SpyBara
Go Premium Account
2026
24 Feb 2026, 06:27
19 May 2026, 11:58 18 May 2026, 22:01 14 May 2026, 21:00 14 May 2026, 07:00 13 May 2026, 00:57 12 May 2026, 01:59 11 May 2026, 18:00 7 May 2026, 20:02 7 May 2026, 17:08 5 May 2026, 23:00 2 May 2026, 06:45 2 May 2026, 00:48 1 May 2026, 18:29 30 Apr 2026, 18:36 29 Apr 2026, 12:40 29 Apr 2026, 00:50 25 Apr 2026, 06:37 25 Apr 2026, 00:42 24 Apr 2026, 18:20 24 Apr 2026, 12:28 23 Apr 2026, 18:31 23 Apr 2026, 12:28 23 Apr 2026, 00:46 22 Apr 2026, 18:29 22 Apr 2026, 00:42 21 Apr 2026, 18:29 21 Apr 2026, 12:30 21 Apr 2026, 06:45 20 Apr 2026, 18:26 20 Apr 2026, 06:53 18 Apr 2026, 18:18 17 Apr 2026, 00:44 16 Apr 2026, 18:31 16 Apr 2026, 00:46 15 Apr 2026, 18:31 15 Apr 2026, 06:44 14 Apr 2026, 18:31 14 Apr 2026, 12:29 13 Apr 2026, 18:37 13 Apr 2026, 00:44 12 Apr 2026, 06:38 10 Apr 2026, 18:23 9 Apr 2026, 00:33 8 Apr 2026, 18:32 8 Apr 2026, 00:40 7 Apr 2026, 00:40 2 Apr 2026, 18:23 31 Mar 2026, 06:35 31 Mar 2026, 00:39 28 Mar 2026, 06:26 28 Mar 2026, 00:36 27 Mar 2026, 18:23 27 Mar 2026, 00:39 26 Mar 2026, 18:27 25 Mar 2026, 18:24 23 Mar 2026, 18:22 20 Mar 2026, 00:35 18 Mar 2026, 12:23 18 Mar 2026, 00:36 17 Mar 2026, 18:24 17 Mar 2026, 00:33 16 Mar 2026, 18:25 16 Mar 2026, 12:23 14 Mar 2026, 00:32 13 Mar 2026, 18:15 13 Mar 2026, 00:34 11 Mar 2026, 00:31 9 Mar 2026, 00:34 8 Mar 2026, 18:10 8 Mar 2026, 00:35 7 Mar 2026, 18:10 7 Mar 2026, 06:14 7 Mar 2026, 00:33 6 Mar 2026, 00:38 5 Mar 2026, 18:41 5 Mar 2026, 06:22 5 Mar 2026, 00:34 4 Mar 2026, 18:18 4 Mar 2026, 06:20 3 Mar 2026, 18:20 3 Mar 2026, 00:35 27 Feb 2026, 18:15 24 Feb 2026, 06:27 24 Feb 2026, 00:33 23 Feb 2026, 18:27 21 Feb 2026, 00:33 20 Feb 2026, 12:16 19 Feb 2026, 20:53 19 Feb 2026, 20:37
18 May 2026, 22:01
19 May 2026, 11:58 18 May 2026, 22:01 14 May 2026, 21:00 14 May 2026, 07:00 13 May 2026, 00:57 12 May 2026, 01:59 11 May 2026, 18:00 7 May 2026, 20:02 7 May 2026, 17:08 5 May 2026, 23:00 2 May 2026, 06:45 2 May 2026, 00:48 1 May 2026, 18:29 30 Apr 2026, 18:36 29 Apr 2026, 12:40 29 Apr 2026, 00:50 25 Apr 2026, 06:37 25 Apr 2026, 00:42 24 Apr 2026, 18:20 24 Apr 2026, 12:28 23 Apr 2026, 18:31 23 Apr 2026, 12:28 23 Apr 2026, 00:46 22 Apr 2026, 18:29 22 Apr 2026, 00:42 21 Apr 2026, 18:29 21 Apr 2026, 12:30 21 Apr 2026, 06:45 20 Apr 2026, 18:26 20 Apr 2026, 06:53 18 Apr 2026, 18:18 17 Apr 2026, 00:44 16 Apr 2026, 18:31 16 Apr 2026, 00:46 15 Apr 2026, 18:31 15 Apr 2026, 06:44 14 Apr 2026, 18:31 14 Apr 2026, 12:29 13 Apr 2026, 18:37 13 Apr 2026, 00:44 12 Apr 2026, 06:38 10 Apr 2026, 18:23 9 Apr 2026, 00:33 8 Apr 2026, 18:32 8 Apr 2026, 00:40 7 Apr 2026, 00:40 2 Apr 2026, 18:23 31 Mar 2026, 06:35 31 Mar 2026, 00:39 28 Mar 2026, 06:26 28 Mar 2026, 00:36 27 Mar 2026, 18:23 27 Mar 2026, 00:39 26 Mar 2026, 18:27 25 Mar 2026, 18:24 23 Mar 2026, 18:22 20 Mar 2026, 00:35 18 Mar 2026, 12:23 18 Mar 2026, 00:36 17 Mar 2026, 18:24 17 Mar 2026, 00:33 16 Mar 2026, 18:25 16 Mar 2026, 12:23 14 Mar 2026, 00:32 13 Mar 2026, 18:15 13 Mar 2026, 00:34 11 Mar 2026, 00:31 9 Mar 2026, 00:34 8 Mar 2026, 18:10 8 Mar 2026, 00:35 7 Mar 2026, 18:10 7 Mar 2026, 06:14 7 Mar 2026, 00:33 6 Mar 2026, 00:38 5 Mar 2026, 18:41 5 Mar 2026, 06:22 5 Mar 2026, 00:34 4 Mar 2026, 18:18 4 Mar 2026, 06:20 3 Mar 2026, 18:20 3 Mar 2026, 00:35 27 Feb 2026, 18:15 24 Feb 2026, 06:27 24 Feb 2026, 00:33 23 Feb 2026, 18:27 21 Feb 2026, 00:33 20 Feb 2026, 12:16 19 Feb 2026, 20:53 19 Feb 2026, 20:37
Fri 1 18:29 Sat 2 00:48 Sat 2 06:45 Tue 5 23:00 Thu 7 17:08 Thu 7 20:02 Mon 11 18:00 Tue 12 01:59 Wed 13 00:57 Thu 14 07:00 Thu 14 21:00 Mon 18 22:01 Tue 19 11:58

After 2026-05-02 06:45 UTC, this monitor no longer uses markdownified HTML/MDX. Comparisons across that boundary can therefore show more extensive diffs.

config-reference.md +1724 −2363

Details

6 6 

7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.

8 8 

9For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/security#network-access).9Project-scoped config can't override machine-local provider, auth,

10 10notification, profile, or telemetry routing keys. Codex ignores

11| Key | Type / Values | Details |11`openai_base_url`, `chatgpt_base_url`, `model_provider`, `model_providers`,

12| --- | --- | --- |12`notify`, `profile`, `profiles`, `experimental_realtime_ws_base_url`, and

13| `agents.<name>.config_file` | `string (path)` | Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. |13`otel` when they appear in a project-local `.codex/config.toml`; put those in

14| `agents.<name>.description` | `string` | Role guidance shown to Codex when choosing and spawning that agent type. |14user-level config instead.

15| `agents.max_depth` | `number` | Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1). |15 

16| `agents.max_threads` | `number` | Maximum number of agent threads that can be open concurrently. |16For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/agent-approvals-security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/agent-approvals-security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/agent-approvals-security#network-access).

17| `allow_login_shell` | `boolean` | Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells. |17 

18| `approval_policy` | `untrusted | on-request | never | { reject = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool } }` | Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { reject = { ... } }` to auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. |18<ConfigTable

19| `approval_policy.reject.mcp_elicitations` | `boolean` | When `true`, MCP elicitation prompts are auto-rejected instead of shown to the user. |19 options={[

20| `approval_policy.reject.rules` | `boolean` | When `true`, approvals triggered by execpolicy `prompt` rules are auto-rejected. |20 {

21| `approval_policy.reject.sandbox_approval` | `boolean` | When `true`, sandbox escalation approval prompts are auto-rejected. |21 key: "model",

22| `apps._default.destructive_enabled` | `boolean` | Default allow/deny for app tools with `destructive_hint = true`. |22 type: "string",

23| `apps._default.enabled` | `boolean` | Default app enabled state for all apps unless overridden per app. |23 description: "Model to use (e.g., `gpt-5.5`).",

24| `apps._default.open_world_enabled` | `boolean` | Default allow/deny for app tools with `open_world_hint = true`. |24 },

25| `apps.<id>.default_tools_approval_mode` | `auto | prompt | approve` | Default approval behavior for tools in this app unless a per-tool override exists. |25 {

26| `apps.<id>.default_tools_enabled` | `boolean` | Default enabled state for tools in this app unless a per-tool override exists. |26 key: "review_model",

27| `apps.<id>.destructive_enabled` | `boolean` | Allow or block tools in this app that advertise `destructive_hint = true`. |27 type: "string",

28| `apps.<id>.enabled` | `boolean` | Enable or disable a specific app/connector by id (default: true). |28 description:

29| `apps.<id>.open_world_enabled` | `boolean` | Allow or block tools in this app that advertise `open_world_hint = true`. |29 "Optional model override used by `/review` (defaults to the current session model).",

30| `apps.<id>.tools.<tool>.approval_mode` | `auto | prompt | approve` | Per-tool approval behavior override for a single app tool. |30 },

31| `apps.<id>.tools.<tool>.enabled` | `boolean` | Per-tool enabled override for an app tool (for example `repos/list`). |31 {

32| `background_terminal_max_timeout` | `number` | Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key. |32 key: "model_provider",

33| `chatgpt_base_url` | `string` | Override the base URL used during the ChatGPT login flow. |33 type: "string",

34| `check_for_update_on_startup` | `boolean` | Check for Codex updates on startup (set to false only when updates are centrally managed). |34 description: "Provider id from `model_providers` (default: `openai`).",

35| `cli_auth_credentials_store` | `file | keyring | auto` | Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). |35 },

36| `compact_prompt` | `string` | Inline override for the history compaction prompt. |36 {

37| `developer_instructions` | `string` | Additional developer instructions injected into the session (optional). |37 key: "openai_base_url",

38| `disable_paste_burst` | `boolean` | Disable burst-paste detection in the TUI. |38 type: "string",

39| `experimental_compact_prompt_file` | `string (path)` | Load the compaction prompt override from a file (experimental). |39 description:

40| `experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. |40 "Base URL override for the built-in `openai` model provider.",

41| `experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. |41 },

42| `features.apply_patch_freeform` | `boolean` | Expose the freeform `apply_patch` tool (experimental). |42 {

43| `features.apps` | `boolean` | Enable ChatGPT Apps/connectors support (experimental). |43 key: "model_context_window",

44| `features.apps_mcp_gateway` | `boolean` | Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). |44 type: "number",

45| `features.child_agents_md` | `boolean` | Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). |45 description: "Context window tokens available to the active model.",

46| `features.collaboration_modes` | `boolean` | Enable collaboration modes such as plan mode (stable; on by default). |46 },

47| `features.multi_agent` | `boolean` | Enable multi-agent collaboration tools (`spawn\_agent`, `send\_input`, `resume\_agent`, `wait`, and `close\_agent`) (experimental; off by default). |47 {

48| `features.personality` | `boolean` | Enable personality selection controls (stable; on by default). |48 key: "model_auto_compact_token_limit",

49| `features.powershell_utf8` | `boolean` | Force PowerShell UTF-8 output (defaults to true). |49 type: "number",

50| `features.remote_models` | `boolean` | Refresh remote model list before showing readiness (experimental). |50 description:

51| `features.request_rule` | `boolean` | Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). |51 "Token threshold that triggers automatic history compaction (unset uses model defaults).",

52| `features.runtime_metrics` | `boolean` | Show runtime metrics summary in TUI turn separators (experimental). |52 },

53| `features.search_tool` | `boolean` | Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). |53 {

54| `features.shell_snapshot` | `boolean` | Snapshot shell environment to speed up repeated commands (beta). |54 key: "model_catalog_json",

55| `features.shell_tool` | `boolean` | Enable the default `shell` tool for running commands (stable; on by default). |55 type: "string (path)",

56| `features.unified_exec` | `boolean` | Use the unified PTY-backed exec tool (beta). |56 description:

57| `features.use_linux_sandbox_bwrap` | `boolean` | Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). |57 "Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile.",

58| `features.web_search` | `boolean` | Deprecated legacy toggle; prefer the top-level `web_search` setting. |58 },

59| `features.web_search_cached` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. |59 {

60| `features.web_search_request` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. |60 key: "oss_provider",

61| `feedback.enabled` | `boolean` | Enable feedback submission via `/feedback` across Codex surfaces (default: true). |61 type: "lmstudio | ollama",

62| `file_opener` | `vscode | vscode-insiders | windsurf | cursor | none` | URI scheme used to open citations from Codex output (default: `vscode`). |62 description:

63| `forced_chatgpt_workspace_id` | `string (uuid)` | Limit ChatGPT logins to a specific workspace identifier. |63 "Default local provider used when running with `--oss` (defaults to prompting if unset).",

64| `forced_login_method` | `chatgpt | api` | Restrict Codex to a specific authentication method. |64 },

65| `hide_agent_reasoning` | `boolean` | Suppress reasoning events in both the TUI and `codex exec` output. |65 {

66| `history.max_bytes` | `number` | If set, caps the history file size in bytes by dropping oldest entries. |66 key: "approval_policy",

67| `history.persistence` | `save-all | none` | Control whether Codex saves session transcripts to history.jsonl. |67 type: "untrusted | on-request | never | { granular = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool, request_permissions = bool, skill_approval = bool } }",

68| `include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. |68 description:

69| `instructions` | `string` | Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. |69 "Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { granular = { ... } }` to allow or auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs.",

70| `log_dir` | `string (path)` | Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. |70 },

71| `mcp_oauth_callback_port` | `integer` | Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. |71 {

72| `mcp_oauth_callback_url` | `string` | Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port. |72 key: "approval_policy.granular.sandbox_approval",

73| `mcp_oauth_credentials_store` | `auto | file | keyring` | Preferred store for MCP OAuth credentials. |73 type: "boolean",

74| `mcp_servers.<id>.args` | `array<string>` | Arguments passed to the MCP stdio server command. |74 description:

75| `mcp_servers.<id>.bearer_token_env_var` | `string` | Environment variable sourcing the bearer token for an MCP HTTP server. |75 "When `true`, sandbox escalation approval prompts are allowed to surface.",

76| `mcp_servers.<id>.command` | `string` | Launcher command for an MCP stdio server. |76 },

77| `mcp_servers.<id>.cwd` | `string` | Working directory for the MCP stdio server process. |77 {

78| `mcp_servers.<id>.disabled_tools` | `array<string>` | Deny list applied after `enabled_tools` for the MCP server. |78 key: "approval_policy.granular.rules",

79| `mcp_servers.<id>.enabled` | `boolean` | Disable an MCP server without removing its configuration. |79 type: "boolean",

80| `mcp_servers.<id>.enabled_tools` | `array<string>` | Allow list of tool names exposed by the MCP server. |80 description:

81| `mcp_servers.<id>.env` | `map<string,string>` | Environment variables forwarded to the MCP stdio server. |81 "When `true`, approvals triggered by execpolicy `prompt` rules are allowed to surface.",

82| `mcp_servers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables for an MCP HTTP server. |82 },

83| `mcp_servers.<id>.env_vars` | `array<string>` | Additional environment variables to whitelist for an MCP stdio server. |83 {

84| `mcp_servers.<id>.http_headers` | `map<string,string>` | Static HTTP headers included with each MCP HTTP request. |84 key: "approval_policy.granular.mcp_elicitations",

85| `mcp_servers.<id>.required` | `boolean` | When true, fail startup/resume if this enabled MCP server cannot initialize. |85 type: "boolean",

86| `mcp_servers.<id>.startup_timeout_ms` | `number` | Alias for `startup_timeout_sec` in milliseconds. |86 description:

87| `mcp_servers.<id>.startup_timeout_sec` | `number` | Override the default 10s startup timeout for an MCP server. |87 "When `true`, MCP elicitation prompts are allowed to surface instead of being auto-rejected.",

88| `mcp_servers.<id>.tool_timeout_sec` | `number` | Override the default 60s per-tool timeout for an MCP server. |88 },

89| `mcp_servers.<id>.url` | `string` | Endpoint for an MCP streamable HTTP server. |89 {

90| `model` | `string` | Model to use (e.g., `gpt-5-codex`). |90 key: "approval_policy.granular.request_permissions",

91| `model_auto_compact_token_limit` | `number` | Token threshold that triggers automatic history compaction (unset uses model defaults). |91 type: "boolean",

92| `model_catalog_json` | `string (path)` | Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile. |92 description:

93| `model_context_window` | `number` | Context window tokens available to the active model. |93 "When `true`, prompts from the `request_permissions` tool are allowed to surface.",

94| `model_instructions_file` | `string (path)` | Replacement for built-in instructions instead of `AGENTS.md`. |94 },

95| `model_provider` | `string` | Provider id from `model_providers` (default: `openai`). |95 {

96| `model_providers.<id>.base_url` | `string` | API base URL for the model provider. |96 key: "approval_policy.granular.skill_approval",

97| `model_providers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables when present. |97 type: "boolean",

98| `model_providers.<id>.env_key` | `string` | Environment variable supplying the provider API key. |98 description:

99| `model_providers.<id>.env_key_instructions` | `string` | Optional setup guidance for the provider API key. |99 "When `true`, skill-script approval prompts are allowed to surface.",

100| `model_providers.<id>.experimental_bearer_token` | `string` | Direct bearer token for the provider (discouraged; use `env_key`). |100 },

101| `model_providers.<id>.http_headers` | `map<string,string>` | Static HTTP headers added to provider requests. |101 {

102| `model_providers.<id>.name` | `string` | Display name for a custom model provider. |102 key: "approvals_reviewer",

103| `model_providers.<id>.query_params` | `map<string,string>` | Extra query parameters appended to provider requests. |103 type: "user | auto_review",

104| `model_providers.<id>.request_max_retries` | `number` | Retry count for HTTP requests to the provider (default: 4). |104 description:

105| `model_providers.<id>.requires_openai_auth` | `boolean` | The provider uses OpenAI authentication (defaults to false). |105 "Who reviews eligible approval prompts under `on-request` or granular approval policies. Defaults to `user`; `auto_review` uses the reviewer subagent. This setting doesn't change sandboxing or review actions already allowed inside the sandbox.",

106| `model_providers.<id>.stream_idle_timeout_ms` | `number` | Idle timeout for SSE streams in milliseconds (default: 300000). |106 },

107| `model_providers.<id>.stream_max_retries` | `number` | Retry count for SSE streaming interruptions (default: 5). |107 {

108| `model_providers.<id>.wire_api` | `chat | responses` | Protocol used by the provider (defaults to `chat` if omitted). |108 key: "auto_review.policy",

109| `model_reasoning_effort` | `minimal | low | medium | high | xhigh` | Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). |109 type: "string",

110| `model_reasoning_summary` | `auto | concise | detailed | none` | Select reasoning summary detail or disable summaries entirely. |110 description:

111| `model_supports_reasoning_summaries` | `boolean` | Force Codex to send or not send reasoning metadata. |111 "Local Markdown policy instructions for automatic review. Managed `guardian_policy_config` takes precedence. Blank values are ignored.",

112| `model_verbosity` | `low | medium | high` | Control GPT-5 Responses API verbosity (defaults to `medium`). |112 },

113| `notice.hide_full_access_warning` | `boolean` | Track acknowledgement of the full access warning prompt. |113 {

114| `notice.hide_gpt-5.1-codex-max_migration_prompt` | `boolean` | Track acknowledgement of the gpt-5.1-codex-max migration prompt. |114 key: "allow_login_shell",

115| `notice.hide_gpt5_1_migration_prompt` | `boolean` | Track acknowledgement of the GPT-5.1 migration prompt. |115 type: "boolean",

116| `notice.hide_rate_limit_model_nudge` | `boolean` | Track opt-out of the rate limit model switch reminder. |116 description:

117| `notice.hide_world_writable_warning` | `boolean` | Track acknowledgement of the Windows world-writable directories warning. |117 "Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells.",

118| `notice.model_migrations` | `map<string,string>` | Track acknowledged model migrations as old->new mappings. |118 },

119| `notify` | `array<string>` | Command invoked for notifications; receives a JSON payload from Codex. |119 {

120| `oss_provider` | `lmstudio | ollama` | Default local provider used when running with `--oss` (defaults to prompting if unset). |120 key: "sandbox_mode",

121| `otel.environment` | `string` | Environment tag applied to emitted OpenTelemetry events (default: `dev`). |121 type: "read-only | workspace-write | danger-full-access",

122| `otel.exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry exporter and provide any endpoint metadata. |122 description:

123| `otel.exporter.<id>.endpoint` | `string` | Exporter endpoint for OTEL logs. |123 "Sandbox policy for filesystem and network access during command execution.",

124| `otel.exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL exporter requests. |124 },

125| `otel.exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP exporter. |125 {

126| `otel.exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL exporter TLS. |126 key: "sandbox_workspace_write.writable_roots",

127| `otel.exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL exporter TLS. |127 type: "array<string>",

128| `otel.exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL exporter TLS. |128 description:

129| `otel.log_user_prompt` | `boolean` | Opt in to exporting raw user prompts with OpenTelemetry logs. |129 'Additional writable roots when `sandbox_mode = "workspace-write"`.',

130| `otel.trace_exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry trace exporter and provide any endpoint metadata. |130 },

131| `otel.trace_exporter.<id>.endpoint` | `string` | Trace exporter endpoint for OTEL logs. |131 {

132| `otel.trace_exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL trace exporter requests. |132 key: "sandbox_workspace_write.network_access",

133| `otel.trace_exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP trace exporter. |133 type: "boolean",

134| `otel.trace_exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL trace exporter TLS. |134 description:

135| `otel.trace_exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL trace exporter TLS. |135 "Allow outbound network access inside the workspace-write sandbox.",

136| `otel.trace_exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL trace exporter TLS. |136 },

137| `personality` | `none | friendly | pragmatic` | Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`. |137 {

138| `profile` | `string` | Default profile applied at startup (equivalent to `--profile`). |138 key: "sandbox_workspace_write.exclude_tmpdir_env_var",

139| `profiles.<name>.*` | `various` | Profile-scoped overrides for any of the supported configuration keys. |139 type: "boolean",

140| `profiles.<name>.experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. |140 description:

141| `profiles.<name>.experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec`. |141 "Exclude `$TMPDIR` from writable roots in workspace-write mode.",

142| `profiles.<name>.include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. |142 },

143| `profiles.<name>.model_catalog_json` | `string (path)` | Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile). |143 {

144| `profiles.<name>.oss_provider` | `lmstudio | ollama` | Profile-scoped OSS provider for `--oss` sessions. |144 key: "sandbox_workspace_write.exclude_slash_tmp",

145| `profiles.<name>.personality` | `none | friendly | pragmatic` | Profile-scoped communication style override for supported models. |145 type: "boolean",

146| `profiles.<name>.web_search` | `disabled | cached | live` | Profile-scoped web search mode override (default: `"cached"`). |146 description:

147| `project_doc_fallback_filenames` | `array<string>` | Additional filenames to try when `AGENTS.md` is missing. |147 "Exclude `/tmp` from writable roots in workspace-write mode.",

148| `project_doc_max_bytes` | `number` | Maximum bytes read from `AGENTS.md` when building project instructions. |148 },

149| `project_root_markers` | `array<string>` | List of project root marker filenames; used when searching parent directories for the project root. |149 {

150| `projects.<path>.trust_level` | `string` | Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers. |150 key: "windows.sandbox",

151| `review_model` | `string` | Optional model override used by `/review` (defaults to the current session model). |151 type: "unelevated | elevated",

152| `sandbox_mode` | `read-only | workspace-write | danger-full-access` | Sandbox policy for filesystem and network access during command execution. |152 description:

153| `sandbox_workspace_write.exclude_slash_tmp` | `boolean` | Exclude `/tmp` from writable roots in workspace-write mode. |153 "Windows-only native sandbox mode when running Codex natively on Windows.",

154| `sandbox_workspace_write.exclude_tmpdir_env_var` | `boolean` | Exclude `$TMPDIR` from writable roots in workspace-write mode. |154 },

155| `sandbox_workspace_write.network_access` | `boolean` | Allow outbound network access inside the workspace-write sandbox. |155 {

156| `sandbox_workspace_write.writable_roots` | `array<string>` | Additional writable roots when `sandbox_mode = "workspace-write"`. |156 key: "windows.sandbox_private_desktop",

157| `shell_environment_policy.exclude` | `array<string>` | Glob patterns for removing environment variables after the defaults. |157 type: "boolean",

158| `shell_environment_policy.experimental_use_profile` | `boolean` | Use the user shell profile when spawning subprocesses. |158 description:

159| `shell_environment_policy.ignore_default_excludes` | `boolean` | Keep variables containing KEY/SECRET/TOKEN before other filters run. |159 "Run the final sandboxed child process on a private desktop by default on native Windows. Set `false` only for compatibility with the older `Winsta0\\\\Default` behavior.",

160| `shell_environment_policy.include_only` | `array<string>` | Whitelist of patterns; when set only matching variables are kept. |160 },

161| `shell_environment_policy.inherit` | `all | core | none` | Baseline environment inheritance when spawning subprocesses. |161 {

162| `shell_environment_policy.set` | `map<string,string>` | Explicit environment overrides injected into every subprocess. |162 key: "notify",

163| `show_raw_agent_reasoning` | `boolean` | Surface raw reasoning content when the active model emits it. |163 type: "array<string>",

164| `skills.config` | `array<object>` | Per-skill enablement overrides stored in config.toml. |164 description:

165| `skills.config.<index>.enabled` | `boolean` | Enable or disable the referenced skill. |165 "Command invoked for notifications; receives a JSON payload from Codex.",

166| `skills.config.<index>.path` | `string (path)` | Path to a skill folder containing `SKILL.md`. |166 },

167| `suppress_unstable_features_warning` | `boolean` | Suppress the warning that appears when under-development feature flags are enabled. |167 {

168| `tool_output_token_limit` | `number` | Token budget for storing individual tool/function outputs in history. |168 key: "check_for_update_on_startup",

169| `tools.web_search` | `boolean` | Deprecated legacy toggle for web search; prefer the top-level `web_search` setting. |169 type: "boolean",

170| `tui` | `table` | TUI-specific options such as enabling inline desktop notifications. |170 description:

171| `tui.alternate_screen` | `auto | always | never` | Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback). |171 "Check for Codex updates on startup (set to false only when updates are centrally managed).",

172| `tui.animations` | `boolean` | Enable terminal animations (welcome screen, shimmer, spinner) (default: true). |172 },

173| `tui.notification_method` | `auto | osc9 | bel` | Notification method for unfocused terminal notifications (default: auto). |173 {

174| `tui.notifications` | `boolean | array<string>` | Enable TUI notifications; optionally restrict to specific event types. |174 key: "feedback.enabled",

175| `tui.show_tooltips` | `boolean` | Show onboarding tooltips in the TUI welcome screen (default: true). |175 type: "boolean",

176| `tui.status_line` | `array<string> | null` | Ordered list of TUI footer status-line item identifiers. `null` disables the status line. |176 description:

177| `web_search` | `disabled | cached | live` | Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool. |177 "Enable feedback submission via `/feedback` across Codex surfaces (default: true).",

178| `windows_wsl_setup_acknowledged` | `boolean` | Track Windows onboarding acknowledgement (Windows only). |178 },

179| `windows.sandbox` | `unelevated | elevated` | Windows-only native sandbox mode when running Codex natively on Windows. |179 {

180 180 key: "analytics.enabled",

181Key181 type: "boolean",

182 182 description:

183`agents.<name>.config_file`183 "Enable or disable analytics for this machine/profile. When unset, the client default applies.",

184 184 },

185Type / Values185 {

186 186 key: "instructions",

187`string (path)`187 type: "string",

188 188 description:

189Details189 "Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`.",

190 190 },

191Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role.191 {

192 192 key: "developer_instructions",

193Key193 type: "string",

194 194 description:

195`agents.<name>.description`195 "Additional developer instructions injected into the session (optional).",

196 196 },

197Type / Values197 {

198 198 key: "log_dir",

199`string`199 type: "string (path)",

200 200 description:

201Details201 "Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`.",

202 202 },

203Role guidance shown to Codex when choosing and spawning that agent type.203 {

204 204 key: "sqlite_home",

205Key205 type: "string (path)",

206 206 description:

207`agents.max_depth`207 "Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state.",

208 208 },

209Type / Values209 {

210 210 key: "compact_prompt",

211`number`211 type: "string",

212 212 description: "Inline override for the history compaction prompt.",

213Details213 },

214 214 {

215Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1).215 key: "commit_attribution",

216 216 type: "string",

217Key217 description:

218 218 'Commit co-author trailer used when `[features].codex_git_commit` is enabled. Defaults to `Codex <noreply@openai.com>`; set `""` to disable.',

219`agents.max_threads`219 },

220 220 {

221Type / Values221 key: "model_instructions_file",

222 222 type: "string (path)",

223`number`223 description:

224 224 "Replacement for built-in instructions instead of `AGENTS.md`.",

225Details225 },

226 226 {

227Maximum number of agent threads that can be open concurrently.227 key: "personality",

228 228 type: "none | friendly | pragmatic",

229Key229 description:

230 230 "Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.",

231`allow_login_shell`231 },

232 232 {

233Type / Values233 key: "service_tier",

234 234 type: "string",

235`boolean`235 description:

236 236 "Preferred service tier for new turns. Built-in values include `flex` and `fast`; legacy `fast` config maps to the request value `priority`, and catalog-provided tier IDs can also be stored.",

237Details237 },

238 238 {

239Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells.239 key: "experimental_compact_prompt_file",

240 240 type: "string (path)",

241Key241 description:

242 242 "Load the compaction prompt override from a file (experimental).",

243`approval_policy`243 },

244 244 {

245Type / Values245 key: "skills.config",

246 246 type: "array<object>",

247`untrusted | on-request | never | { reject = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool } }`247 description: "Per-skill enablement overrides stored in config.toml.",

248 248 },

249Details249 {

250 250 key: "skills.config.<index>.path",

251Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { reject = { ... } }` to auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs.251 type: "string (path)",

252 252 description: "Path to a skill folder containing `SKILL.md`.",

253Key253 },

254 254 {

255`approval_policy.reject.mcp_elicitations`255 key: "skills.config.<index>.enabled",

256 256 type: "boolean",

257Type / Values257 description: "Enable or disable the referenced skill.",

258 258 },

259`boolean`259 {

260 260 key: "apps.<id>.enabled",

261Details261 type: "boolean",

262 262 description:

263When `true`, MCP elicitation prompts are auto-rejected instead of shown to the user.263 "Enable or disable a specific app/connector by id (default: true).",

264 264 },

265Key265 {

266 266 key: "apps._default.enabled",

267`approval_policy.reject.rules`267 type: "boolean",

268 268 description:

269Type / Values269 "Default app enabled state for all apps unless overridden per app.",

270 270 },

271`boolean`271 {

272 272 key: "apps._default.destructive_enabled",

273Details273 type: "boolean",

274 274 description:

275When `true`, approvals triggered by execpolicy `prompt` rules are auto-rejected.275 "Default allow/deny for app tools with `destructive_hint = true`.",

276 276 },

277Key277 {

278 278 key: "apps._default.open_world_enabled",

279`approval_policy.reject.sandbox_approval`279 type: "boolean",

280 280 description:

281Type / Values281 "Default allow/deny for app tools with `open_world_hint = true`.",

282 282 },

283`boolean`283 {

284 284 key: "apps.<id>.destructive_enabled",

285Details285 type: "boolean",

286 286 description:

287When `true`, sandbox escalation approval prompts are auto-rejected.287 "Allow or block tools in this app that advertise `destructive_hint = true`.",

288 288 },

289Key289 {

290 290 key: "apps.<id>.open_world_enabled",

291`apps._default.destructive_enabled`291 type: "boolean",

292 292 description:

293Type / Values293 "Allow or block tools in this app that advertise `open_world_hint = true`.",

294 294 },

295`boolean`295 {

296 296 key: "apps.<id>.default_tools_enabled",

297Details297 type: "boolean",

298 298 description:

299Default allow/deny for app tools with `destructive_hint = true`.299 "Default enabled state for tools in this app unless a per-tool override exists.",

300 300 },

301Key301 {

302 302 key: "apps.<id>.default_tools_approval_mode",

303`apps._default.enabled`303 type: "auto | prompt | approve",

304 304 description:

305Type / Values305 "Default approval behavior for tools in this app unless a per-tool override exists.",

306 306 },

307`boolean`307 {

308 308 key: "apps.<id>.tools.<tool>.enabled",

309Details309 type: "boolean",

310 310 description:

311Default app enabled state for all apps unless overridden per app.311 "Per-tool enabled override for an app tool (for example `repos/list`).",

312 312 },

313Key313 {

314 314 key: "apps.<id>.tools.<tool>.approval_mode",

315`apps._default.open_world_enabled`315 type: "auto | prompt | approve",

316 316 description: "Per-tool approval behavior override for a single app tool.",

317Type / Values317 },

318 318 {

319`boolean`319 key: "tool_suggest.discoverables",

320 320 type: "array<table>",

321Details321 description:

322 322 'Allow tool suggestions for additional discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',

323Default allow/deny for app tools with `open_world_hint = true`.323 },

324 324 {

325Key325 key: "tool_suggest.disabled_tools",

326 326 type: "array<table>",

327`apps.<id>.default_tools_approval_mode`327 description:

328 328 'Disable suggestions for specific discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',

329Type / Values329 },

330 330 {

331`auto | prompt | approve`331 key: "features.apps",

332 332 type: "boolean",

333Details333 description: "Enable ChatGPT Apps/connectors support (experimental).",

334 334 },

335Default approval behavior for tools in this app unless a per-tool override exists.335 {

336 336 key: "features.hooks",

337Key337 type: "boolean",

338 338 description:

339`apps.<id>.default_tools_enabled`339 "Enable lifecycle hooks loaded from `hooks.json` or inline `[hooks]` config. `features.codex_hooks` is a deprecated alias.",

340 340 },

341Type / Values341 {

342 342 key: "features.codex_git_commit",

343`boolean`343 type: "boolean",

344 344 description:

345Details345 "Enable Codex-generated git commits. When enabled, Codex uses `commit_attribution` to append a `Co-authored-by:` trailer to generated commit messages.",

346 346 },

347Default enabled state for tools in this app unless a per-tool override exists.347 {

348 348 key: "hooks",

349Key349 type: "table",

350 350 description:

351`apps.<id>.destructive_enabled`351 "Lifecycle hooks configured inline in `config.toml`. Uses the same event schema as `hooks.json`; see the Hooks guide for examples and supported events.",

352 352 },

353Type / Values353 {

354 354 key: "features.plugin_hooks",

355`boolean`355 type: "boolean",

356 356 description:

357Details357 "Opt into lifecycle hooks bundled with enabled plugins. Off by default in this release; set to `true` to opt in.",

358 358 },

359Allow or block tools in this app that advertise `destructive_hint = true`.359 {

360 360 key: "features.memories",

361Key361 type: "boolean",

362 362 description: "Enable [Memories](https://developers.openai.com/codex/memories) (off by default).",

363`apps.<id>.enabled`363 },

364 364 {

365Type / Values365 key: "mcp_servers.<id>.command",

366 366 type: "string",

367`boolean`367 description: "Launcher command for an MCP stdio server.",

368 368 },

369Details369 {

370 370 key: "mcp_servers.<id>.args",

371Enable or disable a specific app/connector by id (default: true).371 type: "array<string>",

372 372 description: "Arguments passed to the MCP stdio server command.",

373Key373 },

374 374 {

375`apps.<id>.open_world_enabled`375 key: "mcp_servers.<id>.env",

376 376 type: "map<string,string>",

377Type / Values377 description: "Environment variables forwarded to the MCP stdio server.",

378 378 },

379`boolean`379 {

380 380 key: "mcp_servers.<id>.env_vars",

381Details381 type: 'array<string | { name = string, source = "local" | "remote" }>',

382 382 description:

383Allow or block tools in this app that advertise `open_world_hint = true`.383 'Additional environment variables to whitelist for an MCP stdio server. String entries default to `source = "local"`; use `source = "remote"` only with executor-backed remote stdio.',

384 384 },

385Key385 {

386 386 key: "mcp_servers.<id>.cwd",

387`apps.<id>.tools.<tool>.approval_mode`387 type: "string",

388 388 description: "Working directory for the MCP stdio server process.",

389Type / Values389 },

390 390 {

391`auto | prompt | approve`391 key: "mcp_servers.<id>.url",

392 392 type: "string",

393Details393 description: "Endpoint for an MCP streamable HTTP server.",

394 394 },

395Per-tool approval behavior override for a single app tool.395 {

396 396 key: "mcp_servers.<id>.bearer_token_env_var",

397Key397 type: "string",

398 398 description:

399`apps.<id>.tools.<tool>.enabled`399 "Environment variable sourcing the bearer token for an MCP HTTP server.",

400 400 },

401Type / Values401 {

402 402 key: "mcp_servers.<id>.http_headers",

403`boolean`403 type: "map<string,string>",

404 404 description: "Static HTTP headers included with each MCP HTTP request.",

405Details405 },

406 406 {

407Per-tool enabled override for an app tool (for example `repos/list`).407 key: "mcp_servers.<id>.env_http_headers",

408 408 type: "map<string,string>",

409Key409 description:

410 410 "HTTP headers populated from environment variables for an MCP HTTP server.",

411`background_terminal_max_timeout`411 },

412 412 {

413Type / Values413 key: "mcp_servers.<id>.enabled",

414 414 type: "boolean",

415`number`415 description: "Disable an MCP server without removing its configuration.",

416 416 },

417Details417 {

418 418 key: "mcp_servers.<id>.required",

419Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key.419 type: "boolean",

420 420 description:

421Key421 "When true, fail startup/resume if this enabled MCP server cannot initialize.",

422 422 },

423`chatgpt_base_url`423 {

424 424 key: "mcp_servers.<id>.startup_timeout_sec",

425Type / Values425 type: "number",

426 426 description:

427`string`427 "Override the default 10s startup timeout for an MCP server.",

428 428 },

429Details429 {

430 430 key: "mcp_servers.<id>.startup_timeout_ms",

431Override the base URL used during the ChatGPT login flow.431 type: "number",

432 432 description: "Alias for `startup_timeout_sec` in milliseconds.",

433Key433 },

434 434 {

435`check_for_update_on_startup`435 key: "mcp_servers.<id>.tool_timeout_sec",

436 436 type: "number",

437Type / Values437 description:

438 438 "Override the default 60s per-tool timeout for an MCP server.",

439`boolean`439 },

440 440 {

441Details441 key: "mcp_servers.<id>.enabled_tools",

442 442 type: "array<string>",

443Check for Codex updates on startup (set to false only when updates are centrally managed).443 description: "Allow list of tool names exposed by the MCP server.",

444 444 },

445Key445 {

446 446 key: "mcp_servers.<id>.disabled_tools",

447`cli_auth_credentials_store`447 type: "array<string>",

448 448 description:

449Type / Values449 "Deny list applied after `enabled_tools` for the MCP server.",

450 450 },

451`file | keyring | auto`451 {

452 452 key: "mcp_servers.<id>.default_tools_approval_mode",

453Details453 type: "auto | prompt | approve",

454 454 description:

455Control where the CLI stores cached credentials (file-based auth.json vs OS keychain).455 "Default approval behavior for MCP tools on this server unless a per-tool override exists.",

456 456 },

457Key457 {

458 458 key: "mcp_servers.<id>.tools.<tool>.approval_mode",

459`compact_prompt`459 type: "auto | prompt | approve",

460 460 description:

461Type / Values461 "Per-tool approval behavior override for one MCP tool on this server.",

462 462 },

463`string`463 {

464 464 key: "mcp_servers.<id>.scopes",

465Details465 type: "array<string>",

466 466 description:

467Inline override for the history compaction prompt.467 "OAuth scopes to request when authenticating to that MCP server.",

468 468 },

469Key469 {

470 470 key: "mcp_servers.<id>.oauth_resource",

471`developer_instructions`471 type: "string",

472 472 description:

473Type / Values473 "Optional RFC 8707 OAuth resource parameter to include during MCP login.",

474 474 },

475`string`475 {

476 476 key: "mcp_servers.<id>.experimental_environment",

477Details477 type: "local | remote",

478 478 description:

479Additional developer instructions injected into the session (optional).479 "Experimental placement for an MCP server. `remote` starts stdio servers through a remote executor environment; streamable HTTP remote placement is not implemented.",

480 480 },

481Key481 {

482 482 key: "agents.max_threads",

483`disable_paste_burst`483 type: "number",

484 484 description:

485Type / Values485 "Maximum number of agent threads that can be open concurrently. Defaults to `6` when unset.",

486 486 },

487`boolean`487 {

488 488 key: "agents.max_depth",

489Details489 type: "number",

490 490 description:

491Disable burst-paste detection in the TUI.491 "Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1).",

492 492 },

493Key493 {

494 494 key: "agents.job_max_runtime_seconds",

495`experimental_compact_prompt_file`495 type: "number",

496 496 description:

497Type / Values497 "Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker.",

498 498 },

499`string (path)`499 {

500 500 key: "agents.<name>.description",

501Details501 type: "string",

502 502 description:

503Load the compaction prompt override from a file (experimental).503 "Role guidance shown to Codex when choosing and spawning that agent type.",

504 504 },

505Key505 {

506 506 key: "agents.<name>.config_file",

507`experimental_use_freeform_apply_patch`507 type: "string (path)",

508 508 description:

509Type / Values509 "Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role.",

510 510 },

511`boolean`511 {

512 512 key: "agents.<name>.nickname_candidates",

513Details513 type: "array<string>",

514 514 description:

515Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`.515 "Optional pool of display nicknames for spawned agents in that role.",

516 516 },

517Key517 {

518 518 key: "memories.generate_memories",

519`experimental_use_unified_exec_tool`519 type: "boolean",

520 520 description:

521Type / Values521 "When `false`, newly created threads are not stored as memory-generation inputs. Defaults to `true`.",

522 522 },

523`boolean`523 {

524 524 key: "memories.use_memories",

525Details525 type: "boolean",

526 526 description:

527Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`.527 "When `false`, Codex skips injecting existing memories into future sessions. Defaults to `true`.",

528 528 },

529Key529 {

530 530 key: "memories.disable_on_external_context",

531`features.apply_patch_freeform`531 type: "boolean",

532 532 description:

533Type / Values533 "When `true`, threads that use external context such as MCP tool calls, web search, or tool search are kept out of memory generation. Defaults to `false`. Legacy alias: `memories.no_memories_if_mcp_or_web_search`.",

534 534 },

535`boolean`535 {

536 536 key: "memories.max_raw_memories_for_consolidation",

537Details537 type: "number",

538 538 description:

539Expose the freeform `apply_patch` tool (experimental).539 "Maximum recent raw memories retained for global consolidation. Defaults to `256` and is capped at `4096`.",

540 540 },

541Key541 {

542 542 key: "memories.max_unused_days",

543`features.apps`543 type: "number",

544 544 description:

545Type / Values545 "Maximum days since a memory was last used before it becomes ineligible for consolidation. Defaults to `30` and is clamped to `0`-`365`.",

546 546 },

547`boolean`547 {

548 548 key: "memories.max_rollout_age_days",

549Details549 type: "number",

550 550 description:

551Enable ChatGPT Apps/connectors support (experimental).551 "Maximum age of threads considered for memory generation. Defaults to `30` and is clamped to `0`-`90`.",

552 552 },

553Key553 {

554 554 key: "memories.max_rollouts_per_startup",

555`features.apps_mcp_gateway`555 type: "number",

556 556 description:

557Type / Values557 "Maximum rollout candidates processed per startup pass. Defaults to `16` and is capped at `128`.",

558 558 },

559`boolean`559 {

560 560 key: "memories.min_rollout_idle_hours",

561Details561 type: "number",

562 562 description:

563Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental).563 "Minimum idle time before a thread is considered for memory generation. Defaults to `6` and is clamped to `1`-`48`.",

564 564 },

565Key565 {

566 566 key: "memories.min_rate_limit_remaining_percent",

567`features.child_agents_md`567 type: "number",

568 568 description:

569Type / Values569 "Minimum remaining percentage required in Codex rate-limit windows before memory generation starts. Defaults to `25` and is clamped to `0`-`100`.",

570 570 },

571`boolean`571 {

572 572 key: "memories.extract_model",

573Details573 type: "string",

574 574 description: "Optional model override for per-thread memory extraction.",

575Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental).575 },

576 576 {

577Key577 key: "memories.consolidation_model",

578 578 type: "string",

579`features.collaboration_modes`579 description: "Optional model override for global memory consolidation.",

580 580 },

581Type / Values581 {

582 582 key: "features.unified_exec",

583`boolean`583 type: "boolean",

584 584 description:

585Details585 "Use the unified PTY-backed exec tool (stable; enabled by default except on Windows).",

586 586 },

587Enable collaboration modes such as plan mode (stable; on by default).587 {

588 588 key: "features.shell_snapshot",

589Key589 type: "boolean",

590 590 description:

591`features.multi_agent`591 "Snapshot shell environment to speed up repeated commands (stable; on by default).",

592 592 },

593Type / Values593 {

594 594 key: "features.undo",

595`boolean`595 type: "boolean",

596 596 description: "Enable undo support (stable; off by default).",

597Details597 },

598 598 {

599Enable multi-agent collaboration tools (`spawn\_agent`, `send\_input`, `resume\_agent`, `wait`, and `close\_agent`) (experimental; off by default).599 key: "features.multi_agent",

600 600 type: "boolean",

601Key601 description:

602 602 "Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait_agent`, and `close_agent`) (stable; on by default).",

603`features.personality`603 },

604 604 {

605Type / Values605 key: "features.personality",

606 606 type: "boolean",

607`boolean`607 description:

608 608 "Enable personality selection controls (stable; on by default).",

609Details609 },

610 610 {

611Enable personality selection controls (stable; on by default).611 key: "features.network_proxy",

612 612 type: "boolean | table",

613Key613 description:

614 614 "Enable sandboxed networking. Use a table form when setting network policy options such as `domains` (experimental; off by default).",

615`features.powershell_utf8`615 },

616 616 {

617Type / Values617 key: "features.network_proxy.enabled",

618 618 type: "boolean",

619`boolean`619 description: "Enable sandboxed networking. Defaults to `false`.",

620 620 },

621Details621 {

622 622 key: "features.network_proxy.domains",

623Force PowerShell UTF-8 output (defaults to true).623 type: "map<string, allow | deny>",

624 624 description:

625Key625 "Domain policy for sandboxed networking. Unset by default, which means no external destinations are allowed until you add `allow` rules. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. Add `deny` rules for blocked destinations; `deny` wins on conflicts.",

626 626 },

627`features.remote_models`627 {

628 628 key: "features.network_proxy.unix_sockets",

629Type / Values629 type: "map<string, allow | none>",

630 630 description:

631`boolean`631 "Unix socket policy for sandboxed networking. Unset by default; add `allow` entries for permitted sockets.",

632 632 },

633Details633 {

634 634 key: "features.network_proxy.allow_local_binding",

635Refresh remote model list before showing readiness (experimental).635 type: "boolean",

636 636 description:

637Key637 "Allow broader local/private-network access. Defaults to `false`; exact local IP literal or `localhost` allow rules can still permit specific local targets.",

638 638 },

639`features.request_rule`639 {

640 640 key: "features.network_proxy.enable_socks5",

641Type / Values641 type: "boolean",

642 642 description: "Expose SOCKS5 support. Defaults to `true`.",

643`boolean`643 },

644 644 {

645Details645 key: "features.network_proxy.enable_socks5_udp",

646 646 type: "boolean",

647Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default).647 description: "Allow UDP over SOCKS5. Defaults to `true`.",

648 648 },

649Key649 {

650 650 key: "features.network_proxy.allow_upstream_proxy",

651`features.runtime_metrics`651 type: "boolean",

652 652 description:

653Type / Values653 "Allow chaining through an upstream proxy from the environment. Defaults to `true`.",

654 654 },

655`boolean`655 {

656 656 key: "features.network_proxy.dangerously_allow_non_loopback_proxy",

657Details657 type: "boolean",

658 658 description:

659Show runtime metrics summary in TUI turn separators (experimental).659 "Permit non-loopback listener addresses. Defaults to `false`; enabling it can expose proxy listeners beyond localhost.",

660 660 },

661Key661 {

662 662 key: "features.network_proxy.dangerously_allow_all_unix_sockets",

663`features.search_tool`663 type: "boolean",

664 664 description:

665Type / Values665 "Permit arbitrary Unix socket destinations instead of allowlist-only access. Defaults to `false`; use only in tightly controlled environments.",

666 666 },

667`boolean`667 {

668 668 key: "features.network_proxy.proxy_url",

669Details669 type: "string",

670 670 description:

671Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental).671 'HTTP listener URL for sandboxed networking. Defaults to `"http://127.0.0.1:3128"`.',

672 672 },

673Key673 {

674 674 key: "features.network_proxy.socks_url",

675`features.shell_snapshot`675 type: "string",

676 676 description:

677Type / Values677 'SOCKS5 listener URL. Defaults to `"http://127.0.0.1:8081"`.',

678 678 },

679`boolean`679 {

680 680 key: "features.web_search",

681Details681 type: "boolean",

682 682 description:

683Snapshot shell environment to speed up repeated commands (beta).683 "Deprecated legacy toggle; prefer the top-level `web_search` setting.",

684 684 },

685Key685 {

686 686 key: "features.web_search_cached",

687`features.shell_tool`687 type: "boolean",

688 688 description:

689Type / Values689 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`.',

690 690 },

691`boolean`691 {

692 692 key: "features.web_search_request",

693Details693 type: "boolean",

694 694 description:

695Enable the default `shell` tool for running commands (stable; on by default).695 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`.',

696 696 },

697Key697 {

698 698 key: "features.shell_tool",

699`features.unified_exec`699 type: "boolean",

700 700 description:

701Type / Values701 "Enable the default `shell` tool for running commands (stable; on by default).",

702 702 },

703`boolean`703 {

704 704 key: "features.enable_request_compression",

705Details705 type: "boolean",

706 706 description:

707Use the unified PTY-backed exec tool (beta).707 "Compress streaming request bodies with zstd when supported (stable; on by default).",

708 708 },

709Key709 {

710 710 key: "features.skill_mcp_dependency_install",

711`features.use_linux_sandbox_bwrap`711 type: "boolean",

712 712 description:

713Type / Values713 "Allow prompting and installing missing MCP dependencies for skills (stable; on by default).",

714 714 },

715`boolean`715 {

716 716 key: "features.fast_mode",

717Details717 type: "boolean",

718 718 description:

719Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default).719 "Enable model-catalog service tier selection in the TUI, including Fast-tier commands when the active model advertises them (stable; on by default).",

720 720 },

721Key721 {

722 722 key: "features.prevent_idle_sleep",

723`features.web_search`723 type: "boolean",

724 724 description:

725Type / Values725 "Prevent the machine from sleeping while a turn is actively running (experimental; off by default).",

726 726 },

727`boolean`727 {

728 728 key: "suppress_unstable_features_warning",

729Details729 type: "boolean",

730 730 description:

731Deprecated legacy toggle; prefer the top-level `web_search` setting.731 "Suppress the warning that appears when under-development feature flags are enabled.",

732 732 },

733Key733 {

734 734 key: "model_providers.<id>",

735`features.web_search_cached`735 type: "table",

736 736 description:

737Type / Values737 "Custom provider definition. Built-in provider IDs (`openai`, `ollama`, and `lmstudio`) are reserved and cannot be overridden.",

738 738 },

739`boolean`739 {

740 740 key: "model_providers.<id>.name",

741Details741 type: "string",

742 742 description: "Display name for a custom model provider.",

743Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`.743 },

744 744 {

745Key745 key: "model_providers.<id>.base_url",

746 746 type: "string",

747`features.web_search_request`747 description: "API base URL for the model provider.",

748 748 },

749Type / Values749 {

750 750 key: "model_providers.<id>.env_key",

751`boolean`751 type: "string",

752 752 description: "Environment variable supplying the provider API key.",

753Details753 },

754 754 {

755Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`.755 key: "model_providers.<id>.env_key_instructions",

756 756 type: "string",

757Key757 description: "Optional setup guidance for the provider API key.",

758 758 },

759`feedback.enabled`759 {

760 760 key: "model_providers.<id>.experimental_bearer_token",

761Type / Values761 type: "string",

762 762 description:

763`boolean`763 "Direct bearer token for the provider (discouraged; use `env_key`).",

764 764 },

765Details765 {

766 766 key: "model_providers.<id>.requires_openai_auth",

767Enable feedback submission via `/feedback` across Codex surfaces (default: true).767 type: "boolean",

768 768 description:

769Key769 "The provider uses OpenAI authentication (defaults to false).",

770 770 },

771`file_opener`771 {

772 772 key: "model_providers.<id>.wire_api",

773Type / Values773 type: "responses",

774 774 description:

775`vscode | vscode-insiders | windsurf | cursor | none`775 "Protocol used by the provider. `responses` is the only supported value, and it is the default when omitted.",

776 776 },

777Details777 {

778 778 key: "model_providers.<id>.query_params",

779URI scheme used to open citations from Codex output (default: `vscode`).779 type: "map<string,string>",

780 780 description: "Extra query parameters appended to provider requests.",

781Key781 },

782 782 {

783`forced_chatgpt_workspace_id`783 key: "model_providers.<id>.http_headers",

784 784 type: "map<string,string>",

785Type / Values785 description: "Static HTTP headers added to provider requests.",

786 786 },

787`string (uuid)`787 {

788 788 key: "model_providers.<id>.env_http_headers",

789Details789 type: "map<string,string>",

790 790 description:

791Limit ChatGPT logins to a specific workspace identifier.791 "HTTP headers populated from environment variables when present.",

792 792 },

793Key793 {

794 794 key: "model_providers.<id>.request_max_retries",

795`forced_login_method`795 type: "number",

796 796 description:

797Type / Values797 "Retry count for HTTP requests to the provider (default: 4).",

798 798 },

799`chatgpt | api`799 {

800 800 key: "model_providers.<id>.stream_max_retries",

801Details801 type: "number",

802 802 description: "Retry count for SSE streaming interruptions (default: 5).",

803Restrict Codex to a specific authentication method.803 },

804 804 {

805Key805 key: "model_providers.<id>.stream_idle_timeout_ms",

806 806 type: "number",

807`hide_agent_reasoning`807 description:

808 808 "Idle timeout for SSE streams in milliseconds (default: 300000).",

809Type / Values809 },

810 810 {

811`boolean`811 key: "model_providers.<id>.supports_websockets",

812 812 type: "boolean",

813Details813 description:

814 814 "Whether that provider supports the Responses API WebSocket transport.",

815Suppress reasoning events in both the TUI and `codex exec` output.815 },

816 816 {

817Key817 key: "model_providers.<id>.auth",

818 818 type: "table",

819`history.max_bytes`819 description:

820 820 "Command-backed bearer token configuration for a custom provider. Do not combine with `env_key`, `experimental_bearer_token`, or `requires_openai_auth`.",

821Type / Values821 },

822 822 {

823`number`823 key: "model_providers.<id>.auth.command",

824 824 type: "string",

825Details825 description:

826 826 "Command to run when Codex needs a bearer token. The command must print the token to stdout.",

827If set, caps the history file size in bytes by dropping oldest entries.827 },

828 828 {

829Key829 key: "model_providers.<id>.auth.args",

830 830 type: "array<string>",

831`history.persistence`831 description: "Arguments passed to the token command.",

832 832 },

833Type / Values833 {

834 834 key: "model_providers.<id>.auth.timeout_ms",

835`save-all | none`835 type: "number",

836 836 description:

837Details837 "Maximum token command runtime in milliseconds (default: 5000).",

838 838 },

839Control whether Codex saves session transcripts to history.jsonl.839 {

840 840 key: "model_providers.<id>.auth.refresh_interval_ms",

841Key841 type: "number",

842 842 description:

843`include_apply_patch_tool`843 "How often Codex proactively refreshes the token in milliseconds (default: 300000). Set to `0` to refresh only after an authentication retry.",

844 844 },

845Type / Values845 {

846 846 key: "model_providers.<id>.auth.cwd",

847`boolean`847 type: "string (path)",

848 848 description: "Working directory for the token command.",

849Details849 },

850 850 {

851Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.851 key: "model_providers.amazon-bedrock.aws.profile",

852 852 type: "string",

853Key853 description:

854 854 "AWS profile name used by the built-in `amazon-bedrock` provider.",

855`instructions`855 },

856 856 {

857Type / Values857 key: "model_providers.amazon-bedrock.aws.region",

858 858 type: "string",

859`string`859 description: "AWS region used by the built-in `amazon-bedrock` provider.",

860 860 },

861Details861 {

862 862 key: "model_reasoning_effort",

863Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`.863 type: "minimal | low | medium | high | xhigh",

864 864 description:

865Key865 "Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent).",

866 866 },

867`log_dir`867 {

868 868 key: "plan_mode_reasoning_effort",

869Type / Values869 type: "none | minimal | low | medium | high | xhigh",

870 870 description:

871`string (path)`871 "Plan-mode-specific reasoning override. When unset, Plan mode uses its built-in preset default.",

872 872 },

873Details873 {

874 874 key: "model_reasoning_summary",

875Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`.875 type: "auto | concise | detailed | none",

876 876 description:

877Key877 "Select reasoning summary detail or disable summaries entirely.",

878 878 },

879`mcp_oauth_callback_port`879 {

880 880 key: "model_verbosity",

881Type / Values881 type: "low | medium | high",

882 882 description:

883`integer`883 "Optional GPT-5 Responses API verbosity override; when unset, the selected model/preset default is used.",

884 884 },

885Details885 {

886 886 key: "model_supports_reasoning_summaries",

887Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS.887 type: "boolean",

888 888 description: "Force Codex to send or not send reasoning metadata.",

889Key889 },

890 890 {

891`mcp_oauth_callback_url`891 key: "shell_environment_policy.inherit",

892 892 type: "all | core | none",

893Type / Values893 description:

894 894 "Baseline environment inheritance when spawning subprocesses.",

895`string`895 },

896 896 {

897Details897 key: "shell_environment_policy.ignore_default_excludes",

898 898 type: "boolean",

899Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port.899 description:

900 900 "Keep variables containing KEY/SECRET/TOKEN before other filters run.",

901Key901 },

902 902 {

903`mcp_oauth_credentials_store`903 key: "shell_environment_policy.exclude",

904 904 type: "array<string>",

905Type / Values905 description:

906 906 "Glob patterns for removing environment variables after the defaults.",

907`auto | file | keyring`907 },

908 908 {

909Details909 key: "shell_environment_policy.include_only",

910 910 type: "array<string>",

911Preferred store for MCP OAuth credentials.911 description:

912 912 "Whitelist of patterns; when set only matching variables are kept.",

913Key913 },

914 914 {

915`mcp_servers.<id>.args`915 key: "shell_environment_policy.set",

916 916 type: "map<string,string>",

917Type / Values917 description:

918 918 "Explicit environment overrides injected into every subprocess.",

919`array<string>`919 },

920 920 {

921Details921 key: "shell_environment_policy.experimental_use_profile",

922 922 type: "boolean",

923Arguments passed to the MCP stdio server command.923 description: "Use the user shell profile when spawning subprocesses.",

924 924 },

925Key925 {

926 926 key: "project_root_markers",

927`mcp_servers.<id>.bearer_token_env_var`927 type: "array<string>",

928 928 description:

929Type / Values929 "List of project root marker filenames; used when searching parent directories for the project root.",

930 930 },

931`string`931 {

932 932 key: "project_doc_max_bytes",

933Details933 type: "number",

934 934 description:

935Environment variable sourcing the bearer token for an MCP HTTP server.935 "Maximum bytes read from `AGENTS.md` when building project instructions.",

936 936 },

937Key937 {

938 938 key: "project_doc_fallback_filenames",

939`mcp_servers.<id>.command`939 type: "array<string>",

940 940 description: "Additional filenames to try when `AGENTS.md` is missing.",

941Type / Values941 },

942 942 {

943`string`943 key: "profile",

944 944 type: "string",

945Details945 description:

946 946 "Default profile applied at startup (equivalent to `--profile`).",

947Launcher command for an MCP stdio server.947 },

948 948 {

949Key949 key: "profiles.<name>.*",

950 950 type: "various",

951`mcp_servers.<id>.cwd`951 description:

952 952 "Profile-scoped overrides for any of the supported configuration keys.",

953Type / Values953 },

954 954 {

955`string`955 key: "profiles.<name>.service_tier",

956 956 type: "string",

957Details957 description: "Profile-scoped service tier preference for new turns.",

958 958 },

959Working directory for the MCP stdio server process.959 {

960 960 key: "profiles.<name>.plan_mode_reasoning_effort",

961Key961 type: "none | minimal | low | medium | high | xhigh",

962 962 description: "Profile-scoped Plan-mode reasoning override.",

963`mcp_servers.<id>.disabled_tools`963 },

964 964 {

965Type / Values965 key: "profiles.<name>.web_search",

966 966 type: "disabled | cached | live",

967`array<string>`967 description:

968 968 'Profile-scoped web search mode override (default: `"cached"`).',

969Details969 },

970 970 {

971Deny list applied after `enabled_tools` for the MCP server.971 key: "profiles.<name>.personality",

972 972 type: "none | friendly | pragmatic",

973Key973 description:

974 974 "Profile-scoped communication style override for supported models.",

975`mcp_servers.<id>.enabled`975 },

976 976 {

977Type / Values977 key: "profiles.<name>.model_catalog_json",

978 978 type: "string (path)",

979`boolean`979 description:

980 980 "Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).",

981Details981 },

982 982 {

983Disable an MCP server without removing its configuration.983 key: "profiles.<name>.model_instructions_file",

984 984 type: "string (path)",

985Key985 description:

986 986 "Profile-scoped replacement for the built-in instruction file.",

987`mcp_servers.<id>.enabled_tools`987 },

988 988 {

989Type / Values989 key: "profiles.<name>.experimental_use_unified_exec_tool",

990 990 type: "boolean",

991`array<string>`991 description:

992 992 "Legacy name for enabling unified exec; prefer `[features].unified_exec`.",

993Details993 },

994 994 {

995Allow list of tool names exposed by the MCP server.995 key: "profiles.<name>.oss_provider",

996 996 type: "lmstudio | ollama",

997Key997 description: "Profile-scoped OSS provider for `--oss` sessions.",

998 998 },

999`mcp_servers.<id>.env`999 {

1000 1000 key: "profiles.<name>.tools_view_image",

1001Type / Values1001 type: "boolean",

1002 1002 description: "Enable or disable the `view_image` tool in that profile.",

1003`map<string,string>`1003 },

1004 1004 {

1005Details1005 key: "profiles.<name>.analytics.enabled",

1006 1006 type: "boolean",

1007Environment variables forwarded to the MCP stdio server.1007 description: "Profile-scoped analytics enablement override.",

1008 1008 },

1009Key1009 {

1010 1010 key: "profiles.<name>.windows.sandbox",

1011`mcp_servers.<id>.env_http_headers`1011 type: "unelevated | elevated",

1012 1012 description: "Profile-scoped Windows sandbox mode override.",

1013Type / Values1013 },

1014 1014 {

1015`map<string,string>`1015 key: "history.persistence",

1016 1016 type: "save-all | none",

1017Details1017 description:

1018 1018 "Control whether Codex saves session transcripts to history.jsonl.",

1019HTTP headers populated from environment variables for an MCP HTTP server.1019 },

1020 1020 {

1021Key1021 key: "tool_output_token_limit",

1022 1022 type: "number",

1023`mcp_servers.<id>.env_vars`1023 description:

1024 1024 "Token budget for storing individual tool/function outputs in history.",

1025Type / Values1025 },

1026 1026 {

1027`array<string>`1027 key: "background_terminal_max_timeout",

1028 1028 type: "number",

1029Details1029 description:

1030 1030 "Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key.",

1031Additional environment variables to whitelist for an MCP stdio server.1031 },

1032 1032 {

1033Key1033 key: "history.max_bytes",

1034 1034 type: "number",

1035`mcp_servers.<id>.http_headers`1035 description:

1036 1036 "If set, caps the history file size in bytes by dropping oldest entries.",

1037Type / Values1037 },

1038 1038 {

1039`map<string,string>`1039 key: "file_opener",

1040 1040 type: "vscode | vscode-insiders | windsurf | cursor | none",

1041Details1041 description:

1042 1042 "URI scheme used to open citations from Codex output (default: `vscode`).",

1043Static HTTP headers included with each MCP HTTP request.1043 },

1044 1044 {

1045Key1045 key: "otel.environment",

1046 1046 type: "string",

1047`mcp_servers.<id>.required`1047 description:

1048 1048 "Environment tag applied to emitted OpenTelemetry events (default: `dev`).",

1049Type / Values1049 },

1050 1050 {

1051`boolean`1051 key: "otel.exporter",

1052 1052 type: "none | otlp-http | otlp-grpc",

1053Details1053 description:

1054 1054 "Select the OpenTelemetry exporter and provide any endpoint metadata.",

1055When true, fail startup/resume if this enabled MCP server cannot initialize.1055 },

1056 1056 {

1057Key1057 key: "otel.trace_exporter",

1058 1058 type: "none | otlp-http | otlp-grpc",

1059`mcp_servers.<id>.startup_timeout_ms`1059 description:

1060 1060 "Select the OpenTelemetry trace exporter and provide any endpoint metadata.",

1061Type / Values1061 },

1062 1062 {

1063`number`1063 key: "otel.metrics_exporter",

1064 1064 type: "none | statsig | otlp-http | otlp-grpc",

1065Details1065 description:

1066 1066 "Select the OpenTelemetry metrics exporter (defaults to `statsig`).",

1067Alias for `startup_timeout_sec` in milliseconds.1067 },

1068 1068 {

1069Key1069 key: "otel.log_user_prompt",

1070 1070 type: "boolean",

1071`mcp_servers.<id>.startup_timeout_sec`1071 description:

1072 1072 "Opt in to exporting raw user prompts with OpenTelemetry logs.",

1073Type / Values1073 },

1074 1074 {

1075`number`1075 key: "otel.exporter.<id>.endpoint",

1076 1076 type: "string",

1077Details1077 description: "Exporter endpoint for OTEL logs.",

1078 1078 },

1079Override the default 10s startup timeout for an MCP server.1079 {

1080 1080 key: "otel.exporter.<id>.protocol",

1081Key1081 type: "binary | json",

1082 1082 description: "Protocol used by the OTLP/HTTP exporter.",

1083`mcp_servers.<id>.tool_timeout_sec`1083 },

1084 1084 {

1085Type / Values1085 key: "otel.exporter.<id>.headers",

1086 1086 type: "map<string,string>",

1087`number`1087 description: "Static headers included with OTEL exporter requests.",

1088 1088 },

1089Details1089 {

1090 1090 key: "otel.trace_exporter.<id>.endpoint",

1091Override the default 60s per-tool timeout for an MCP server.1091 type: "string",

1092 1092 description: "Trace exporter endpoint for OTEL logs.",

1093Key1093 },

1094 1094 {

1095`mcp_servers.<id>.url`1095 key: "otel.trace_exporter.<id>.protocol",

1096 1096 type: "binary | json",

1097Type / Values1097 description: "Protocol used by the OTLP/HTTP trace exporter.",

1098 1098 },

1099`string`1099 {

1100 1100 key: "otel.trace_exporter.<id>.headers",

1101Details1101 type: "map<string,string>",

1102 1102 description: "Static headers included with OTEL trace exporter requests.",

1103Endpoint for an MCP streamable HTTP server.1103 },

1104 1104 {

1105Key1105 key: "otel.exporter.<id>.tls.ca-certificate",

1106 1106 type: "string",

1107`model`1107 description: "CA certificate path for OTEL exporter TLS.",

1108 1108 },

1109Type / Values1109 {

1110 1110 key: "otel.exporter.<id>.tls.client-certificate",

1111`string`1111 type: "string",

1112 1112 description: "Client certificate path for OTEL exporter TLS.",

1113Details1113 },

1114 1114 {

1115Model to use (e.g., `gpt-5-codex`).1115 key: "otel.exporter.<id>.tls.client-private-key",

1116 1116 type: "string",

1117Key1117 description: "Client private key path for OTEL exporter TLS.",

1118 1118 },

1119`model_auto_compact_token_limit`1119 {

1120 1120 key: "otel.trace_exporter.<id>.tls.ca-certificate",

1121Type / Values1121 type: "string",

1122 1122 description: "CA certificate path for OTEL trace exporter TLS.",

1123`number`1123 },

1124 1124 {

1125Details1125 key: "otel.trace_exporter.<id>.tls.client-certificate",

1126 1126 type: "string",

1127Token threshold that triggers automatic history compaction (unset uses model defaults).1127 description: "Client certificate path for OTEL trace exporter TLS.",

1128 1128 },

1129Key1129 {

1130 1130 key: "otel.trace_exporter.<id>.tls.client-private-key",

1131`model_catalog_json`1131 type: "string",

1132 1132 description: "Client private key path for OTEL trace exporter TLS.",

1133Type / Values1133 },

1134 1134 {

1135`string (path)`1135 key: "tui",

1136 1136 type: "table",

1137Details1137 description:

1138 1138 "TUI-specific options such as enabling inline desktop notifications.",

1139Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile.1139 },

1140 1140 {

1141Key1141 key: "tui.notifications",

1142 1142 type: "boolean | array<string>",

1143`model_context_window`1143 description:

1144 1144 "Enable TUI notifications; optionally restrict to specific event types.",

1145Type / Values1145 },

1146 1146 {

1147`number`1147 key: "tui.notification_method",

1148 1148 type: "auto | osc9 | bel",

1149Details1149 description:

1150 1150 "Notification method for terminal notifications (default: auto).",

1151Context window tokens available to the active model.1151 },

1152 1152 {

1153Key1153 key: "tui.notification_condition",

1154 1154 type: "unfocused | always",

1155`model_instructions_file`1155 description:

1156 1156 "Control whether TUI notifications fire only when the terminal is unfocused or regardless of focus. Defaults to `unfocused`.",

1157Type / Values1157 },

1158 1158 {

1159`string (path)`1159 key: "tui.animations",

1160 1160 type: "boolean",

1161Details1161 description:

1162 1162 "Enable terminal animations (welcome screen, shimmer, spinner) (default: true).",

1163Replacement for built-in instructions instead of `AGENTS.md`.1163 },

1164 1164 {

1165Key1165 key: "tui.alternate_screen",

1166 1166 type: "auto | always | never",

1167`model_provider`1167 description:

1168 1168 "Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).",

1169Type / Values1169 },

1170 1170 {

1171`string`1171 key: "tui.vim_mode_default",

1172 1172 type: "boolean",

1173Details1173 description:

1174 1174 "Start the composer in Vim normal mode instead of insert mode (default: false). You can still toggle it per session with `/vim`.",

1175Provider id from `model_providers` (default: `openai`).1175 },

1176 1176 {

1177Key1177 key: "tui.raw_output_mode",

1178 1178 type: "boolean",

1179`model_providers.<id>.base_url`1179 description:

1180 1180 "Start the TUI in raw scrollback mode for copy-friendly terminal selection (default: false). You can toggle it with `/raw` or the default `alt-r` key binding.",

1181Type / Values1181 },

1182 1182 {

1183`string`1183 key: "tui.show_tooltips",

1184 1184 type: "boolean",

1185Details1185 description:

1186 1186 "Show onboarding tooltips in the TUI welcome screen (default: true).",

1187API base URL for the model provider.1187 },

1188 1188 {

1189Key1189 key: "tui.status_line",

1190 1190 type: "array<string> | null",

1191`model_providers.<id>.env_http_headers`1191 description:

1192 1192 "Ordered list of TUI footer status-line item identifiers. `null` disables the status line.",

1193Type / Values1193 },

1194 1194 {

1195`map<string,string>`1195 key: "tui.terminal_title",

1196 1196 type: "array<string> | null",

1197Details1197 description:

1198 1198 'Ordered list of terminal window/tab title item identifiers. Defaults to `["spinner", "project"]`; `null` disables title updates.',

1199HTTP headers populated from environment variables when present.1199 },

1200 1200 {

1201Key1201 key: "tui.theme",

1202 1202 type: "string",

1203`model_providers.<id>.env_key`1203 description:

1204 1204 "Syntax-highlighting theme override (kebab-case theme name).",

1205Type / Values1205 },

1206 1206 {

1207`string`1207 key: "tui.keymap.<context>.<action>",

1208 1208 type: "string | array<string>",

1209Details1209 description:

1210 1210 "Keyboard shortcut binding for a TUI action. Supported contexts include `global`, `chat`, `composer`, `editor`, `pager`, `list`, and `approval`; context-specific bindings override `tui.keymap.global`.",

1211Environment variable supplying the provider API key.1211 },

1212 1212 {

1213Key1213 key: "tui.keymap.<context>.<action> = []",

1214 1214 type: "empty array",

1215`model_providers.<id>.env_key_instructions`1215 description:

1216 1216 "Unbind the action in that keymap context. Key names use normalized strings such as `ctrl-a`, `shift-enter`, `page-down`, or `minus`.",

1217Type / Values1217 },

1218 1218 {

1219`string`1219 key: "plugins.<plugin>.mcp_servers.<server>.enabled",

1220 1220 type: "boolean",

1221Details1221 description:

1222 1222 "Enable or disable an MCP server bundled by an installed plugin without changing the plugin manifest.",

1223Optional setup guidance for the provider API key.1223 },

1224 1224 {

1225Key1225 key: "plugins.<plugin>.mcp_servers.<server>.default_tools_approval_mode",

1226 1226 type: "auto | prompt | approve",

1227`model_providers.<id>.experimental_bearer_token`1227 description:

1228 1228 "Default approval behavior for tools on a plugin-provided MCP server.",

1229Type / Values1229 },

1230 1230 {

1231`string`1231 key: "plugins.<plugin>.mcp_servers.<server>.enabled_tools",

1232 1232 type: "array<string>",

1233Details1233 description:

1234 1234 "Allow list of tools exposed from a plugin-provided MCP server.",

1235Direct bearer token for the provider (discouraged; use `env_key`).1235 },

1236 1236 {

1237Key1237 key: "plugins.<plugin>.mcp_servers.<server>.disabled_tools",

1238 1238 type: "array<string>",

1239`model_providers.<id>.http_headers`1239 description:

1240 1240 "Deny list applied after `enabled_tools` for a plugin-provided MCP server.",

1241Type / Values1241 },

1242 1242 {

1243`map<string,string>`1243 key: "plugins.<plugin>.mcp_servers.<server>.tools.<tool>.approval_mode",

1244 1244 type: "auto | prompt | approve",

1245Details1245 description:

1246 1246 "Per-tool approval behavior override for a plugin-provided MCP tool.",

1247Static HTTP headers added to provider requests.1247 },

1248 1248 {

1249Key1249 key: "tui.model_availability_nux.<model>",

1250 1250 type: "integer",

1251`model_providers.<id>.name`1251 description: "Internal startup-tooltip state keyed by model slug.",

1252 1252 },

1253Type / Values1253 {

1254 1254 key: "hide_agent_reasoning",

1255`string`1255 type: "boolean",

1256 1256 description:

1257Details1257 "Suppress reasoning events in both the TUI and `codex exec` output.",

1258 1258 },

1259Display name for a custom model provider.1259 {

1260 1260 key: "show_raw_agent_reasoning",

1261Key1261 type: "boolean",

1262 1262 description:

1263`model_providers.<id>.query_params`1263 "Surface raw reasoning content when the active model emits it.",

1264 1264 },

1265Type / Values1265 {

1266 1266 key: "disable_paste_burst",

1267`map<string,string>`1267 type: "boolean",

1268 1268 description: "Disable burst-paste detection in the TUI.",

1269Details1269 },

1270 1270 {

1271Extra query parameters appended to provider requests.1271 key: "windows_wsl_setup_acknowledged",

1272 1272 type: "boolean",

1273Key1273 description: "Track Windows onboarding acknowledgement (Windows only).",

1274 1274 },

1275`model_providers.<id>.request_max_retries`1275 {

1276 1276 key: "chatgpt_base_url",

1277Type / Values1277 type: "string",

1278 1278 description: "Override the base URL used during the ChatGPT login flow.",

1279`number`1279 },

1280 1280 {

1281Details1281 key: "cli_auth_credentials_store",

1282 1282 type: "file | keyring | auto",

1283Retry count for HTTP requests to the provider (default: 4).1283 description:

1284 1284 "Control where the CLI stores cached credentials (file-based auth.json vs OS keychain).",

1285Key1285 },

1286 1286 {

1287`model_providers.<id>.requires_openai_auth`1287 key: "mcp_oauth_credentials_store",

1288 1288 type: "auto | file | keyring",

1289Type / Values1289 description: "Preferred store for MCP OAuth credentials.",

1290 1290 },

1291`boolean`1291 {

1292 1292 key: "mcp_oauth_callback_port",

1293Details1293 type: "integer",

1294 1294 description:

1295The provider uses OpenAI authentication (defaults to false).1295 "Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS.",

1296 1296 },

1297Key1297 {

1298 1298 key: "mcp_oauth_callback_url",

1299`model_providers.<id>.stream_idle_timeout_ms`1299 type: "string",

1300 1300 description:

1301Type / Values1301 "Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port.",

1302 1302 },

1303`number`1303 {

1304 1304 key: "experimental_use_unified_exec_tool",

1305Details1305 type: "boolean",

1306 1306 description:

1307Idle timeout for SSE streams in milliseconds (default: 300000).1307 "Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`.",

1308 1308 },

1309Key1309 {

1310 1310 key: "tools.web_search",

1311`model_providers.<id>.stream_max_retries`1311 type: 'boolean | { context_size = "low|medium|high", allowed_domains = [string], location = { country, region, city, timezone } }',

1312 1312 description:

1313Type / Values1313 "Optional web search tool configuration. The legacy boolean form is still accepted, but the object form lets you set search context size, allowed domains, and approximate user location.",

1314 1314 },

1315`number`1315 {

1316 1316 key: "tools.view_image",

1317Details1317 type: "boolean",

1318 1318 description: "Enable the local-image attachment tool `view_image`.",

1319Retry count for SSE streaming interruptions (default: 5).1319 },

1320 1320 {

1321Key1321 key: "web_search",

1322 1322 type: "disabled | cached | live",

1323`model_providers.<id>.wire_api`1323 description:

1324 1324 'Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.',

1325Type / Values1325 },

1326 1326 {

1327`chat | responses`1327 key: "default_permissions",

1328 1328 type: "string",

1329Details1329 description:

1330 1330 "Name of the default permissions profile to apply to sandboxed tool calls. Built-ins are `:read-only`, `:workspace`, and `:danger-no-sandbox`; custom profile names require matching `[permissions.<name>]` tables.",

1331Protocol used by the provider (defaults to `chat` if omitted).1331 },

1332 1332 {

1333Key1333 key: "permissions.<name>.filesystem",

1334 1334 type: "table",

1335`model_reasoning_effort`1335 description:

1336 1336 "Named filesystem permission profile. Each key is an absolute path or special token such as `:minimal` or `:project_roots`.",

1337Type / Values1337 },

1338 1338 {

1339`minimal | low | medium | high | xhigh`1339 key: "permissions.<name>.filesystem.glob_scan_max_depth",

1340 1340 type: "number",

1341Details1341 description:

1342 1342 "Maximum depth for expanding deny-read glob patterns on platforms that snapshot matches before sandbox startup. Must be at least `1` when set.",

1343Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent).1343 },

1344 1344 {

1345Key1345 key: "permissions.<name>.filesystem.<path-or-glob>",

1346 1346 type: '"read" | "write" | "none" | table',

1347`model_reasoning_summary`1347 description:

1348 1348 'Grant direct access for a path, glob pattern, or special token, or scope nested entries under that root. Use `"none"` to deny reads for matching paths.',

1349Type / Values1349 },

1350 1350 {

1351`auto | concise | detailed | none`1351 key: 'permissions.<name>.filesystem.":project_roots".<subpath-or-glob>',

1352 1352 type: '"read" | "write" | "none"',

1353Details1353 description:

1354 1354 'Scoped filesystem access relative to the detected project roots. Use `"."` for the root itself; glob subpaths such as `"**/*.env"` can deny reads with `"none"`.',

1355Select reasoning summary detail or disable summaries entirely.1355 },

1356 1356 {

1357Key1357 key: "permissions.<name>.network.enabled",

1358 1358 type: "boolean",

1359`model_supports_reasoning_summaries`1359 description: "Enable network access for this named permissions profile.",

1360 1360 },

1361Type / Values1361 {

1362 1362 key: "permissions.<name>.network.proxy_url",

1363`boolean`1363 type: "string",

1364 1364 description:

1365Details1365 "HTTP listener URL used when this permissions profile enables sandboxed networking.",

1366 1366 },

1367Force Codex to send or not send reasoning metadata.1367 {

1368 1368 key: "permissions.<name>.network.enable_socks5",

1369Key1369 type: "boolean",

1370 1370 description:

1371`model_verbosity`1371 "Expose SOCKS5 support when this permissions profile enables sandboxed networking.",

1372 1372 },

1373Type / Values1373 {

1374 1374 key: "permissions.<name>.network.socks_url",

1375`low | medium | high`1375 type: "string",

1376 1376 description: "SOCKS5 proxy endpoint used by this permissions profile.",

1377Details1377 },

1378 1378 {

1379Control GPT-5 Responses API verbosity (defaults to `medium`).1379 key: "permissions.<name>.network.enable_socks5_udp",

1380 1380 type: "boolean",

1381Key1381 description: "Allow UDP over the SOCKS5 listener when enabled.",

1382 1382 },

1383`notice.hide_full_access_warning`1383 {

1384 1384 key: "permissions.<name>.network.allow_upstream_proxy",

1385Type / Values1385 type: "boolean",

1386 1386 description:

1387`boolean`1387 "Allow sandboxed networking to chain through another upstream proxy.",

1388 1388 },

1389Details1389 {

1390 1390 key: "permissions.<name>.network.dangerously_allow_non_loopback_proxy",

1391Track acknowledgement of the full access warning prompt.1391 type: "boolean",

1392 1392 description:

1393Key1393 "Permit non-loopback bind addresses for sandboxed networking listeners. Enabling it can expose listeners beyond localhost.",

1394 1394 },

1395`notice.hide_gpt-5.1-codex-max_migration_prompt`1395 {

1396 1396 key: "permissions.<name>.network.dangerously_allow_all_unix_sockets",

1397Type / Values1397 type: "boolean",

1398 1398 description:

1399`boolean`1399 "Allow arbitrary Unix socket destinations instead of the default restricted set. Use only in tightly controlled environments.",

1400 1400 },

1401Details1401 {

1402 1402 key: "permissions.<name>.network.domains",

1403Track acknowledgement of the gpt-5.1-codex-max migration prompt.1403 type: "map<string, allow | deny>",

1404 1404 description:

1405Key1405 "Domain rules for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules. `deny` wins on conflicts.",

1406 1406 },

1407`notice.hide_gpt5_1_migration_prompt`1407 {

1408 1408 key: "permissions.<name>.network.unix_sockets",

1409Type / Values1409 type: "map<string, allow | none>",

1410 1410 description:

1411`boolean`1411 "Unix socket rules for sandboxed networking. Use socket paths as keys, with `allow` or `none` values.",

1412 1412 },

1413Details1413 {

1414 1414 key: "permissions.<name>.network.allow_local_binding",

1415Track acknowledgement of the GPT-5.1 migration prompt.1415 type: "boolean",

1416 1416 description:

1417Key1417 "Permit broader local/private-network access through sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",

1418 1418 },

1419`notice.hide_rate_limit_model_nudge`1419 {

1420 1420 key: "projects.<path>.trust_level",

1421Type / Values1421 type: "string",

1422 1422 description:

1423`boolean`1423 'Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers, including project-local config, hooks, and rules.',

1424 1424 },

1425Details1425 {

1426 1426 key: "notice.hide_full_access_warning",

1427Track opt-out of the rate limit model switch reminder.1427 type: "boolean",

1428 1428 description: "Track acknowledgement of the full access warning prompt.",

1429Key1429 },

1430 1430 {

1431`notice.hide_world_writable_warning`1431 key: "notice.hide_world_writable_warning",

1432 1432 type: "boolean",

1433Type / Values1433 description:

1434 1434 "Track acknowledgement of the Windows world-writable directories warning.",

1435`boolean`1435 },

1436 1436 {

1437Details1437 key: "notice.hide_rate_limit_model_nudge",

1438 1438 type: "boolean",

1439Track acknowledgement of the Windows world-writable directories warning.1439 description: "Track opt-out of the rate limit model switch reminder.",

1440 1440 },

1441Key1441 {

1442 1442 key: "notice.hide_gpt5_1_migration_prompt",

1443`notice.model_migrations`1443 type: "boolean",

1444 1444 description: "Track acknowledgement of the GPT-5.1 migration prompt.",

1445Type / Values1445 },

1446 1446 {

1447`map<string,string>`1447 key: "notice.hide_gpt-5.1-codex-max_migration_prompt",

1448 1448 type: "boolean",

1449Details1449 description:

1450 1450 "Track acknowledgement of the gpt-5.1-codex-max migration prompt.",

1451Track acknowledged model migrations as old->new mappings.1451 },

1452 1452 {

1453Key1453 key: "notice.model_migrations",

1454 1454 type: "map<string,string>",

1455`notify`1455 description: "Track acknowledged model migrations as old->new mappings.",

1456 1456 },

1457Type / Values1457 {

1458 1458 key: "forced_login_method",

1459`array<string>`1459 type: "chatgpt | api",

1460 1460 description: "Restrict Codex to a specific authentication method.",

1461Details1461 },

1462 1462 {

1463Command invoked for notifications; receives a JSON payload from Codex.1463 key: "forced_chatgpt_workspace_id",

1464 1464 type: "string (uuid)",

1465Key1465 description: "Limit ChatGPT logins to a specific workspace identifier.",

1466 1466 },

1467`oss_provider`1467 ]}

1468 1468 client:load

1469Type / Values1469/>

1470 

1471`lmstudio | ollama`

1472 

1473Details

1474 

1475Default local provider used when running with `--oss` (defaults to prompting if unset).

1476 

1477Key

1478 

1479`otel.environment`

1480 

1481Type / Values

1482 

1483`string`

1484 

1485Details

1486 

1487Environment tag applied to emitted OpenTelemetry events (default: `dev`).

1488 

1489Key

1490 

1491`otel.exporter`

1492 

1493Type / Values

1494 

1495`none | otlp-http | otlp-grpc`

1496 

1497Details

1498 

1499Select the OpenTelemetry exporter and provide any endpoint metadata.

1500 

1501Key

1502 

1503`otel.exporter.<id>.endpoint`

1504 

1505Type / Values

1506 

1507`string`

1508 

1509Details

1510 

1511Exporter endpoint for OTEL logs.

1512 

1513Key

1514 

1515`otel.exporter.<id>.headers`

1516 

1517Type / Values

1518 

1519`map<string,string>`

1520 

1521Details

1522 

1523Static headers included with OTEL exporter requests.

1524 

1525Key

1526 

1527`otel.exporter.<id>.protocol`

1528 

1529Type / Values

1530 

1531`binary | json`

1532 

1533Details

1534 

1535Protocol used by the OTLP/HTTP exporter.

1536 

1537Key

1538 

1539`otel.exporter.<id>.tls.ca-certificate`

1540 

1541Type / Values

1542 

1543`string`

1544 

1545Details

1546 

1547CA certificate path for OTEL exporter TLS.

1548 

1549Key

1550 

1551`otel.exporter.<id>.tls.client-certificate`

1552 

1553Type / Values

1554 

1555`string`

1556 

1557Details

1558 

1559Client certificate path for OTEL exporter TLS.

1560 

1561Key

1562 

1563`otel.exporter.<id>.tls.client-private-key`

1564 

1565Type / Values

1566 

1567`string`

1568 

1569Details

1570 

1571Client private key path for OTEL exporter TLS.

1572 

1573Key

1574 

1575`otel.log_user_prompt`

1576 

1577Type / Values

1578 

1579`boolean`

1580 

1581Details

1582 

1583Opt in to exporting raw user prompts with OpenTelemetry logs.

1584 

1585Key

1586 

1587`otel.trace_exporter`

1588 

1589Type / Values

1590 

1591`none | otlp-http | otlp-grpc`

1592 

1593Details

1594 

1595Select the OpenTelemetry trace exporter and provide any endpoint metadata.

1596 

1597Key

1598 

1599`otel.trace_exporter.<id>.endpoint`

1600 

1601Type / Values

1602 

1603`string`

1604 

1605Details

1606 

1607Trace exporter endpoint for OTEL logs.

1608 

1609Key

1610 

1611`otel.trace_exporter.<id>.headers`

1612 

1613Type / Values

1614 

1615`map<string,string>`

1616 

1617Details

1618 

1619Static headers included with OTEL trace exporter requests.

1620 

1621Key

1622 

1623`otel.trace_exporter.<id>.protocol`

1624 

1625Type / Values

1626 

1627`binary | json`

1628 

1629Details

1630 

1631Protocol used by the OTLP/HTTP trace exporter.

1632 

1633Key

1634 

1635`otel.trace_exporter.<id>.tls.ca-certificate`

1636 

1637Type / Values

1638 

1639`string`

1640 

1641Details

1642 

1643CA certificate path for OTEL trace exporter TLS.

1644 

1645Key

1646 

1647`otel.trace_exporter.<id>.tls.client-certificate`

1648 

1649Type / Values

1650 

1651`string`

1652 

1653Details

1654 

1655Client certificate path for OTEL trace exporter TLS.

1656 

1657Key

1658 

1659`otel.trace_exporter.<id>.tls.client-private-key`

1660 

1661Type / Values

1662 

1663`string`

1664 

1665Details

1666 

1667Client private key path for OTEL trace exporter TLS.

1668 

1669Key

1670 

1671`personality`

1672 

1673Type / Values

1674 

1675`none | friendly | pragmatic`

1676 

1677Details

1678 

1679Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.

1680 

1681Key

1682 

1683`profile`

1684 

1685Type / Values

1686 

1687`string`

1688 

1689Details

1690 

1691Default profile applied at startup (equivalent to `--profile`).

1692 

1693Key

1694 

1695`profiles.<name>.*`

1696 

1697Type / Values

1698 

1699`various`

1700 

1701Details

1702 

1703Profile-scoped overrides for any of the supported configuration keys.

1704 

1705Key

1706 

1707`profiles.<name>.experimental_use_freeform_apply_patch`

1708 

1709Type / Values

1710 

1711`boolean`

1712 

1713Details

1714 

1715Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.

1716 

1717Key

1718 

1719`profiles.<name>.experimental_use_unified_exec_tool`

1720 

1721Type / Values

1722 

1723`boolean`

1724 

1725Details

1726 

1727Legacy name for enabling unified exec; prefer `[features].unified_exec`.

1728 

1729Key

1730 

1731`profiles.<name>.include_apply_patch_tool`

1732 

1733Type / Values

1734 

1735`boolean`

1736 

1737Details

1738 

1739Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.

1740 

1741Key

1742 

1743`profiles.<name>.model_catalog_json`

1744 

1745Type / Values

1746 

1747`string (path)`

1748 

1749Details

1750 

1751Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).

1752 

1753Key

1754 

1755`profiles.<name>.oss_provider`

1756 

1757Type / Values

1758 

1759`lmstudio | ollama`

1760 

1761Details

1762 

1763Profile-scoped OSS provider for `--oss` sessions.

1764 

1765Key

1766 

1767`profiles.<name>.personality`

1768 

1769Type / Values

1770 

1771`none | friendly | pragmatic`

1772 

1773Details

1774 

1775Profile-scoped communication style override for supported models.

1776 

1777Key

1778 

1779`profiles.<name>.web_search`

1780 

1781Type / Values

1782 

1783`disabled | cached | live`

1784 

1785Details

1786 

1787Profile-scoped web search mode override (default: `"cached"`).

1788 

1789Key

1790 

1791`project_doc_fallback_filenames`

1792 

1793Type / Values

1794 

1795`array<string>`

1796 

1797Details

1798 

1799Additional filenames to try when `AGENTS.md` is missing.

1800 

1801Key

1802 

1803`project_doc_max_bytes`

1804 

1805Type / Values

1806 

1807`number`

1808 

1809Details

1810 

1811Maximum bytes read from `AGENTS.md` when building project instructions.

1812 

1813Key

1814 

1815`project_root_markers`

1816 

1817Type / Values

1818 

1819`array<string>`

1820 

1821Details

1822 

1823List of project root marker filenames; used when searching parent directories for the project root.

1824 

1825Key

1826 

1827`projects.<path>.trust_level`

1828 

1829Type / Values

1830 

1831`string`

1832 

1833Details

1834 

1835Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers.

1836 

1837Key

1838 

1839`review_model`

1840 

1841Type / Values

1842 

1843`string`

1844 

1845Details

1846 

1847Optional model override used by `/review` (defaults to the current session model).

1848 

1849Key

1850 

1851`sandbox_mode`

1852 

1853Type / Values

1854 

1855`read-only | workspace-write | danger-full-access`

1856 

1857Details

1858 

1859Sandbox policy for filesystem and network access during command execution.

1860 

1861Key

1862 

1863`sandbox_workspace_write.exclude_slash_tmp`

1864 

1865Type / Values

1866 

1867`boolean`

1868 

1869Details

1870 

1871Exclude `/tmp` from writable roots in workspace-write mode.

1872 

1873Key

1874 

1875`sandbox_workspace_write.exclude_tmpdir_env_var`

1876 

1877Type / Values

1878 

1879`boolean`

1880 

1881Details

1882 

1883Exclude `$TMPDIR` from writable roots in workspace-write mode.

1884 

1885Key

1886 

1887`sandbox_workspace_write.network_access`

1888 

1889Type / Values

1890 

1891`boolean`

1892 

1893Details

1894 

1895Allow outbound network access inside the workspace-write sandbox.

1896 

1897Key

1898 

1899`sandbox_workspace_write.writable_roots`

1900 

1901Type / Values

1902 

1903`array<string>`

1904 

1905Details

1906 

1907Additional writable roots when `sandbox_mode = "workspace-write"`.

1908 

1909Key

1910 

1911`shell_environment_policy.exclude`

1912 

1913Type / Values

1914 

1915`array<string>`

1916 

1917Details

1918 

1919Glob patterns for removing environment variables after the defaults.

1920 

1921Key

1922 

1923`shell_environment_policy.experimental_use_profile`

1924 

1925Type / Values

1926 

1927`boolean`

1928 

1929Details

1930 

1931Use the user shell profile when spawning subprocesses.

1932 

1933Key

1934 

1935`shell_environment_policy.ignore_default_excludes`

1936 

1937Type / Values

1938 

1939`boolean`

1940 

1941Details

1942 

1943Keep variables containing KEY/SECRET/TOKEN before other filters run.

1944 

1945Key

1946 

1947`shell_environment_policy.include_only`

1948 

1949Type / Values

1950 

1951`array<string>`

1952 

1953Details

1954 

1955Whitelist of patterns; when set only matching variables are kept.

1956 

1957Key

1958 

1959`shell_environment_policy.inherit`

1960 

1961Type / Values

1962 

1963`all | core | none`

1964 

1965Details

1966 

1967Baseline environment inheritance when spawning subprocesses.

1968 

1969Key

1970 

1971`shell_environment_policy.set`

1972 

1973Type / Values

1974 

1975`map<string,string>`

1976 

1977Details

1978 

1979Explicit environment overrides injected into every subprocess.

1980 

1981Key

1982 

1983`show_raw_agent_reasoning`

1984 

1985Type / Values

1986 

1987`boolean`

1988 

1989Details

1990 

1991Surface raw reasoning content when the active model emits it.

1992 

1993Key

1994 

1995`skills.config`

1996 

1997Type / Values

1998 

1999`array<object>`

2000 

2001Details

2002 

2003Per-skill enablement overrides stored in config.toml.

2004 

2005Key

2006 

2007`skills.config.<index>.enabled`

2008 

2009Type / Values

2010 

2011`boolean`

2012 

2013Details

2014 

2015Enable or disable the referenced skill.

2016 

2017Key

2018 

2019`skills.config.<index>.path`

2020 

2021Type / Values

2022 

2023`string (path)`

2024 

2025Details

2026 

2027Path to a skill folder containing `SKILL.md`.

2028 

2029Key

2030 

2031`suppress_unstable_features_warning`

2032 

2033Type / Values

2034 

2035`boolean`

2036 

2037Details

2038 

2039Suppress the warning that appears when under-development feature flags are enabled.

2040 

2041Key

2042 

2043`tool_output_token_limit`

2044 

2045Type / Values

2046 

2047`number`

2048 

2049Details

2050 

2051Token budget for storing individual tool/function outputs in history.

2052 

2053Key

2054 

2055`tools.web_search`

2056 

2057Type / Values

2058 

2059`boolean`

2060 

2061Details

2062 

2063Deprecated legacy toggle for web search; prefer the top-level `web_search` setting.

2064 

2065Key

2066 

2067`tui`

2068 

2069Type / Values

2070 

2071`table`

2072 

2073Details

2074 

2075TUI-specific options such as enabling inline desktop notifications.

2076 

2077Key

2078 

2079`tui.alternate_screen`

2080 

2081Type / Values

2082 

2083`auto | always | never`

2084 

2085Details

2086 

2087Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).

2088 

2089Key

2090 

2091`tui.animations`

2092 

2093Type / Values

2094 

2095`boolean`

2096 

2097Details

2098 

2099Enable terminal animations (welcome screen, shimmer, spinner) (default: true).

2100 

2101Key

2102 

2103`tui.notification_method`

2104 

2105Type / Values

2106 

2107`auto | osc9 | bel`

2108 

2109Details

2110 

2111Notification method for unfocused terminal notifications (default: auto).

2112 

2113Key

2114 

2115`tui.notifications`

2116 

2117Type / Values

2118 

2119`boolean | array<string>`

2120 

2121Details

2122 

2123Enable TUI notifications; optionally restrict to specific event types.

2124 

2125Key

2126 

2127`tui.show_tooltips`

2128 

2129Type / Values

2130 

2131`boolean`

2132 

2133Details

2134 

2135Show onboarding tooltips in the TUI welcome screen (default: true).

2136 

2137Key

2138 

2139`tui.status_line`

2140 

2141Type / Values

2142 

2143`array<string> | null`

2144 

2145Details

2146 

2147Ordered list of TUI footer status-line item identifiers. `null` disables the status line.

2148 

2149Key

2150 

2151`web_search`

2152 

2153Type / Values

2154 

2155`disabled | cached | live`

2156 

2157Details

2158 

2159Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.

2160 

2161Key

2162 

2163`windows_wsl_setup_acknowledged`

2164 

2165Type / Values

2166 

2167`boolean`

2168 

2169Details

2170 

2171Track Windows onboarding acknowledgement (Windows only).

2172 

2173Key

2174 

2175`windows.sandbox`

2176 

2177Type / Values

2178 

2179`unelevated | elevated`

2180 

2181Details

2182 

2183Windows-only native sandbox mode when running Codex natively on Windows.

2184 

2185Expand to view all

2186 1470 

2187You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).1471You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).

2188 1472 


2201For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched1485For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched

2202requirements. See the security page for precedence details.1486requirements. See the security page for precedence details.

2203 1487 

2204| Key | Type / Values | Details |1488Use `[features]` in `requirements.toml` to pin feature flags by the same

2205| --- | --- | --- |1489canonical keys that `config.toml` uses. Omitted keys remain unconstrained.

2206| `allowed_approval_policies` | `array<string>` | Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `reject`). |1490 

2207| `allowed_sandbox_modes` | `array<string>` | Allowed values for `sandbox_mode`. |1491<ConfigTable

2208| `allowed_web_search_modes` | `array<string>` | Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. |1492 options={[

2209| `mcp_servers` | `table` | Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. |1493 {

2210| `mcp_servers.<id>.identity` | `table` | Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). |1494 key: "allowed_approval_policies",

2211| `mcp_servers.<id>.identity.command` | `string` | Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. |1495 type: "array<string>",

2212| `mcp_servers.<id>.identity.url` | `string` | Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. |1496 description:

2213| `rules` | `table` | Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. |1497 "Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `granular`).",

2214| `rules.prefix_rules` | `array<table>` | List of enforced prefix rules. Each rule must include `pattern` and `decision`. |1498 },

2215| `rules.prefix_rules[].decision` | `prompt | forbidden` | Required. Requirements rules can only prompt or forbid (not allow). |1499 {

2216| `rules.prefix_rules[].justification` | `string` | Optional non-empty rationale surfaced in approval prompts or rejection messages. |1500 key: "allowed_approvals_reviewers",

2217| `rules.prefix_rules[].pattern` | `array<table>` | Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. |1501 type: "array<string>",

2218| `rules.prefix_rules[].pattern[].any_of` | `array<string>` | A list of allowed alternative tokens at this position. |1502 description:

2219| `rules.prefix_rules[].pattern[].token` | `string` | A single literal token at this position. |1503 "Allowed values for `approvals_reviewer`, such as `user` and `auto_review`.",

2220 1504 },

2221Key1505 {

2222 1506 key: "guardian_policy_config",

2223`allowed_approval_policies`1507 type: "string",

2224 1508 description:

2225Type / Values1509 "Managed Markdown policy instructions for automatic review. This takes precedence over local `[auto_review].policy`. Blank values are ignored.",

2226 1510 },

2227`array<string>`1511 {

2228 1512 key: "allowed_sandbox_modes",

2229Details1513 type: "array<string>",

2230 1514 description: "Allowed values for `sandbox_mode`.",

2231Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `reject`).1515 },

2232 1516 {

2233Key1517 key: "remote_sandbox_config",

2234 1518 type: "array<table>",

2235`allowed_sandbox_modes`1519 description:

2236 1520 "Host-specific sandbox requirements. The first entry whose `hostname_patterns` match the resolved host name overrides top-level `allowed_sandbox_modes` for that requirements source. Host-specific entries currently override sandbox modes only.",

2237Type / Values1521 },

2238 1522 {

2239`array<string>`1523 key: "remote_sandbox_config[].hostname_patterns",

2240 1524 type: "array<string>",

2241Details1525 description:

2242 1526 "Case-insensitive host name patterns. Supports `*` for any sequence of characters and `?` for one character.",

2243Allowed values for `sandbox_mode`.1527 },

2244 1528 {

2245Key1529 key: "remote_sandbox_config[].allowed_sandbox_modes",

2246 1530 type: "array<string>",

2247`allowed_web_search_modes`1531 description:

2248 1532 "Allowed sandbox modes to apply when this host-specific entry matches.",

2249Type / Values1533 },

2250 1534 {

2251`array<string>`1535 key: "allowed_web_search_modes",

2252 1536 type: "array<string>",

2253Details1537 description:

2254 1538 "Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`.",

2255Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`.1539 },

2256 1540 {

2257Key1541 key: "features",

2258 1542 type: "table",

2259`mcp_servers`1543 description:

2260 1544 "Pinned feature values keyed by the canonical names from `config.toml`'s `[features]` table.",

2261Type / Values1545 },

2262 1546 {

2263`table`1547 key: "features.<name>",

2264 1548 type: "boolean",

2265Details1549 description:

2266 1550 "Require a specific canonical feature key to stay enabled or disabled.",

2267Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled.1551 },

2268 1552 {

2269Key1553 key: "features.in_app_browser",

2270 1554 type: "boolean",

2271`mcp_servers.<id>.identity`1555 description:

2272 1556 "Set to `false` in `requirements.toml` to disable the in-app browser pane.",

2273Type / Values1557 },

2274 1558 {

2275`table`1559 key: "features.browser_use",

2276 1560 type: "boolean",

2277Details1561 description:

2278 1562 "Set to `false` in `requirements.toml` to disable Browser Use and Browser Agent availability.",

2279Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP).1563 },

2280 1564 {

2281Key1565 key: "features.computer_use",

2282 1566 type: "boolean",

2283`mcp_servers.<id>.identity.command`1567 description:

2284 1568 "Set to `false` in `requirements.toml` to disable Computer Use availability and related install or enablement flows.",

2285Type / Values1569 },

2286 1570 {

2287`string`1571 key: "experimental_network",

2288 1572 type: "table",

2289Details1573 description:

2290 1574 "Network access requirements enforced from `requirements.toml`. These constraints are separate from `features.network_proxy` and can configure sandboxed networking without the user feature flag.",

2291Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command.1575 },

2292 1576 {

2293Key1577 key: "experimental_network.enabled",

2294 1578 type: "boolean",

2295`mcp_servers.<id>.identity.url`1579 description:

2296 1580 "Enable sandboxed networking requirements. This does not grant network access when the active sandbox keeps command networking off.",

2297Type / Values1581 },

2298 1582 {

2299`string`1583 key: "experimental_network.http_port",

2300 1584 type: "integer",

2301Details1585 description:

2302 1586 "Loopback HTTP listener port to use for `[experimental_network]` requirements.",

2303Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL.1587 },

2304 1588 {

2305Key1589 key: "experimental_network.socks_port",

2306 1590 type: "integer",

2307`rules`1591 description:

2308 1592 "Loopback SOCKS5 listener port to use for `[experimental_network]` requirements.",

2309Type / Values1593 },

2310 1594 {

2311`table`1595 key: "experimental_network.allow_upstream_proxy",

2312 1596 type: "boolean",

2313Details1597 description:

2314 1598 "Allow sandboxed networking to chain through an upstream proxy from the environment.",

2315Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive.1599 },

2316 1600 {

2317Key1601 key: "experimental_network.dangerously_allow_non_loopback_proxy",

2318 1602 type: "boolean",

2319`rules.prefix_rules`1603 description:

2320 1604 "Permit non-loopback listener addresses for `[experimental_network]` requirements. Enabling it can expose listeners beyond localhost.",

2321Type / Values1605 },

2322 1606 {

2323`array<table>`1607 key: "experimental_network.dangerously_allow_all_unix_sockets",

2324 1608 type: "boolean",

2325Details1609 description:

2326 1610 "Permit arbitrary Unix socket destinations instead of allowlist-only access. Use only in tightly controlled environments.",

2327List of enforced prefix rules. Each rule must include `pattern` and `decision`.1611 },

2328 1612 {

2329Key1613 key: "experimental_network.domains",

2330 1614 type: "map<string, allow | deny>",

2331`rules.prefix_rules[].decision`1615 description:

2332 1616 "Map-shaped administrator domain policy for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. `deny` wins on conflicts. Do not combine this with `experimental_network.allowed_domains` or `experimental_network.denied_domains`.",

2333Type / Values1617 },

2334 1618 {

2335`prompt | forbidden`1619 key: "experimental_network.allowed_domains",

2336 1620 type: "array<string>",

2337Details1621 description:

2338 1622 "List-shaped administrator allow rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",

2339Required. Requirements rules can only prompt or forbid (not allow).1623 },

2340 1624 {

2341Key1625 key: "experimental_network.denied_domains",

2342 1626 type: "array<string>",

2343`rules.prefix_rules[].justification`1627 description:

2344 1628 "List-shaped administrator deny rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",

2345Type / Values1629 },

2346 1630 {

2347`string`1631 key: "experimental_network.managed_allowed_domains_only",

2348 1632 type: "boolean",

2349Details1633 description:

2350 1634 "When `true`, only administrator-managed allow rules remain effective while sandboxed networking requirements are active; user allowlist additions are ignored. Without managed allow rules, user-added domain allow rules do not remain effective.",

2351Optional non-empty rationale surfaced in approval prompts or rejection messages.1635 },

2352 1636 {

2353Key1637 key: "experimental_network.unix_sockets",

2354 1638 type: "map<string, allow | none>",

2355`rules.prefix_rules[].pattern`1639 description:

2356 1640 "Administrator-managed Unix socket policy for sandboxed networking.",

2357Type / Values1641 },

2358 1642 {

2359`array<table>`1643 key: "experimental_network.allow_local_binding",

2360 1644 type: "boolean",

2361Details1645 description:

2362 1646 "Permit broader local/private-network access for sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",

2363Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`.1647 },

2364 1648 {

2365Key1649 key: "hooks",

2366 1650 type: "table",

2367`rules.prefix_rules[].pattern[].any_of`1651 description:

2368 1652 "Admin-enforced managed lifecycle hooks. Requires a managed hook directory and uses the same event schema as inline `[hooks]` in `config.toml`.",

2369Type / Values1653 },

2370 1654 {

2371`array<string>`1655 key: "hooks.managed_dir",

2372 1656 type: "string (absolute path)",

2373Details1657 description:

2374 1658 "Directory containing managed hook scripts on macOS and Linux. Codex validates that it is absolute and exists before loading managed hooks.",

2375A list of allowed alternative tokens at this position.1659 },

2376 1660 {

2377Key1661 key: "hooks.windows_managed_dir",

2378 1662 type: "string (absolute path)",

2379`rules.prefix_rules[].pattern[].token`1663 description:

2380 1664 "Directory containing managed hook scripts on Windows. Codex validates that it is absolute and exists before loading managed hooks.",

2381Type / Values1665 },

2382 1666 {

2383`string`1667 key: "hooks.<Event>",

2384 1668 type: "array<table>",

2385Details1669 description:

2386 1670 "Matcher groups for a hook event such as `PreToolUse`, `PermissionRequest`, `PostToolUse`, `SessionStart`, `UserPromptSubmit`, or `Stop`.",

2387A single literal token at this position.1671 },

2388 1672 {

2389Expand to view all1673 key: "hooks.<Event>[].hooks",

1674 type: "array<table>",

1675 description:

1676 "Hook handlers for a matcher group. Command hooks are currently supported; prompt and agent hook handlers are parsed but skipped.",

1677 },

1678 {

1679 key: "permissions.filesystem.deny_read",

1680 type: "array<string>",

1681 description:

1682 "Admin-enforced filesystem read denials. Entries can be paths or glob patterns, and users cannot weaken them with local config.",

1683 },

1684 {

1685 key: "mcp_servers",

1686 type: "table",

1687 description:

1688 "Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled.",

1689 },

1690 {

1691 key: "mcp_servers.<id>.identity",

1692 type: "table",

1693 description:

1694 "Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP).",

1695 },

1696 {

1697 key: "mcp_servers.<id>.identity.command",

1698 type: "string",

1699 description:

1700 "Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command.",

1701 },

1702 {

1703 key: "mcp_servers.<id>.identity.url",

1704 type: "string",

1705 description:

1706 "Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL.",

1707 },

1708 {

1709 key: "rules",

1710 type: "table",

1711 description:

1712 "Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive.",

1713 },

1714 {

1715 key: "rules.prefix_rules",

1716 type: "array<table>",

1717 description:

1718 "List of enforced prefix rules. Each rule must include `pattern` and `decision`.",

1719 },

1720 {

1721 key: "rules.prefix_rules[].pattern",

1722 type: "array<table>",

1723 description:

1724 "Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`.",

1725 },

1726 {

1727 key: "rules.prefix_rules[].pattern[].token",

1728 type: "string",

1729 description: "A single literal token at this position.",

1730 },

1731 {

1732 key: "rules.prefix_rules[].pattern[].any_of",

1733 type: "array<string>",

1734 description: "A list of allowed alternative tokens at this position.",

1735 },

1736 {

1737 key: "rules.prefix_rules[].decision",

1738 type: "prompt | forbidden",

1739 description:

1740 "Required. Requirements rules can only prompt or forbid (not allow).",

1741 },

1742 {

1743 key: "rules.prefix_rules[].justification",

1744 type: "string",

1745 description:

1746 "Optional non-empty rationale surfaced in approval prompts or rejection messages.",

1747 },

1748 ]}

1749 client:load

1750/>