex to a specific authentication method.",
14611461Key },
14621462 {
14631463`otel.trace_exporter.<id>.tls.client-certificate` key: "forced_chatgpt_workspace_id",
14641464 type: "string (uuid)",
14651465Type / Values description: "Limit ChatGPT logins to a specific workspace identifier.",
14661466 },
14671467`string` ]}
14681468 client:load
14691469Details/>
1470
1471Client certificate path for OTEL trace exporter TLS.
1472
1473Key
1474
1475`otel.trace_exporter.<id>.tls.client-private-key`
1476
1477Type / Values
1478
1479`string`
1480
1481Details
1482
1483Client private key path for OTEL trace exporter TLS.
1484
1485Key
1486
1487`personality`
1488
1489Type / Values
1490
1491`none | friendly | pragmatic`
1492
1493Details
1494
1495Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.
1496
1497Key
1498
1499`profile`
1500
1501Type / Values
1502
1503`string`
1504
1505Details
1506
1507Default profile applied at startup (equivalent to `--profile`).
1508
1509Key
1510
1511`profiles.<name>.*`
1512
1513Type / Values
1514
1515`various`
1516
1517Details
1518
1519Profile-scoped overrides for any of the supported configuration keys.
1520
1521Key
1522
1523`profiles.<name>.experimental_use_freeform_apply_patch`
1524
1525Type / Values
1526
1527`boolean`
1528
1529Details
1530
1531Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.
1532
1533Key
1534
1535`profiles.<name>.experimental_use_unified_exec_tool`
1536
1537Type / Values
1538
1539`boolean`
1540
1541Details
1542
1543Legacy name for enabling unified exec; prefer `[features].unified_exec`.
1544
1545Key
1546
1547`profiles.<name>.include_apply_patch_tool`
1548
1549Type / Values
1550
1551`boolean`
1552
1553Details
1554
1555Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.
1556
1557Key
1558
1559`profiles.<name>.oss_provider`
1560
1561Type / Values
1562
1563`lmstudio | ollama`
1564
1565Details
1566
1567Profile-scoped OSS provider for `--oss` sessions.
1568
1569Key
1570
1571`profiles.<name>.personality`
1572
1573Type / Values
1574
1575`none | friendly | pragmatic`
1576
1577Details
1578
1579Profile-scoped communication style override for supported models.
1580
1581Key
1582
1583`profiles.<name>.web_search`
1584
1585Type / Values
1586
1587`disabled | cached | live`
1588
1589Details
1590
1591Profile-scoped web search mode override (default: `"cached"`).
1592
1593Key
1594
1595`project_doc_fallback_filenames`
1596
1597Type / Values
1598
1599`array<string>`
1600
1601Details
1602
1603Additional filenames to try when `AGENTS.md` is missing.
1604
1605Key
1606
1607`project_doc_max_bytes`
1608
1609Type / Values
1610
1611`number`
1612
1613Details
1614
1615Maximum bytes read from `AGENTS.md` when building project instructions.
1616
1617Key
1618
1619`project_root_markers`
1620
1621Type / Values
1622
1623`array<string>`
1624
1625Details
1626
1627List of project root marker filenames; used when searching parent directories for the project root.
1628
1629Key
1630
1631`projects.<path>.trust_level`
1632
1633Type / Values
1634
1635`string`
1636
1637Details
1638
1639Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers.
1640
1641Key
1642
1643`review_model`
1644
1645Type / Values
1646
1647`string`
1648
1649Details
1650
1651Optional model override used by `/review` (defaults to the current session model).
1652
1653Key
1654
1655`sandbox_mode`
1656
1657Type / Values
1658
1659`read-only | workspace-write | danger-full-access`
1660
1661Details
1662
1663Sandbox policy for filesystem and network access during command execution.
1664
1665Key
1666
1667`sandbox_workspace_write.exclude_slash_tmp`
1668
1669Type / Values
1670
1671`boolean`
1672
1673Details
1674
1675Exclude `/tmp` from writable roots in workspace-write mode.
1676
1677Key
1678
1679`sandbox_workspace_write.exclude_tmpdir_env_var`
1680
1681Type / Values
1682
1683`boolean`
1684
1685Details
1686
1687Exclude `$TMPDIR` from writable roots in workspace-write mode.
1688
1689Key
1690
1691`sandbox_workspace_write.network_access`
1692
1693Type / Values
1694
1695`boolean`
1696
1697Details
1698
1699Allow outbound network access inside the workspace-write sandbox.
1700
1701Key
1702
1703`sandbox_workspace_write.writable_roots`
1704
1705Type / Values
1706
1707`array<string>`
1708
1709Details
1710
1711Additional writable roots when `sandbox_mode = "workspace-write"`.
1712
1713Key
1714
1715`shell_environment_policy.exclude`
1716
1717Type / Values
1718
1719`array<string>`
1720
1721Details
1722
1723Glob patterns for removing environment variables after the defaults.
1724
1725Key
1726
1727`shell_environment_policy.experimental_use_profile`
1728
1729Type / Values
1730
1731`boolean`
1732
1733Details
1734
1735Use the user shell profile when spawning subprocesses.
1736
1737Key
1738
1739`shell_environment_policy.ignore_default_excludes`
1740
1741Type / Values
1742
1743`boolean`
1744
1745Details
1746
1747Keep variables containing KEY/SECRET/TOKEN before other filters run.
1748
1749Key
1750
1751`shell_environment_policy.include_only`
1752
1753Type / Values
1754
1755`array<string>`
1756
1757Details
1758
1759Whitelist of patterns; when set only matching variables are kept.
1760
1761Key
1762
1763`shell_environment_policy.inherit`
1764
1765Type / Values
1766
1767`all | core | none`
1768
1769Details
1770
1771Baseline environment inheritance when spawning subprocesses.
1772
1773Key
1774
1775`shell_environment_policy.set`
1776
1777Type / Values
1778
1779`map<string,string>`
1780
1781Details
1782
1783Explicit environment overrides injected into every subprocess.
1784
1785Key
1786
1787`show_raw_agent_reasoning`
1788
1789Type / Values
1790
1791`boolean`
1792
1793Details
1794
1795Surface raw reasoning content when the active model emits it.
1796
1797Key
1798
1799`skills.config`
1800
1801Type / Values
1802
1803`array<object>`
1804
1805Details
1806
1807Per-skill enablement overrides stored in config.toml.
1808
1809Key
1810
1811`skills.config.<index>.enabled`
1812
1813Type / Values
1814
1815`boolean`
1816
1817Details
1818
1819Enable or disable the referenced skill.
1820
1821Key
1822
1823`skills.config.<index>.path`
1824
1825Type / Values
1826
1827`string (path)`
1828
1829Details
1830
1831Path to a skill folder containing `SKILL.md`.
1832
1833Key
1834
1835`suppress_unstable_features_warning`
1836
1837Type / Values
1838
1839`boolean`
1840
1841Details
1842
1843Suppress the warning that appears when under-development feature flags are enabled.
1844
1845Key
1846
1847`tool_output_token_limit`
1848
1849Type / Values
1850
1851`number`
1852
1853Details
1854
1855Token budget for storing individual tool/function outputs in history.
1856
1857Key
1858
1859`tools.web_search`
1860
1861Type / Values
1862
1863`boolean`
1864
1865Details
1866
1867Deprecated legacy toggle for web search; prefer the top-level `web_search` setting.
1868
1869Key
1870
1871`tui`
1872
1873Type / Values
1874
1875`table`
1876
1877Details
1878
1879TUI-specific options such as enabling inline desktop notifications.
1880
1881Key
1882
1883`tui.alternate_screen`
1884
1885Type / Values
1886
1887`auto | always | never`
1888
1889Details
1890
1891Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).
1892
1893Key
1894
1895`tui.animations`
1896
1897Type / Values
1898
1899`boolean`
1900
1901Details
1902
1903Enable terminal animations (welcome screen, shimmer, spinner) (default: true).
1904
1905Key
1906
1907`tui.notification_method`
1908
1909Type / Values
1910
1911`auto | osc9 | bel`
1912
1913Details
1914
1915Notification method for unfocused terminal notifications (default: auto).
1916
1917Key
1918
1919`tui.notifications`
1920
1921Type / Values
1922
1923`boolean | array<string>`
1924
1925Details
1926
1927Enable TUI notifications; optionally restrict to specific event types.
1928
1929Key
1930
1931`tui.show_tooltips`
1932
1933Type / Values
1934
1935`boolean`
1936
1937Details
1938
1939Show onboarding tooltips in the TUI welcome screen (default: true).
1940
1941Key
1942
1943`tui.status_line`
1944
1945Type / Values
1946
1947`array<string> | null`
1948
1949Details
1950
1951Ordered list of TUI footer status-line item identifiers. `null` disables the status line.
1952
1953Key
1954
1955`web_search`
1956
1957Type / Values
1958
1959`disabled | cached | live`
1960
1961Details
1962
1963Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.
1964
1965Key
1966
1967`windows_wsl_setup_acknowledged`
1968
1969Type / Values
1970
1971`boolean`
1972
1973Details
1974
1975Track Windows onboarding acknowledgement (Windows only).
1976
1977Expand to view all
1978 1470
1979You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).1471You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).
1980 1472
1988 1480
1989## `requirements.toml`1481## `requirements.toml`
1990 1482
19911483`requirements.toml` is an admin-enforced configuration file that constrains security-sensitive settings users can’t override. For details, locations, and examples, see [Admin-enforced requirements](https://developers.openai.com/codex/security#admin-enforced-requirements-requirementstoml).`requirements.toml` is an admin-enforced configuration file that constrains security-sensitive settings users can't override. For details, locations, and examples, see [Admin-enforced requirements](https://developers.openai.com/codex/enterprise/managed-configuration#admin-enforced-requirements-requirementstoml).
1992 1484
1993For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched1485For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched
1994requirements. See the security page for precedence details.1486requirements. See the security page for precedence details.
1995 1487
19961488| Key | Type / Values | Details |Use `[features]` in `requirements.toml` to pin feature flags by the same
19971489| --- | --- | --- |canonical keys that `config.toml` uses. Omitted keys remain unconstrained.
19981490| `allowed_approval_policies` | `array<string>` | Allowed values for `approval\_policy`. |
19991491| `allowed_sandbox_modes` | `array<string>` | Allowed values for `sandbox_mode`. |<ConfigTable
20001492| `allowed_web_search_modes` | `array<string>` | Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. | options={[
20011493| `mcp_servers` | `table` | Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. | {
20021494| `mcp_servers.<id>.identity` | `table` | Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). | key: "allowed_approval_policies",
20031495| `mcp_servers.<id>.identity.command` | `string` | Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. | type: "array<string>",
20041496| `mcp_servers.<id>.identity.url` | `string` | Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. | description:
20051497| `rules` | `table` | Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. | "Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `granular`).",
20061498| `rules.prefix_rules` | `array<table>` | List of enforced prefix rules. Each rule must include `pattern` and `decision`. | },
20071499| `rules.prefix_rules[].decision` | `prompt | forbidden` | Required. Requirements rules can only prompt or forbid (not allow). | {
20081500| `rules.prefix_rules[].justification` | `string` | Optional non-empty rationale surfaced in approval prompts or rejection messages. | key: "allowed_approvals_reviewers",
20091501| `rules.prefix_rules[].pattern` | `array<table>` | Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. | type: "array<string>",
20101502| `rules.prefix_rules[].pattern[].any_of` | `array<string>` | A list of allowed alternative tokens at this position. | description:
20111503| `rules.prefix_rules[].pattern[].token` | `string` | A single literal token at this position. | "Allowed values for `approvals_reviewer`, such as `user` and `auto_review`.",
20121504 },
20131505Key {
20141506 key: "guardian_policy_config",
20151507`allowed_approval_policies` type: "string",
20161508 description:
20171509Type / Values "Managed Markdown policy instructions for automatic review. This takes precedence over local `[auto_review].policy`. Blank values are ignored.",
20181510 },
20191511`array<string>` {
20201512 key: "allowed_sandbox_modes",
20211513Details type: "array<string>",
20221514 description: "Allowed values for `sandbox_mode`.",
20231515Allowed values for `approval\_policy`. },
20241516 {
20251517Key key: "remote_sandbox_config",
20261518 type: "array<table>",
20271519`allowed_sandbox_modes` description:
20281520 "Host-specific sandbox requirements. The first entry whose `hostname_patterns` match the resolved host name overrides top-level `allowed_sandbox_modes` for that requirements source. Host-specific entries currently override sandbox modes only.",
20291521Type / Values },
20301522 {
20311523`array<string>` key: "remote_sandbox_config[].hostname_patterns",
20321524 type: "array<string>",
20331525Details description:
20341526 "Case-insensitive host name patterns. Supports `*` for any sequence of characters and `?` for one character.",
20351527Allowed values for `sandbox_mode`. },
20361528 {
20371529Key key: "remote_sandbox_config[].allowed_sandbox_modes",
20381530 type: "array<string>",
20391531`allowed_web_search_modes` description:
20401532 "Allowed sandbox modes to apply when this host-specific entry matches.",
20411533Type / Values },
20421534 {
20431535`array<string>` key: "allowed_web_search_modes",
20441536 type: "array<string>",
20451537Details description:
20461538 "Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`.",
20471539Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. },
20481540 {
20491541Key key: "features",
20501542 type: "table",
20511543`mcp_servers` description:
20521544 "Pinned feature values keyed by the canonical names from `config.toml`'s `[features]` table.",
20531545Type / Values },
20541546 {
20551547`table` key: "features.<name>",
20561548 type: "boolean",
20571549Details description:
20581550 "Require a specific canonical feature key to stay enabled or disabled.",
20591551Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. },
20601552 {
20611553Key key: "features.in_app_browser",
20621554 type: "boolean",
20631555`mcp_servers.<id>.identity` description:
20641556 "Set to `false` in `requirements.toml` to disable the in-app browser pane.",
20651557Type / Values },
20661558 {
20671559`table` key: "features.browser_use",
20681560 type: "boolean",
20691561Details description:
20701562 "Set to `false` in `requirements.toml` to disable Browser Use and Browser Agent availability.",
20711563Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). },
20721564 {
20731565Key key: "features.computer_use",
20741566 type: "boolean",
20751567`mcp_servers.<id>.identity.command` description:
20761568 "Set to `false` in `requirements.toml` to disable Computer Use availability and related install or enablement flows.",
20771569Type / Values },
20781570 {
20791571`string` key: "experimental_network",
20801572 type: "table",
20811573Details description:
20821574 "Network access requirements enforced from `requirements.toml`. These constraints are separate from `features.network_proxy` and can configure sandboxed networking without the user feature flag.",
20831575Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. },
20841576 {
20851577Key key: "experimental_network.enabled",
20861578 type: "boolean",
20871579`mcp_servers.<id>.identity.url` description:
20881580 "Enable sandboxed networking requirements. This does not grant network access when the active sandbox keeps command networking off.",
20891581Type / Values },
20901582 {
20911583`string` key: "experimental_network.http_port",
20921584 type: "integer",
20931585Details description:
20941586 "Loopback HTTP listener port to use for `[experimental_network]` requirements.",
20951587Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. },
20961588 {
20971589Key key: "experimental_network.socks_port",
20981590 type: "integer",
20991591`rules` description:
21001592 "Loopback SOCKS5 listener port to use for `[experimental_network]` requirements.",
21011593Type / Values },
21021594 {
21031595`table` key: "experimental_network.allow_upstream_proxy",
21041596 type: "boolean",
21051597Details description:
21061598 "Allow sandboxed networking to chain through an upstream proxy from the environment.",
21071599Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. },
21081600 {
21091601Key key: "experimental_network.dangerously_allow_non_loopback_proxy",
21101602 type: "boolean",
21111603`rules.prefix_rules` description:
21121604 "Permit non-loopback listener addresses for `[experimental_network]` requirements. Enabling it can expose listeners beyond localhost.",
21131605Type / Values },
21141606 {
21151607`array<table>` key: "experimental_network.dangerously_allow_all_unix_sockets",
21161608 type: "boolean",
21171609Details description:
21181610 "Permit arbitrary Unix socket destinations instead of allowlist-only access. Use only in tightly controlled environments.",
21191611List of enforced prefix rules. Each rule must include `pattern` and `decision`. },
21201612 {
21211613Key key: "experimental_network.domains",
21221614 type: "map<string, allow | deny>",
21231615`rules.prefix_rules[].decision` description:
21241616 "Map-shaped administrator domain policy for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. `deny` wins on conflicts. Do not combine this with `experimental_network.allowed_domains` or `experimental_network.denied_domains`.",
21251617Type / Values },
21261618 {
21271619`prompt | forbidden` key: "experimental_network.allowed_domains",
21281620 type: "array<string>",
21291621Details description:
21301622 "List-shaped administrator allow rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",
21311623Required. Requirements rules can only prompt or forbid (not allow). },
21321624 {
21331625Key key: "experimental_network.denied_domains",
21341626 type: "array<string>",
21351627`rules.prefix_rules[].justification` description:
21361628 "List-shaped administrator deny rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",
21371629Type / Values },
21381630 {
21391631`string` key: "experimental_network.managed_allowed_domains_only",
21401632 type: "boolean",
21411633Details description:
21421634 "When `true`, only administrator-managed allow rules remain effective while sandboxed networking requirements are active; user allowlist additions are ignored. Without managed allow rules, user-added domain allow rules do not remain effective.",
21431635Optional non-empty rationale surfaced in approval prompts or rejection messages. },
21441636 {
21451637Key key: "experimental_network.unix_sockets",
21461638 type: "map<string, allow | none>",
21471639`rules.prefix_rules[].pattern` description:
21481640 "Administrator-managed Unix socket policy for sandboxed networking.",
21491641Type / Values },
21501642 {
21511643`array<table>` key: "experimental_network.allow_local_binding",
21521644 type: "boolean",
21531645Details description:
21541646 "Permit broader local/private-network access for sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",
21551647Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. },
21561648 {
21571649Key key: "hooks",
21581650 type: "table",
21591651`rules.prefix_rules[].pattern[].any_of` description:
21601652 "Admin-enforced managed lifecycle hooks. Requires a managed hook directory and uses the same event schema as inline `[hooks]` in `config.toml`.",
21611653Type / Values },
21621654 {
21631655`array<string>` key: "hooks.managed_dir",
21641656 type: "string (absolute path)",
21651657Details description:
21661658 "Directory containing managed hook scripts on macOS and Linux. Codex validates that it is absolute and exists before loading managed hooks.",
21671659A list of allowed alternative tokens at this position. },
21681660 {
21691661Key key: "hooks.windows_managed_dir",
21701662 type: "string (absolute path)",
21711663`rules.prefix_rules[].pattern[].token` description:
21721664 "Directory containing managed hook scripts on Windows. Codex validates that it is absolute and exists before loading managed hooks.",
21731665Type / Values },
21741666 {
21751667`string` key: "hooks.<Event>",
21761668 type: "array<table>",
21771669Details description:
21781670 "Matcher groups for a hook event such as `PreToolUse`, `PermissionRequest`, `PostToolUse`, `SessionStart`, `UserPromptSubmit`, or `Stop`.",
21791671A single literal token at this position. },
21801672 {
21811673Expand to view all key: "hooks.<Event>[].hooks",
1674 type: "array<table>",
1675 description:
1676 "Hook handlers for a matcher group. Command hooks are currently supported; prompt and agent hook handlers are parsed but skipped.",
1677 },
1678 {
1679 key: "permissions.filesystem.deny_read",
1680 type: "array<string>",
1681 description:
1682 "Admin-enforced filesystem read denials. Entries can be paths or glob patterns, and users cannot weaken them with local config.",
1683 },
1684 {
1685 key: "mcp_servers",
1686 type: "table",
1687 description:
1688 "Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled.",
1689 },
1690 {
1691 key: "mcp_servers.<id>.identity",
1692 type: "table",
1693 description:
1694 "Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP).",
1695 },
1696 {
1697 key: "mcp_servers.<id>.identity.command",
1698 type: "string",
1699 description:
1700 "Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command.",
1701 },
1702 {
1703 key: "mcp_servers.<id>.identity.url",
1704 type: "string",
1705 description:
1706 "Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL.",
1707 },
1708 {
1709 key: "rules",
1710 type: "table",
1711 description:
1712 "Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive.",
1713 },
1714 {
1715 key: "rules.prefix_rules",
1716 type: "array<table>",
1717 description:
1718 "List of enforced prefix rules. Each rule must include `pattern` and `decision`.",
1719 },
1720 {
1721 key: "rules.prefix_rules[].pattern",
1722 type: "array<table>",
1723 description:
1724 "Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`.",
1725 },
1726 {
1727 key: "rules.prefix_rules[].pattern[].token",
1728 type: "string",
1729 description: "A single literal token at this position.",
1730 },
1731 {
1732 key: "rules.prefix_rules[].pattern[].any_of",
1733 type: "array<string>",
1734 description: "A list of allowed alternative tokens at this position.",
1735 },
1736 {
1737 key: "rules.prefix_rules[].decision",
1738 type: "prompt | forbidden",
1739 description:
1740 "Required. Requirements rules can only prompt or forbid (not allow).",
1741 },
1742 {
1743 key: "rules.prefix_rules[].justification",
1744 type: "string",
1745 description:
1746 "Optional non-empty rationale surfaced in approval prompts or rejection messages.",
1747 },
1748 ]}
1749 client:load
1750/>