config-reference.md +1724 −2363
6 6
7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.
8 8
99For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/security#network-access).Project-scoped config can't override machine-local provider, auth,
1010 notification, profile, or telemetry routing keys. Codex ignores
1111| Key | Type / Values | Details |`openai_base_url`, `chatgpt_base_url`, `model_provider`, `model_providers`,
1212| --- | --- | --- |`notify`, `profile`, `profiles`, `experimental_realtime_ws_base_url`, and
1313| `agents.<name>.config_file` | `string (path)` | Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. |`otel` when they appear in a project-local `.codex/config.toml`; put those in
1414| `agents.<name>.description` | `string` | Role guidance shown to Codex when choosing and spawning that agent type. |user-level config instead.
1515| `agents.max_depth` | `number` | Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1). |
1616| `agents.max_threads` | `number` | Maximum number of agent threads that can be open concurrently. |For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/agent-approvals-security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/agent-approvals-security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/agent-approvals-security#network-access).
1717| `allow_login_shell` | `boolean` | Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells. |
1818| `approval_policy` | `untrusted | on-request | never | { reject = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool } }` | Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { reject = { ... } }` to auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. |<ConfigTable
1919| `approval_policy.reject.mcp_elicitations` | `boolean` | When `true`, MCP elicitation prompts are auto-rejected instead of shown to the user. | options={[
2020| `approval_policy.reject.rules` | `boolean` | When `true`, approvals triggered by execpolicy `prompt` rules are auto-rejected. | {
2121| `approval_policy.reject.sandbox_approval` | `boolean` | When `true`, sandbox escalation approval prompts are auto-rejected. | key: "model",
2222| `apps._default.destructive_enabled` | `boolean` | Default allow/deny for app tools with `destructive_hint = true`. | type: "string",
2323| `apps._default.enabled` | `boolean` | Default app enabled state for all apps unless overridden per app. | description: "Model to use (e.g., `gpt-5.5`).",
2424| `apps._default.open_world_enabled` | `boolean` | Default allow/deny for app tools with `open_world_hint = true`. | },
2525| `apps.<id>.default_tools_approval_mode` | `auto | prompt | approve` | Default approval behavior for tools in this app unless a per-tool override exists. | {
2626| `apps.<id>.default_tools_enabled` | `boolean` | Default enabled state for tools in this app unless a per-tool override exists. | key: "review_model",
2727| `apps.<id>.destructive_enabled` | `boolean` | Allow or block tools in this app that advertise `destructive_hint = true`. | type: "string",
2828| `apps.<id>.enabled` | `boolean` | Enable or disable a specific app/connector by id (default: true). | description:
2929| `apps.<id>.open_world_enabled` | `boolean` | Allow or block tools in this app that advertise `open_world_hint = true`. | "Optional model override used by `/review` (defaults to the current session model).",
3030| `apps.<id>.tools.<tool>.approval_mode` | `auto | prompt | approve` | Per-tool approval behavior override for a single app tool. | },
3131| `apps.<id>.tools.<tool>.enabled` | `boolean` | Per-tool enabled override for an app tool (for example `repos/list`). | {
3232| `background_terminal_max_timeout` | `number` | Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key. | key: "model_provider",
3333| `chatgpt_base_url` | `string` | Override the base URL used during the ChatGPT login flow. | type: "string",
3434| `check_for_update_on_startup` | `boolean` | Check for Codex updates on startup (set to false only when updates are centrally managed). | description: "Provider id from `model_providers` (default: `openai`).",
3535| `cli_auth_credentials_store` | `file | keyring | auto` | Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). | },
3636| `compact_prompt` | `string` | Inline override for the history compaction prompt. | {
3737| `developer_instructions` | `string` | Additional developer instructions injected into the session (optional). | key: "openai_base_url",
3838| `disable_paste_burst` | `boolean` | Disable burst-paste detection in the TUI. | type: "string",
3939| `experimental_compact_prompt_file` | `string (path)` | Load the compaction prompt override from a file (experimental). | description:
4040| `experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. | "Base URL override for the built-in `openai` model provider.",
4141| `experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. | },
4242| `features.apply_patch_freeform` | `boolean` | Expose the freeform `apply_patch` tool (experimental). | {
4343| `features.apps` | `boolean` | Enable ChatGPT Apps/connectors support (experimental). | key: "model_context_window",
4444| `features.apps_mcp_gateway` | `boolean` | Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). | type: "number",
4545| `features.child_agents_md` | `boolean` | Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). | description: "Context window tokens available to the active model.",
4646| `features.collaboration_modes` | `boolean` | Enable collaboration modes such as plan mode (stable; on by default). | },
4747| `features.multi_agent` | `boolean` | Enable multi-agent collaboration tools (`spawn\_agent`, `send\_input`, `resume\_agent`, `wait`, and `close\_agent`) (experimental; off by default). | {
4848| `features.personality` | `boolean` | Enable personality selection controls (stable; on by default). | key: "model_auto_compact_token_limit",
4949| `features.powershell_utf8` | `boolean` | Force PowerShell UTF-8 output (defaults to true). | type: "number",
5050| `features.remote_models` | `boolean` | Refresh remote model list before showing readiness (experimental). | description:
5151| `features.request_rule` | `boolean` | Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). | "Token threshold that triggers automatic history compaction (unset uses model defaults).",
5252| `features.runtime_metrics` | `boolean` | Show runtime metrics summary in TUI turn separators (experimental). | },
5353| `features.search_tool` | `boolean` | Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). | {
5454| `features.shell_snapshot` | `boolean` | Snapshot shell environment to speed up repeated commands (beta). | key: "model_catalog_json",
5555| `features.shell_tool` | `boolean` | Enable the default `shell` tool for running commands (stable; on by default). | type: "string (path)",
5656| `features.unified_exec` | `boolean` | Use the unified PTY-backed exec tool (beta). | description:
5757| `features.use_linux_sandbox_bwrap` | `boolean` | Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). | "Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile.",
5858| `features.web_search` | `boolean` | Deprecated legacy toggle; prefer the top-level `web_search` setting. | },
5959| `features.web_search_cached` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. | {
6060| `features.web_search_request` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. | key: "oss_provider",
6161| `feedback.enabled` | `boolean` | Enable feedback submission via `/feedback` across Codex surfaces (default: true). | type: "lmstudio | ollama",
6262| `file_opener` | `vscode | vscode-insiders | windsurf | cursor | none` | URI scheme used to open citations from Codex output (default: `vscode`). | description:
6363| `forced_chatgpt_workspace_id` | `string (uuid)` | Limit ChatGPT logins to a specific workspace identifier. | "Default local provider used when running with `--oss` (defaults to prompting if unset).",
6464| `forced_login_method` | `chatgpt | api` | Restrict Codex to a specific authentication method. | },
6565| `hide_agent_reasoning` | `boolean` | Suppress reasoning events in both the TUI and `codex exec` output. | {
6666| `history.max_bytes` | `number` | If set, caps the history file size in bytes by dropping oldest entries. | key: "approval_policy",
6767| `history.persistence` | `save-all | none` | Control whether Codex saves session transcripts to history.jsonl. | type: "untrusted | on-request | never | { granular = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool, request_permissions = bool, skill_approval = bool } }",
6868| `include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | description:
6969| `instructions` | `string` | Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. | "Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { granular = { ... } }` to allow or auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs.",
7070| `log_dir` | `string (path)` | Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. | },
7171| `mcp_oauth_callback_port` | `integer` | Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. | {
7272| `mcp_oauth_callback_url` | `string` | Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port. | key: "approval_policy.granular.sandbox_approval",
7373| `mcp_oauth_credentials_store` | `auto | file | keyring` | Preferred store for MCP OAuth credentials. | type: "boolean",
7474| `mcp_servers.<id>.args` | `array<string>` | Arguments passed to the MCP stdio server command. | description:
7575| `mcp_servers.<id>.bearer_token_env_var` | `string` | Environment variable sourcing the bearer token for an MCP HTTP server. | "When `true`, sandbox escalation approval prompts are allowed to surface.",
7676| `mcp_servers.<id>.command` | `string` | Launcher command for an MCP stdio server. | },
7777| `mcp_servers.<id>.cwd` | `string` | Working directory for the MCP stdio server process. | {
7878| `mcp_servers.<id>.disabled_tools` | `array<string>` | Deny list applied after `enabled_tools` for the MCP server. | key: "approval_policy.granular.rules",
7979| `mcp_servers.<id>.enabled` | `boolean` | Disable an MCP server without removing its configuration. | type: "boolean",
8080| `mcp_servers.<id>.enabled_tools` | `array<string>` | Allow list of tool names exposed by the MCP server. | description:
8181| `mcp_servers.<id>.env` | `map<string,string>` | Environment variables forwarded to the MCP stdio server. | "When `true`, approvals triggered by execpolicy `prompt` rules are allowed to surface.",
8282| `mcp_servers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables for an MCP HTTP server. | },
8383| `mcp_servers.<id>.env_vars` | `array<string>` | Additional environment variables to whitelist for an MCP stdio server. | {
8484| `mcp_servers.<id>.http_headers` | `map<string,string>` | Static HTTP headers included with each MCP HTTP request. | key: "approval_policy.granular.mcp_elicitations",
8585| `mcp_servers.<id>.required` | `boolean` | When true, fail startup/resume if this enabled MCP server cannot initialize. | type: "boolean",
8686| `mcp_servers.<id>.startup_timeout_ms` | `number` | Alias for `startup_timeout_sec` in milliseconds. | description:
8787| `mcp_servers.<id>.startup_timeout_sec` | `number` | Override the default 10s startup timeout for an MCP server. | "When `true`, MCP elicitation prompts are allowed to surface instead of being auto-rejected.",
8888| `mcp_servers.<id>.tool_timeout_sec` | `number` | Override the default 60s per-tool timeout for an MCP server. | },
8989| `mcp_servers.<id>.url` | `string` | Endpoint for an MCP streamable HTTP server. | {
9090| `model` | `string` | Model to use (e.g., `gpt-5-codex`). | key: "approval_policy.granular.request_permissions",
9191| `model_auto_compact_token_limit` | `number` | Token threshold that triggers automatic history compaction (unset uses model defaults). | type: "boolean",
9292| `model_catalog_json` | `string (path)` | Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile. | description:
9393| `model_context_window` | `number` | Context window tokens available to the active model. | "When `true`, prompts from the `request_permissions` tool are allowed to surface.",
9494| `model_instructions_file` | `string (path)` | Replacement for built-in instructions instead of `AGENTS.md`. | },
9595| `model_provider` | `string` | Provider id from `model_providers` (default: `openai`). | {
9696| `model_providers.<id>.base_url` | `string` | API base URL for the model provider. | key: "approval_policy.granular.skill_approval",
9797| `model_providers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables when present. | type: "boolean",
9898| `model_providers.<id>.env_key` | `string` | Environment variable supplying the provider API key. | description:
9999| `model_providers.<id>.env_key_instructions` | `string` | Optional setup guidance for the provider API key. | "When `true`, skill-script approval prompts are allowed to surface.",
100100| `model_providers.<id>.experimental_bearer_token` | `string` | Direct bearer token for the provider (discouraged; use `env_key`). | },
101101| `model_providers.<id>.http_headers` | `map<string,string>` | Static HTTP headers added to provider requests. | {
102102| `model_providers.<id>.name` | `string` | Display name for a custom model provider. | key: "approvals_reviewer",
103103| `model_providers.<id>.query_params` | `map<string,string>` | Extra query parameters appended to provider requests. | type: "user | auto_review",
104104| `model_providers.<id>.request_max_retries` | `number` | Retry count for HTTP requests to the provider (default: 4). | description:
105105| `model_providers.<id>.requires_openai_auth` | `boolean` | The provider uses OpenAI authentication (defaults to false). | "Who reviews eligible approval prompts under `on-request` or granular approval policies. Defaults to `user`; `auto_review` uses the reviewer subagent. This setting doesn't change sandboxing or review actions already allowed inside the sandbox.",
106106| `model_providers.<id>.stream_idle_timeout_ms` | `number` | Idle timeout for SSE streams in milliseconds (default: 300000). | },
107107| `model_providers.<id>.stream_max_retries` | `number` | Retry count for SSE streaming interruptions (default: 5). | {
108108| `model_providers.<id>.wire_api` | `chat | responses` | Protocol used by the provider (defaults to `chat` if omitted). | key: "auto_review.policy",
109109| `model_reasoning_effort` | `minimal | low | medium | high | xhigh` | Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). | type: "string",
110110| `model_reasoning_summary` | `auto | concise | detailed | none` | Select reasoning summary detail or disable summaries entirely. | description:
111111| `model_supports_reasoning_summaries` | `boolean` | Force Codex to send or not send reasoning metadata. | "Local Markdown policy instructions for automatic review. Managed `guardian_policy_config` takes precedence. Blank values are ignored.",
112112| `model_verbosity` | `low | medium | high` | Control GPT-5 Responses API verbosity (defaults to `medium`). | },
113113| `notice.hide_full_access_warning` | `boolean` | Track acknowledgement of the full access warning prompt. | {
114114| `notice.hide_gpt-5.1-codex-max_migration_prompt` | `boolean` | Track acknowledgement of the gpt-5.1-codex-max migration prompt. | key: "allow_login_shell",
115115| `notice.hide_gpt5_1_migration_prompt` | `boolean` | Track acknowledgement of the GPT-5.1 migration prompt. | type: "boolean",
116116| `notice.hide_rate_limit_model_nudge` | `boolean` | Track opt-out of the rate limit model switch reminder. | description:
117117| `notice.hide_world_writable_warning` | `boolean` | Track acknowledgement of the Windows world-writable directories warning. | "Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells.",
118118| `notice.model_migrations` | `map<string,string>` | Track acknowledged model migrations as old->new mappings. | },
119119| `notify` | `array<string>` | Command invoked for notifications; receives a JSON payload from Codex. | {
120120| `oss_provider` | `lmstudio | ollama` | Default local provider used when running with `--oss` (defaults to prompting if unset). | key: "sandbox_mode",
121121| `otel.environment` | `string` | Environment tag applied to emitted OpenTelemetry events (default: `dev`). | type: "read-only | workspace-write | danger-full-access",
122122| `otel.exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry exporter and provide any endpoint metadata. | description:
123123| `otel.exporter.<id>.endpoint` | `string` | Exporter endpoint for OTEL logs. | "Sandbox policy for filesystem and network access during command execution.",
124124| `otel.exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL exporter requests. | },
125125| `otel.exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP exporter. | {
126126| `otel.exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL exporter TLS. | key: "sandbox_workspace_write.writable_roots",
127127| `otel.exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL exporter TLS. | type: "array<string>",
128128| `otel.exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL exporter TLS. | description:
129129| `otel.log_user_prompt` | `boolean` | Opt in to exporting raw user prompts with OpenTelemetry logs. | 'Additional writable roots when `sandbox_mode = "workspace-write"`.',
130130| `otel.trace_exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry trace exporter and provide any endpoint metadata. | },
131131| `otel.trace_exporter.<id>.endpoint` | `string` | Trace exporter endpoint for OTEL logs. | {
132132| `otel.trace_exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL trace exporter requests. | key: "sandbox_workspace_write.network_access",
133133| `otel.trace_exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP trace exporter. | type: "boolean",
134134| `otel.trace_exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL trace exporter TLS. | description:
135135| `otel.trace_exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL trace exporter TLS. | "Allow outbound network access inside the workspace-write sandbox.",
136136| `otel.trace_exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL trace exporter TLS. | },
137137| `personality` | `none | friendly | pragmatic` | Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`. | {
138138| `profile` | `string` | Default profile applied at startup (equivalent to `--profile`). | key: "sandbox_workspace_write.exclude_tmpdir_env_var",
139139| `profiles.<name>.*` | `various` | Profile-scoped overrides for any of the supported configuration keys. | type: "boolean",
140140| `profiles.<name>.experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | description:
141141| `profiles.<name>.experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec`. | "Exclude `$TMPDIR` from writable roots in workspace-write mode.",
142142| `profiles.<name>.include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | },
143143| `profiles.<name>.model_catalog_json` | `string (path)` | Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile). | {
144144| `profiles.<name>.oss_provider` | `lmstudio | ollama` | Profile-scoped OSS provider for `--oss` sessions. | key: "sandbox_workspace_write.exclude_slash_tmp",
145145| `profiles.<name>.personality` | `none | friendly | pragmatic` | Profile-scoped communication style override for supported models. | type: "boolean",
146146| `profiles.<name>.web_search` | `disabled | cached | live` | Profile-scoped web search mode override (default: `"cached"`). | description:
147147| `project_doc_fallback_filenames` | `array<string>` | Additional filenames to try when `AGENTS.md` is missing. | "Exclude `/tmp` from writable roots in workspace-write mode.",
148148| `project_doc_max_bytes` | `number` | Maximum bytes read from `AGENTS.md` when building project instructions. | },
149149| `project_root_markers` | `array<string>` | List of project root marker filenames; used when searching parent directories for the project root. | {
150150| `projects.<path>.trust_level` | `string` | Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers. | key: "windows.sandbox",
151151| `review_model` | `string` | Optional model override used by `/review` (defaults to the current session model). | type: "unelevated | elevated",
152152| `sandbox_mode` | `read-only | workspace-write | danger-full-access` | Sandbox policy for filesystem and network access during command execution. | description:
153153| `sandbox_workspace_write.exclude_slash_tmp` | `boolean` | Exclude `/tmp` from writable roots in workspace-write mode. | "Windows-only native sandbox mode when running Codex natively on Windows.",
154154| `sandbox_workspace_write.exclude_tmpdir_env_var` | `boolean` | Exclude `$TMPDIR` from writable roots in workspace-write mode. | },
155155| `sandbox_workspace_write.network_access` | `boolean` | Allow outbound network access inside the workspace-write sandbox. | {
156156| `sandbox_workspace_write.writable_roots` | `array<string>` | Additional writable roots when `sandbox_mode = "workspace-write"`. | key: "windows.sandbox_private_desktop",
157157| `shell_environment_policy.exclude` | `array<string>` | Glob patterns for removing environment variables after the defaults. | type: "boolean",
158158| `shell_environment_policy.experimental_use_profile` | `boolean` | Use the user shell profile when spawning subprocesses. | description:
159159| `shell_environment_policy.ignore_default_excludes` | `boolean` | Keep variables containing KEY/SECRET/TOKEN before other filters run. | "Run the final sandboxed child process on a private desktop by default on native Windows. Set `false` only for compatibility with the older `Winsta0\\\\Default` behavior.",
160160| `shell_environment_policy.include_only` | `array<string>` | Whitelist of patterns; when set only matching variables are kept. | },
161161| `shell_environment_policy.inherit` | `all | core | none` | Baseline environment inheritance when spawning subprocesses. | {
162162| `shell_environment_policy.set` | `map<string,string>` | Explicit environment overrides injected into every subprocess. | key: "notify",
163163| `show_raw_agent_reasoning` | `boolean` | Surface raw reasoning content when the active model emits it. | type: "array<string>",
164164| `skills.config` | `array<object>` | Per-skill enablement overrides stored in config.toml. | description:
165165| `skills.config.<index>.enabled` | `boolean` | Enable or disable the referenced skill. | "Command invoked for notifications; receives a JSON payload from Codex.",
166166| `skills.config.<index>.path` | `string (path)` | Path to a skill folder containing `SKILL.md`. | },
167167| `suppress_unstable_features_warning` | `boolean` | Suppress the warning that appears when under-development feature flags are enabled. | {
168168| `tool_output_token_limit` | `number` | Token budget for storing individual tool/function outputs in history. | key: "check_for_update_on_startup",
169169| `tools.web_search` | `boolean` | Deprecated legacy toggle for web search; prefer the top-level `web_search` setting. | type: "boolean",
170170| `tui` | `table` | TUI-specific options such as enabling inline desktop notifications. | description:
171171| `tui.alternate_screen` | `auto | always | never` | Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback). | "Check for Codex updates on startup (set to false only when updates are centrally managed).",
172172| `tui.animations` | `boolean` | Enable terminal animations (welcome screen, shimmer, spinner) (default: true). | },
173173| `tui.notification_method` | `auto | osc9 | bel` | Notification method for unfocused terminal notifications (default: auto). | {
174174| `tui.notifications` | `boolean | array<string>` | Enable TUI notifications; optionally restrict to specific event types. | key: "feedback.enabled",
175175| `tui.show_tooltips` | `boolean` | Show onboarding tooltips in the TUI welcome screen (default: true). | type: "boolean",
176176| `tui.status_line` | `array<string> | null` | Ordered list of TUI footer status-line item identifiers. `null` disables the status line. | description:
177177| `web_search` | `disabled | cached | live` | Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool. | "Enable feedback submission via `/feedback` across Codex surfaces (default: true).",
178178| `windows_wsl_setup_acknowledged` | `boolean` | Track Windows onboarding acknowledgement (Windows only). | },
179179| `windows.sandbox` | `unelevated | elevated` | Windows-only native sandbox mode when running Codex natively on Windows. | {
180180 key: "analytics.enabled",
181181Key type: "boolean",
182182 description:
183183`agents.<name>.config_file` "Enable or disable analytics for this machine/profile. When unset, the client default applies.",
184184 },
185185Type / Values {
186186 key: "instructions",
187187`string (path)` type: "string",
188188 description:
189189Details "Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`.",
190190 },
191191Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. {
192192 key: "developer_instructions",
193193Key type: "string",
194194 description:
195195`agents.<name>.description` "Additional developer instructions injected into the session (optional).",
196196 },
197197Type / Values {
198198 key: "log_dir",
199199`string` type: "string (path)",
200200 description:
201201Details "Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`.",
202202 },
203203Role guidance shown to Codex when choosing and spawning that agent type. {
204204 key: "sqlite_home",
205205Key type: "string (path)",
206206 description:
207207`agents.max_depth` "Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state.",
208208 },
209209Type / Values {
210210 key: "compact_prompt",
211211`number` type: "string",
212212 description: "Inline override for the history compaction prompt.",
213213Details },
214214 {
215215Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1). key: "commit_attribution",
216216 type: "string",
217217Key description:
218218 'Commit co-author trailer used when `[features].codex_git_commit` is enabled. Defaults to `Codex <noreply@openai.com>`; set `""` to disable.',
219219`agents.max_threads` },
220220 {
221221Type / Values key: "model_instructions_file",
222222 type: "string (path)",
223223`number` description:
224224 "Replacement for built-in instructions instead of `AGENTS.md`.",
225225Details },
226226 {
227227Maximum number of agent threads that can be open concurrently. key: "personality",
228228 type: "none | friendly | pragmatic",
229229Key description:
230230 "Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.",
231231`allow_login_shell` },
232232 {
233233Type / Values key: "service_tier",
234234 type: "string",
235235`boolean` description:
236236 "Preferred service tier for new turns. Built-in values include `flex` and `fast`; legacy `fast` config maps to the request value `priority`, and catalog-provided tier IDs can also be stored.",
237237Details },
238238 {
239239Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells. key: "experimental_compact_prompt_file",
240240 type: "string (path)",
241241Key description:
242242 "Load the compaction prompt override from a file (experimental).",
243243`approval_policy` },
244244 {
245245Type / Values key: "skills.config",
246246 type: "array<object>",
247247`untrusted | on-request | never | { reject = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool } }` description: "Per-skill enablement overrides stored in config.toml.",
248248 },
249249Details {
250250 key: "skills.config.<index>.path",
251251Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { reject = { ... } }` to auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. type: "string (path)",
252252 description: "Path to a skill folder containing `SKILL.md`.",
253253Key },
254254 {
255255`approval_policy.reject.mcp_elicitations` key: "skills.config.<index>.enabled",
256256 type: "boolean",
257257Type / Values description: "Enable or disable the referenced skill.",
258258 },
259259`boolean` {
260260 key: "apps.<id>.enabled",
261261Details type: "boolean",
262262 description:
263263When `true`, MCP elicitation prompts are auto-rejected instead of shown to the user. "Enable or disable a specific app/connector by id (default: true).",
264264 },
265265Key {
266266 key: "apps._default.enabled",
267267`approval_policy.reject.rules` type: "boolean",
268268 description:
269269Type / Values "Default app enabled state for all apps unless overridden per app.",
270270 },
271271`boolean` {
272272 key: "apps._default.destructive_enabled",
273273Details type: "boolean",
274274 description:
275275When `true`, approvals triggered by execpolicy `prompt` rules are auto-rejected. "Default allow/deny for app tools with `destructive_hint = true`.",
276276 },
277277Key {
278278 key: "apps._default.open_world_enabled",
279279`approval_policy.reject.sandbox_approval` type: "boolean",
280280 description:
281281Type / Values "Default allow/deny for app tools with `open_world_hint = true`.",
282282 },
283283`boolean` {
284284 key: "apps.<id>.destructive_enabled",
285285Details type: "boolean",
286286 description:
287287When `true`, sandbox escalation approval prompts are auto-rejected. "Allow or block tools in this app that advertise `destructive_hint = true`.",
288288 },
289289Key {
290290 key: "apps.<id>.open_world_enabled",
291291`apps._default.destructive_enabled` type: "boolean",
292292 description:
293293Type / Values "Allow or block tools in this app that advertise `open_world_hint = true`.",
294294 },
295295`boolean` {
296296 key: "apps.<id>.default_tools_enabled",
297297Details type: "boolean",
298298 description:
299299Default allow/deny for app tools with `destructive_hint = true`. "Default enabled state for tools in this app unless a per-tool override exists.",
300300 },
301301Key {
302302 key: "apps.<id>.default_tools_approval_mode",
303303`apps._default.enabled` type: "auto | prompt | approve",
304304 description:
305305Type / Values "Default approval behavior for tools in this app unless a per-tool override exists.",
306306 },
307307`boolean` {
308308 key: "apps.<id>.tools.<tool>.enabled",
309309Details type: "boolean",
310310 description:
311311Default app enabled state for all apps unless overridden per app. "Per-tool enabled override for an app tool (for example `repos/list`).",
312312 },
313313Key {
314314 key: "apps.<id>.tools.<tool>.approval_mode",
315315`apps._default.open_world_enabled` type: "auto | prompt | approve",
316316 description: "Per-tool approval behavior override for a single app tool.",
317317Type / Values },
318318 {
319319`boolean` key: "tool_suggest.discoverables",
320320 type: "array<table>",
321321Details description:
322322 'Allow tool suggestions for additional discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
323323Default allow/deny for app tools with `open_world_hint = true`. },
324324 {
325325Key key: "tool_suggest.disabled_tools",
326326 type: "array<table>",
327327`apps.<id>.default_tools_approval_mode` description:
328328 'Disable suggestions for specific discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
329329Type / Values },
330330 {
331331`auto | prompt | approve` key: "features.apps",
332332 type: "boolean",
333333Details description: "Enable ChatGPT Apps/connectors support (experimental).",
334334 },
335335Default approval behavior for tools in this app unless a per-tool override exists. {
336336 key: "features.hooks",
337337Key type: "boolean",
338338 description:
339339`apps.<id>.default_tools_enabled` "Enable lifecycle hooks loaded from `hooks.json` or inline `[hooks]` config. `features.codex_hooks` is a deprecated alias.",
340340 },
341341Type / Values {
342342 key: "features.codex_git_commit",
343343`boolean` type: "boolean",
344344 description:
345345Details "Enable Codex-generated git commits. When enabled, Codex uses `commit_attribution` to append a `Co-authored-by:` trailer to generated commit messages.",
346346 },
347347Default enabled state for tools in this app unless a per-tool override exists. {
348348 key: "hooks",
349349Key type: "table",
350350 description:
351351`apps.<id>.destructive_enabled` "Lifecycle hooks configured inline in `config.toml`. Uses the same event schema as `hooks.json`; see the Hooks guide for examples and supported events.",
352352 },
353353Type / Values {
354354 key: "features.plugin_hooks",
355355`boolean` type: "boolean",
356356 description:
357357Details "Opt into lifecycle hooks bundled with enabled plugins. Off by default in this release; set to `true` to opt in.",
358358 },
359359Allow or block tools in this app that advertise `destructive_hint = true`. {
360360 key: "features.memories",
361361Key type: "boolean",
362362 description: "Enable [Memories](https://developers.openai.com/codex/memories) (off by default).",
363363`apps.<id>.enabled` },
364364 {
365365Type / Values key: "mcp_servers.<id>.command",
366366 type: "string",
367367`boolean` description: "Launcher command for an MCP stdio server.",
368368 },
369369Details {
370370 key: "mcp_servers.<id>.args",
371371Enable or disable a specific app/connector by id (default: true). type: "array<string>",
372372 description: "Arguments passed to the MCP stdio server command.",
373373Key },
374374 {
375375`apps.<id>.open_world_enabled` key: "mcp_servers.<id>.env",
376376 type: "map<string,string>",
377377Type / Values description: "Environment variables forwarded to the MCP stdio server.",
378378 },
379379`boolean` {
380380 key: "mcp_servers.<id>.env_vars",
381381Details type: 'array<string | { name = string, source = "local" | "remote" }>',
382382 description:
383383Allow or block tools in this app that advertise `open_world_hint = true`. 'Additional environment variables to whitelist for an MCP stdio server. String entries default to `source = "local"`; use `source = "remote"` only with executor-backed remote stdio.',
384384 },
385385Key {
386386 key: "mcp_servers.<id>.cwd",
387387`apps.<id>.tools.<tool>.approval_mode` type: "string",
388388 description: "Working directory for the MCP stdio server process.",
389389Type / Values },
390390 {
391391`auto | prompt | approve` key: "mcp_servers.<id>.url",
392392 type: "string",
393393Details description: "Endpoint for an MCP streamable HTTP server.",
394394 },
395395Per-tool approval behavior override for a single app tool. {
396396 key: "mcp_servers.<id>.bearer_token_env_var",
397397Key type: "string",
398398 description:
399399`apps.<id>.tools.<tool>.enabled` "Environment variable sourcing the bearer token for an MCP HTTP server.",
400400 },
401401Type / Values {
402402 key: "mcp_servers.<id>.http_headers",
403403`boolean` type: "map<string,string>",
404404 description: "Static HTTP headers included with each MCP HTTP request.",
405405Details },
406406 {
407407Per-tool enabled override for an app tool (for example `repos/list`). key: "mcp_servers.<id>.env_http_headers",
408408 type: "map<string,string>",
409409Key description:
410410 "HTTP headers populated from environment variables for an MCP HTTP server.",
411411`background_terminal_max_timeout` },
412412 {
413413Type / Values key: "mcp_servers.<id>.enabled",
414414 type: "boolean",
415415`number` description: "Disable an MCP server without removing its configuration.",
416416 },
417417Details {
418418 key: "mcp_servers.<id>.required",
419419Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key. type: "boolean",
420420 description:
421421Key "When true, fail startup/resume if this enabled MCP server cannot initialize.",
422422 },
423423`chatgpt_base_url` {
424424 key: "mcp_servers.<id>.startup_timeout_sec",
425425Type / Values type: "number",
426426 description:
427427`string` "Override the default 10s startup timeout for an MCP server.",
428428 },
429429Details {
430430 key: "mcp_servers.<id>.startup_timeout_ms",
431431Override the base URL used during the ChatGPT login flow. type: "number",
432432 description: "Alias for `startup_timeout_sec` in milliseconds.",
433433Key },
434434 {
435435`check_for_update_on_startup` key: "mcp_servers.<id>.tool_timeout_sec",
436436 type: "number",
437437Type / Values description:
438438 "Override the default 60s per-tool timeout for an MCP server.",
439439`boolean` },
440440 {
441441Details key: "mcp_servers.<id>.enabled_tools",
442442 type: "array<string>",
443443Check for Codex updates on startup (set to false only when updates are centrally managed). description: "Allow list of tool names exposed by the MCP server.",
444444 },
445445Key {
446446 key: "mcp_servers.<id>.disabled_tools",
447447`cli_auth_credentials_store` type: "array<string>",
448448 description:
449449Type / Values "Deny list applied after `enabled_tools` for the MCP server.",
450450 },
451451`file | keyring | auto` {
452452 key: "mcp_servers.<id>.default_tools_approval_mode",
453453Details type: "auto | prompt | approve",
454454 description:
455455Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). "Default approval behavior for MCP tools on this server unless a per-tool override exists.",
456456 },
457457Key {
458458 key: "mcp_servers.<id>.tools.<tool>.approval_mode",
459459`compact_prompt` type: "auto | prompt | approve",
460460 description:
461461Type / Values "Per-tool approval behavior override for one MCP tool on this server.",
462462 },
463463`string` {
464464 key: "mcp_servers.<id>.scopes",
465465Details type: "array<string>",
466466 description:
467467Inline override for the history compaction prompt. "OAuth scopes to request when authenticating to that MCP server.",
468468 },
469469Key {
470470 key: "mcp_servers.<id>.oauth_resource",
471471`developer_instructions` type: "string",
472472 description:
473473Type / Values "Optional RFC 8707 OAuth resource parameter to include during MCP login.",
474474 },
475475`string` {
476476 key: "mcp_servers.<id>.experimental_environment",
477477Details type: "local | remote",
478478 description:
479479Additional developer instructions injected into the session (optional). "Experimental placement for an MCP server. `remote` starts stdio servers through a remote executor environment; streamable HTTP remote placement is not implemented.",
480480 },
481481Key {
482482 key: "agents.max_threads",
483483`disable_paste_burst` type: "number",
484484 description:
485485Type / Values "Maximum number of agent threads that can be open concurrently. Defaults to `6` when unset.",
486486 },
487487`boolean` {
488488 key: "agents.max_depth",
489489Details type: "number",
490490 description:
491491Disable burst-paste detection in the TUI. "Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1).",
492492 },
493493Key {
494494 key: "agents.job_max_runtime_seconds",
495495`experimental_compact_prompt_file` type: "number",
496496 description:
497497Type / Values "Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker.",
498498 },
499499`string (path)` {
500500 key: "agents.<name>.description",
501501Details type: "string",
502502 description:
503503Load the compaction prompt override from a file (experimental). "Role guidance shown to Codex when choosing and spawning that agent type.",
504504 },
505505Key {
506506 key: "agents.<name>.config_file",
507507`experimental_use_freeform_apply_patch` type: "string (path)",
508508 description:
509509Type / Values "Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role.",
510510 },
511511`boolean` {
512512 key: "agents.<name>.nickname_candidates",
513513Details type: "array<string>",
514514 description:
515515Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. "Optional pool of display nicknames for spawned agents in that role.",
516516 },
517517Key {
518518 key: "memories.generate_memories",
519519`experimental_use_unified_exec_tool` type: "boolean",
520520 description:
521521Type / Values "When `false`, newly created threads are not stored as memory-generation inputs. Defaults to `true`.",
522522 },
523523`boolean` {
524524 key: "memories.use_memories",
525525Details type: "boolean",
526526 description:
527527Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. "When `false`, Codex skips injecting existing memories into future sessions. Defaults to `true`.",
528528 },
529529Key {
530530 key: "memories.disable_on_external_context",
531531`features.apply_patch_freeform` type: "boolean",
532532 description:
533533Type / Values "When `true`, threads that use external context such as MCP tool calls, web search, or tool search are kept out of memory generation. Defaults to `false`. Legacy alias: `memories.no_memories_if_mcp_or_web_search`.",
534534 },
535535`boolean` {
536536 key: "memories.max_raw_memories_for_consolidation",
537537Details type: "number",
538538 description:
539539Expose the freeform `apply_patch` tool (experimental). "Maximum recent raw memories retained for global consolidation. Defaults to `256` and is capped at `4096`.",
540540 },
541541Key {
542542 key: "memories.max_unused_days",
543543`features.apps` type: "number",
544544 description:
545545Type / Values "Maximum days since a memory was last used before it becomes ineligible for consolidation. Defaults to `30` and is clamped to `0`-`365`.",
546546 },
547547`boolean` {
548548 key: "memories.max_rollout_age_days",
549549Details type: "number",
550550 description:
551551Enable ChatGPT Apps/connectors support (experimental). "Maximum age of threads considered for memory generation. Defaults to `30` and is clamped to `0`-`90`.",
552552 },
553553Key {
554554 key: "memories.max_rollouts_per_startup",
555555`features.apps_mcp_gateway` type: "number",
556556 description:
557557Type / Values "Maximum rollout candidates processed per startup pass. Defaults to `16` and is capped at `128`.",
558558 },
559559`boolean` {
560560 key: "memories.min_rollout_idle_hours",
561561Details type: "number",
562562 description:
563563Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). "Minimum idle time before a thread is considered for memory generation. Defaults to `6` and is clamped to `1`-`48`.",
564564 },
565565Key {
566566 key: "memories.min_rate_limit_remaining_percent",
567567`features.child_agents_md` type: "number",
568568 description:
569569Type / Values "Minimum remaining percentage required in Codex rate-limit windows before memory generation starts. Defaults to `25` and is clamped to `0`-`100`.",
570570 },
571571`boolean` {
572572 key: "memories.extract_model",
573573Details type: "string",
574574 description: "Optional model override for per-thread memory extraction.",
575575Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). },
576576 {
577577Key key: "memories.consolidation_model",
578578 type: "string",
579579`features.collaboration_modes` description: "Optional model override for global memory consolidation.",
580580 },
581581Type / Values {
582582 key: "features.unified_exec",
583583`boolean` type: "boolean",
584584 description:
585585Details "Use the unified PTY-backed exec tool (stable; enabled by default except on Windows).",
586586 },
587587Enable collaboration modes such as plan mode (stable; on by default). {
588588 key: "features.shell_snapshot",
589589Key type: "boolean",
590590 description:
591591`features.multi_agent` "Snapshot shell environment to speed up repeated commands (stable; on by default).",
592592 },
593593Type / Values {
594594 key: "features.undo",
595595`boolean` type: "boolean",
596596 description: "Enable undo support (stable; off by default).",
597597Details },
598598 {
599599Enable multi-agent collaboration tools (`spawn\_agent`, `send\_input`, `resume\_agent`, `wait`, and `close\_agent`) (experimental; off by default). key: "features.multi_agent",
600600 type: "boolean",
601601Key description:
602602 "Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait_agent`, and `close_agent`) (stable; on by default).",
603603`features.personality` },
604604 {
605605Type / Values key: "features.personality",
606606 type: "boolean",
607607`boolean` description:
608608 "Enable personality selection controls (stable; on by default).",
609609Details },
610610 {
611611Enable personality selection controls (stable; on by default). key: "features.network_proxy",
612612 type: "boolean | table",
613613Key description:
614614 "Enable sandboxed networking. Use a table form when setting network policy options such as `domains` (experimental; off by default).",
615615`features.powershell_utf8` },
616616 {
617617Type / Values key: "features.network_proxy.enabled",
618618 type: "boolean",
619619`boolean` description: "Enable sandboxed networking. Defaults to `false`.",
620620 },
621621Details {
622622 key: "features.network_proxy.domains",
623623Force PowerShell UTF-8 output (defaults to true). type: "map<string, allow | deny>",
624624 description:
625625Key "Domain policy for sandboxed networking. Unset by default, which means no external destinations are allowed until you add `allow` rules. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. Add `deny` rules for blocked destinations; `deny` wins on conflicts.",
626626 },
627627`features.remote_models` {
628628 key: "features.network_proxy.unix_sockets",
629629Type / Values type: "map<string, allow | none>",
630630 description:
631631`boolean` "Unix socket policy for sandboxed networking. Unset by default; add `allow` entries for permitted sockets.",
632632 },
633633Details {
634634 key: "features.network_proxy.allow_local_binding",
635635Refresh remote model list before showing readiness (experimental). type: "boolean",
636636 description:
637637Key "Allow broader local/private-network access. Defaults to `false`; exact local IP literal or `localhost` allow rules can still permit specific local targets.",
638638 },
639639`features.request_rule` {
640640 key: "features.network_proxy.enable_socks5",
641641Type / Values type: "boolean",
642642 description: "Expose SOCKS5 support. Defaults to `true`.",
643643`boolean` },
644644 {
645645Details key: "features.network_proxy.enable_socks5_udp",
646646 type: "boolean",
647647Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). description: "Allow UDP over SOCKS5. Defaults to `true`.",
648648 },
649649Key {
650650 key: "features.network_proxy.allow_upstream_proxy",
651651`features.runtime_metrics` type: "boolean",
652652 description:
653653Type / Values "Allow chaining through an upstream proxy from the environment. Defaults to `true`.",
654654 },
655655`boolean` {
656656 key: "features.network_proxy.dangerously_allow_non_loopback_proxy",
657657Details type: "boolean",
658658 description:
659659Show runtime metrics summary in TUI turn separators (experimental). "Permit non-loopback listener addresses. Defaults to `false`; enabling it can expose proxy listeners beyond localhost.",
660660 },
661661Key {
662662 key: "features.network_proxy.dangerously_allow_all_unix_sockets",
663663`features.search_tool` type: "boolean",
664664 description:
665665Type / Values "Permit arbitrary Unix socket destinations instead of allowlist-only access. Defaults to `false`; use only in tightly controlled environments.",
666666 },
667667`boolean` {
668668 key: "features.network_proxy.proxy_url",
669669Details type: "string",
670670 description:
671671Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). 'HTTP listener URL for sandboxed networking. Defaults to `"http://127.0.0.1:3128"`.',
672672 },
673673Key {
674674 key: "features.network_proxy.socks_url",
675675`features.shell_snapshot` type: "string",
676676 description:
677677Type / Values 'SOCKS5 listener URL. Defaults to `"http://127.0.0.1:8081"`.',
678678 },
679679`boolean` {
680680 key: "features.web_search",
681681Details type: "boolean",
682682 description:
683683Snapshot shell environment to speed up repeated commands (beta). "Deprecated legacy toggle; prefer the top-level `web_search` setting.",
684684 },
685685Key {
686686 key: "features.web_search_cached",
687687`features.shell_tool` type: "boolean",
688688 description:
689689Type / Values 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`.',
690690 },
691691`boolean` {
692692 key: "features.web_search_request",
693693Details type: "boolean",
694694 description:
695695Enable the default `shell` tool for running commands (stable; on by default). 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`.',
696696 },
697697Key {
698698 key: "features.shell_tool",
699699`features.unified_exec` type: "boolean",
700700 description:
701701Type / Values "Enable the default `shell` tool for running commands (stable; on by default).",
702702 },
703703`boolean` {
704704 key: "features.enable_request_compression",
705705Details type: "boolean",
706706 description:
707707Use the unified PTY-backed exec tool (beta). "Compress streaming request bodies with zstd when supported (stable; on by default).",
708708 },
709709Key {
710710 key: "features.skill_mcp_dependency_install",
711711`features.use_linux_sandbox_bwrap` type: "boolean",
712712 description:
713713Type / Values "Allow prompting and installing missing MCP dependencies for skills (stable; on by default).",
714714 },
715715`boolean` {
716716 key: "features.fast_mode",
717717Details type: "boolean",
718718 description:
719719Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). "Enable model-catalog service tier selection in the TUI, including Fast-tier commands when the active model advertises them (stable; on by default).",
720720 },
721721Key {
722722 key: "features.prevent_idle_sleep",
723723`features.web_search` type: "boolean",
724724 description:
725725Type / Values "Prevent the machine from sleeping while a turn is actively running (experimental; off by default).",
726726 },
727727`boolean` {
728728 key: "suppress_unstable_features_warning",
729729Details type: "boolean",
730730 description:
731731Deprecated legacy toggle; prefer the top-level `web_search` setting. "Suppress the warning that appears when under-development feature flags are enabled.",
732732 },
733733Key {
734734 key: "model_providers.<id>",
735735`features.web_search_cached` type: "table",
736736 description:
737737Type / Values "Custom provider definition. Built-in provider IDs (`openai`, `ollama`, and `lmstudio`) are reserved and cannot be overridden.",
738738 },
739739`boolean` {
740740 key: "model_providers.<id>.name",
741741Details type: "string",
742742 description: "Display name for a custom model provider.",
743743Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. },
744744 {
745745Key key: "model_providers.<id>.base_url",
746746 type: "string",
747747`features.web_search_request` description: "API base URL for the model provider.",
748748 },
749749Type / Values {
750750 key: "model_providers.<id>.env_key",
751751`boolean` type: "string",
752752 description: "Environment variable supplying the provider API key.",
753753Details },
754754 {
755755Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. key: "model_providers.<id>.env_key_instructions",
756756 type: "string",
757757Key description: "Optional setup guidance for the provider API key.",
758758 },
759759`feedback.enabled` {
760760 key: "model_providers.<id>.experimental_bearer_token",
761761Type / Values type: "string",
762762 description:
763763`boolean` "Direct bearer token for the provider (discouraged; use `env_key`).",
764764 },
765765Details {
766766 key: "model_providers.<id>.requires_openai_auth",
767767Enable feedback submission via `/feedback` across Codex surfaces (default: true). type: "boolean",
768768 description:
769769Key "The provider uses OpenAI authentication (defaults to false).",
770770 },
771771`file_opener` {
772772 key: "model_providers.<id>.wire_api",
773773Type / Values type: "responses",
774774 description:
775775`vscode | vscode-insiders | windsurf | cursor | none` "Protocol used by the provider. `responses` is the only supported value, and it is the default when omitted.",
776776 },
777777Details {
778778 key: "model_providers.<id>.query_params",
779779URI scheme used to open citations from Codex output (default: `vscode`). type: "map<string,string>",
780780 description: "Extra query parameters appended to provider requests.",
781781Key },
782782 {
783783`forced_chatgpt_workspace_id` key: "model_providers.<id>.http_headers",
784784 type: "map<string,string>",
785785Type / Values description: "Static HTTP headers added to provider requests.",
786786 },
787787`string (uuid)` {
788788 key: "model_providers.<id>.env_http_headers",
789789Details type: "map<string,string>",
790790 description:
791791Limit ChatGPT logins to a specific workspace identifier. "HTTP headers populated from environment variables when present.",
792792 },
793793Key {
794794 key: "model_providers.<id>.request_max_retries",
795795`forced_login_method` type: "number",
796796 description:
797797Type / Values "Retry count for HTTP requests to the provider (default: 4).",
798798 },
799799`chatgpt | api` {
800800 key: "model_providers.<id>.stream_max_retries",
801801Details type: "number",
802802 description: "Retry count for SSE streaming interruptions (default: 5).",
803803Restrict Codex to a specific authentication method. },
804804 {
805805Key key: "model_providers.<id>.stream_idle_timeout_ms",
806806 type: "number",
807807`hide_agent_reasoning` description:
808808 "Idle timeout for SSE streams in milliseconds (default: 300000).",
809809Type / Values },
810810 {
811811`boolean` key: "model_providers.<id>.supports_websockets",
812812 type: "boolean",
813813Details description:
814814 "Whether that provider supports the Responses API WebSocket transport.",
815815Suppress reasoning events in both the TUI and `codex exec` output. },
816816 {
817817Key key: "model_providers.<id>.auth",
818818 type: "table",
819819`history.max_bytes` description:
820820 "Command-backed bearer token configuration for a custom provider. Do not combine with `env_key`, `experimental_bearer_token`, or `requires_openai_auth`.",
821821Type / Values },
822822 {
823823`number` key: "model_providers.<id>.auth.command",
824824 type: "string",
825825Details description:
826826 "Command to run when Codex needs a bearer token. The command must print the token to stdout.",
827827If set, caps the history file size in bytes by dropping oldest entries. },
828828 {
829829Key key: "model_providers.<id>.auth.args",
830830 type: "array<string>",
831831`history.persistence` description: "Arguments passed to the token command.",
832832 },
833833Type / Values {
834834 key: "model_providers.<id>.auth.timeout_ms",
835835`save-all | none` type: "number",
836836 description:
837837Details "Maximum token command runtime in milliseconds (default: 5000).",
838838 },
839839Control whether Codex saves session transcripts to history.jsonl. {
840840 key: "model_providers.<id>.auth.refresh_interval_ms",
841841Key type: "number",
842842 description:
843843`include_apply_patch_tool` "How often Codex proactively refreshes the token in milliseconds (default: 300000). Set to `0` to refresh only after an authentication retry.",
844844 },
845845Type / Values {
846846 key: "model_providers.<id>.auth.cwd",
847847`boolean` type: "string (path)",
848848 description: "Working directory for the token command.",
849849Details },
850850 {
851851Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. key: "model_providers.amazon-bedrock.aws.profile",
852852 type: "string",
853853Key description:
854854 "AWS profile name used by the built-in `amazon-bedrock` provider.",
855855`instructions` },
856856 {
857857Type / Values key: "model_providers.amazon-bedrock.aws.region",
858858 type: "string",
859859`string` description: "AWS region used by the built-in `amazon-bedrock` provider.",
860860 },
861861Details {
862862 key: "model_reasoning_effort",
863863Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. type: "minimal | low | medium | high | xhigh",
864864 description:
865865Key "Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent).",
866866 },
867867`log_dir` {
868868 key: "plan_mode_reasoning_effort",
869869Type / Values type: "none | minimal | low | medium | high | xhigh",
870870 description:
871871`string (path)` "Plan-mode-specific reasoning override. When unset, Plan mode uses its built-in preset default.",
872872 },
873873Details {
874874 key: "model_reasoning_summary",
875875Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. type: "auto | concise | detailed | none",
876876 description:
877877Key "Select reasoning summary detail or disable summaries entirely.",
878878 },
879879`mcp_oauth_callback_port` {
880880 key: "model_verbosity",
881881Type / Values type: "low | medium | high",
882882 description:
883883`integer` "Optional GPT-5 Responses API verbosity override; when unset, the selected model/preset default is used.",
884884 },
885885Details {
886886 key: "model_supports_reasoning_summaries",
887887Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. type: "boolean",
888888 description: "Force Codex to send or not send reasoning metadata.",
889889Key },
890890 {
891891`mcp_oauth_callback_url` key: "shell_environment_policy.inherit",
892892 type: "all | core | none",
893893Type / Values description:
894894 "Baseline environment inheritance when spawning subprocesses.",
895895`string` },
896896 {
897897Details key: "shell_environment_policy.ignore_default_excludes",
898898 type: "boolean",
899899Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port. description:
900900 "Keep variables containing KEY/SECRET/TOKEN before other filters run.",
901901Key },
902902 {
903903`mcp_oauth_credentials_store` key: "shell_environment_policy.exclude",
904904 type: "array<string>",
905905Type / Values description:
906906 "Glob patterns for removing environment variables after the defaults.",
907907`auto | file | keyring` },
908908 {
909909Details key: "shell_environment_policy.include_only",
910910 type: "array<string>",
911911Preferred store for MCP OAuth credentials. description:
912912 "Whitelist of patterns; when set only matching variables are kept.",
913913Key },
914914 {
915915`mcp_servers.<id>.args` key: "shell_environment_policy.set",
916916 type: "map<string,string>",
917917Type / Values description:
918918 "Explicit environment overrides injected into every subprocess.",
919919`array<string>` },
920920 {
921921Details key: "shell_environment_policy.experimental_use_profile",
922922 type: "boolean",
923923Arguments passed to the MCP stdio server command. description: "Use the user shell profile when spawning subprocesses.",
924924 },
925925Key {
926926 key: "project_root_markers",
927927`mcp_servers.<id>.bearer_token_env_var` type: "array<string>",
928928 description:
929929Type / Values "List of project root marker filenames; used when searching parent directories for the project root.",
930930 },
931931`string` {
932932 key: "project_doc_max_bytes",
933933Details type: "number",
934934 description:
935935Environment variable sourcing the bearer token for an MCP HTTP server. "Maximum bytes read from `AGENTS.md` when building project instructions.",
936936 },
937937Key {
938938 key: "project_doc_fallback_filenames",
939939`mcp_servers.<id>.command` type: "array<string>",
940940 description: "Additional filenames to try when `AGENTS.md` is missing.",
941941Type / Values },
942942 {
943943`string` key: "profile",
944944 type: "string",
945945Details description:
946946 "Default profile applied at startup (equivalent to `--profile`).",
947947Launcher command for an MCP stdio server. },
948948 {
949949Key key: "profiles.<name>.*",
950950 type: "various",
951951`mcp_servers.<id>.cwd` description:
952952 "Profile-scoped overrides for any of the supported configuration keys.",
953953Type / Values },
954954 {
955955`string` key: "profiles.<name>.service_tier",
956956 type: "string",
957957Details description: "Profile-scoped service tier preference for new turns.",
958958 },
959959Working directory for the MCP stdio server process. {
960960 key: "profiles.<name>.plan_mode_reasoning_effort",
961961Key type: "none | minimal | low | medium | high | xhigh",
962962 description: "Profile-scoped Plan-mode reasoning override.",
963963`mcp_servers.<id>.disabled_tools` },
964964 {
965965Type / Values key: "profiles.<name>.web_search",
966966 type: "disabled | cached | live",
967967`array<string>` description:
968968 'Profile-scoped web search mode override (default: `"cached"`).',
969969Details },
970970 {
971971Deny list applied after `enabled_tools` for the MCP server. key: "profiles.<name>.personality",
972972 type: "none | friendly | pragmatic",
973973Key description:
974974 "Profile-scoped communication style override for supported models.",
975975`mcp_servers.<id>.enabled` },
976976 {
977977Type / Values key: "profiles.<name>.model_catalog_json",
978978 type: "string (path)",
979979`boolean` description:
980980 "Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).",
981981Details },
982982 {
983983Disable an MCP server without removing its configuration. key: "profiles.<name>.model_instructions_file",
984984 type: "string (path)",
985985Key description:
986986 "Profile-scoped replacement for the built-in instruction file.",
987987`mcp_servers.<id>.enabled_tools` },
988988 {
989989Type / Values key: "profiles.<name>.experimental_use_unified_exec_tool",
990990 type: "boolean",
991991`array<string>` description:
992992 "Legacy name for enabling unified exec; prefer `[features].unified_exec`.",
993993Details },
994994 {
995995Allow list of tool names exposed by the MCP server. key: "profiles.<name>.oss_provider",
996996 type: "lmstudio | ollama",
997997Key description: "Profile-scoped OSS provider for `--oss` sessions.",
998998 },
999999`mcp_servers.<id>.env` {
10001000 key: "profiles.<name>.tools_view_image",
10011001Type / Values type: "boolean",
10021002 description: "Enable or disable the `view_image` tool in that profile.",
10031003`map<string,string>` },
10041004 {
10051005Details key: "profiles.<name>.analytics.enabled",
10061006 type: "boolean",
10071007Environment variables forwarded to the MCP stdio server. description: "Profile-scoped analytics enablement override.",
10081008 },
10091009Key {
10101010 key: "profiles.<name>.windows.sandbox",
10111011`mcp_servers.<id>.env_http_headers` type: "unelevated | elevated",
10121012 description: "Profile-scoped Windows sandbox mode override.",
10131013Type / Values },
10141014 {
10151015`map<string,string>` key: "history.persistence",
10161016 type: "save-all | none",
10171017Details description:
10181018 "Control whether Codex saves session transcripts to history.jsonl.",
10191019HTTP headers populated from environment variables for an MCP HTTP server. },
10201020 {
10211021Key key: "tool_output_token_limit",
10221022 type: "number",
10231023`mcp_servers.<id>.env_vars` description:
10241024 "Token budget for storing individual tool/function outputs in history.",
10251025Type / Values },
10261026 {
10271027`array<string>` key: "background_terminal_max_timeout",
10281028 type: "number",
10291029Details description:
10301030 "Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key.",
10311031Additional environment variables to whitelist for an MCP stdio server. },
10321032 {
10331033Key key: "history.max_bytes",
10341034 type: "number",
10351035`mcp_servers.<id>.http_headers` description:
10361036 "If set, caps the history file size in bytes by dropping oldest entries.",
10371037Type / Values },
10381038 {
10391039`map<string,string>` key: "file_opener",
10401040 type: "vscode | vscode-insiders | windsurf | cursor | none",
10411041Details description:
10421042 "URI scheme used to open citations from Codex output (default: `vscode`).",
10431043Static HTTP headers included with each MCP HTTP request. },
10441044 {
10451045Key key: "otel.environment",
10461046 type: "string",
10471047`mcp_servers.<id>.required` description:
10481048 "Environment tag applied to emitted OpenTelemetry events (default: `dev`).",
10491049Type / Values },
10501050 {
10511051`boolean` key: "otel.exporter",
10521052 type: "none | otlp-http | otlp-grpc",
10531053Details description:
10541054 "Select the OpenTelemetry exporter and provide any endpoint metadata.",
10551055When true, fail startup/resume if this enabled MCP server cannot initialize. },
10561056 {
10571057Key key: "otel.trace_exporter",
10581058 type: "none | otlp-http | otlp-grpc",
10591059`mcp_servers.<id>.startup_timeout_ms` description:
10601060 "Select the OpenTelemetry trace exporter and provide any endpoint metadata.",
10611061Type / Values },
10621062 {
10631063`number` key: "otel.metrics_exporter",
10641064 type: "none | statsig | otlp-http | otlp-grpc",
10651065Details description:
10661066 "Select the OpenTelemetry metrics exporter (defaults to `statsig`).",
10671067Alias for `startup_timeout_sec` in milliseconds. },
10681068 {
10691069Key key: "otel.log_user_prompt",
10701070 type: "boolean",
10711071`mcp_servers.<id>.startup_timeout_sec` description:
10721072 "Opt in to exporting raw user prompts with OpenTelemetry logs.",
10731073Type / Values },
10741074 {
10751075`number` key: "otel.exporter.<id>.endpoint",
10761076 type: "string",
10771077Details description: "Exporter endpoint for OTEL logs.",
10781078 },
10791079Override the default 10s startup timeout for an MCP server. {
10801080 key: "otel.exporter.<id>.protocol",
10811081Key type: "binary | json",
10821082 description: "Protocol used by the OTLP/HTTP exporter.",
10831083`mcp_servers.<id>.tool_timeout_sec` },
10841084 {
10851085Type / Values key: "otel.exporter.<id>.headers",
10861086 type: "map<string,string>",
10871087`number` description: "Static headers included with OTEL exporter requests.",
10881088 },
10891089Details {
10901090 key: "otel.trace_exporter.<id>.endpoint",
10911091Override the default 60s per-tool timeout for an MCP server. type: "string",
10921092 description: "Trace exporter endpoint for OTEL logs.",
10931093Key },
10941094 {
10951095`mcp_servers.<id>.url` key: "otel.trace_exporter.<id>.protocol",
10961096 type: "binary | json",
10971097Type / Values description: "Protocol used by the OTLP/HTTP trace exporter.",
10981098 },
10991099`string` {
11001100 key: "otel.trace_exporter.<id>.headers",
11011101Details type: "map<string,string>",
11021102 description: "Static headers included with OTEL trace exporter requests.",
11031103Endpoint for an MCP streamable HTTP server. },
11041104 {
11051105Key key: "otel.exporter.<id>.tls.ca-certificate",
11061106 type: "string",
11071107`model` description: "CA certificate path for OTEL exporter TLS.",
11081108 },
11091109Type / Values {
11101110 key: "otel.exporter.<id>.tls.client-certificate",
11111111`string` type: "string",
11121112 description: "Client certificate path for OTEL exporter TLS.",
11131113Details },
11141114 {
11151115Model to use (e.g., `gpt-5-codex`). key: "otel.exporter.<id>.tls.client-private-key",
11161116 type: "string",
11171117Key description: "Client private key path for OTEL exporter TLS.",
11181118 },
11191119`model_auto_compact_token_limit` {
11201120 key: "otel.trace_exporter.<id>.tls.ca-certificate",
11211121Type / Values type: "string",
11221122 description: "CA certificate path for OTEL trace exporter TLS.",
11231123`number` },
11241124 {
11251125Details key: "otel.trace_exporter.<id>.tls.client-certificate",
11261126 type: "string",
11271127Token threshold that triggers automatic history compaction (unset uses model defaults). description: "Client certificate path for OTEL trace exporter TLS.",
11281128 },
11291129Key {
11301130 key: "otel.trace_exporter.<id>.tls.client-private-key",
11311131`model_catalog_json` type: "string",
11321132 description: "Client private key path for OTEL trace exporter TLS.",
11331133Type / Values },
11341134 {
11351135`string (path)` key: "tui",
11361136 type: "table",
11371137Details description:
11381138 "TUI-specific options such as enabling inline desktop notifications.",
11391139Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile. },
11401140 {
11411141Key key: "tui.notifications",
11421142 type: "boolean | array<string>",
11431143`model_context_window` description:
11441144 "Enable TUI notifications; optionally restrict to specific event types.",
11451145Type / Values },
11461146 {
11471147`number` key: "tui.notification_method",
11481148 type: "auto | osc9 | bel",
11491149Details description:
11501150 "Notification method for terminal notifications (default: auto).",
11511151Context window tokens available to the active model. },
11521152 {
11531153Key key: "tui.notification_condition",
11541154 type: "unfocused | always",
11551155`model_instructions_file` description:
11561156 "Control whether TUI notifications fire only when the terminal is unfocused or regardless of focus. Defaults to `unfocused`.",
11571157Type / Values },
11581158 {
11591159`string (path)` key: "tui.animations",
11601160 type: "boolean",
11611161Details description:
11621162 "Enable terminal animations (welcome screen, shimmer, spinner) (default: true).",
11631163Replacement for built-in instructions instead of `AGENTS.md`. },
11641164 {
11651165Key key: "tui.alternate_screen",
11661166 type: "auto | always | never",
11671167`model_provider` description:
11681168 "Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).",
11691169Type / Values },
11701170 {
11711171`string` key: "tui.vim_mode_default",
11721172 type: "boolean",
11731173Details description:
11741174 "Start the composer in Vim normal mode instead of insert mode (default: false). You can still toggle it per session with `/vim`.",
11751175Provider id from `model_providers` (default: `openai`). },
11761176 {
11771177Key key: "tui.raw_output_mode",
11781178 type: "boolean",
11791179`model_providers.<id>.base_url` description:
11801180 "Start the TUI in raw scrollback mode for copy-friendly terminal selection (default: false). You can toggle it with `/raw` or the default `alt-r` key binding.",
11811181Type / Values },
11821182 {
11831183`string` key: "tui.show_tooltips",
11841184 type: "boolean",
11851185Details description:
11861186 "Show onboarding tooltips in the TUI welcome screen (default: true).",
11871187API base URL for the model provider. },
11881188 {
11891189Key key: "tui.status_line",
11901190 type: "array<string> | null",
11911191`model_providers.<id>.env_http_headers` description:
11921192 "Ordered list of TUI footer status-line item identifiers. `null` disables the status line.",
11931193Type / Values },
11941194 {
11951195`map<string,string>` key: "tui.terminal_title",
11961196 type: "array<string> | null",
11971197Details description:
11981198 'Ordered list of terminal window/tab title item identifiers. Defaults to `["spinner", "project"]`; `null` disables title updates.',
11991199HTTP headers populated from environment variables when present. },
12001200 {
12011201Key key: "tui.theme",
12021202 type: "string",
12031203`model_providers.<id>.env_key` description:
12041204 "Syntax-highlighting theme override (kebab-case theme name).",
12051205Type / Values },
12061206 {
12071207`string` key: "tui.keymap.<context>.<action>",
12081208 type: "string | array<string>",
12091209Details description:
12101210 "Keyboard shortcut binding for a TUI action. Supported contexts include `global`, `chat`, `composer`, `editor`, `pager`, `list`, and `approval`; context-specific bindings override `tui.keymap.global`.",
12111211Environment variable supplying the provider API key. },
12121212 {
12131213Key key: "tui.keymap.<context>.<action> = []",
12141214 type: "empty array",
12151215`model_providers.<id>.env_key_instructions` description:
12161216 "Unbind the action in that keymap context. Key names use normalized strings such as `ctrl-a`, `shift-enter`, `page-down`, or `minus`.",
12171217Type / Values },
12181218 {
12191219`string` key: "plugins.<plugin>.mcp_servers.<server>.enabled",
12201220 type: "boolean",
12211221Details description:
12221222 "Enable or disable an MCP server bundled by an installed plugin without changing the plugin manifest.",
12231223Optional setup guidance for the provider API key. },
12241224 {
12251225Key key: "plugins.<plugin>.mcp_servers.<server>.default_tools_approval_mode",
12261226 type: "auto | prompt | approve",
12271227`model_providers.<id>.experimental_bearer_token` description:
12281228 "Default approval behavior for tools on a plugin-provided MCP server.",
12291229Type / Values },
12301230 {
12311231`string` key: "plugins.<plugin>.mcp_servers.<server>.enabled_tools",
12321232 type: "array<string>",
12331233Details description:
12341234 "Allow list of tools exposed from a plugin-provided MCP server.",
12351235Direct bearer token for the provider (discouraged; use `env_key`). },
12361236 {
12371237Key key: "plugins.<plugin>.mcp_servers.<server>.disabled_tools",
12381238 type: "array<string>",
12391239`model_providers.<id>.http_headers` description:
12401240 "Deny list applied after `enabled_tools` for a plugin-provided MCP server.",
12411241Type / Values },
12421242 {
12431243`map<string,string>` key: "plugins.<plugin>.mcp_servers.<server>.tools.<tool>.approval_mode",
12441244 type: "auto | prompt | approve",
12451245Details description:
12461246 "Per-tool approval behavior override for a plugin-provided MCP tool.",
12471247Static HTTP headers added to provider requests. },
12481248 {
12491249Key key: "tui.model_availability_nux.<model>",
12501250 type: "integer",
12511251`model_providers.<id>.name` description: "Internal startup-tooltip state keyed by model slug.",
12521252 },
12531253Type / Values {
12541254 key: "hide_agent_reasoning",
12551255`string` type: "boolean",
12561256 description:
12571257Details "Suppress reasoning events in both the TUI and `codex exec` output.",
12581258 },
12591259Display name for a custom model provider. {
12601260 key: "show_raw_agent_reasoning",
12611261Key type: "boolean",
12621262 description:
12631263`model_providers.<id>.query_params` "Surface raw reasoning content when the active model emits it.",
12641264 },
12651265Type / Values {
12661266 key: "disable_paste_burst",
12671267`map<string,string>` type: "boolean",
12681268 description: "Disable burst-paste detection in the TUI.",
12691269Details },
12701270 {
12711271Extra query parameters appended to provider requests. key: "windows_wsl_setup_acknowledged",
12721272 type: "boolean",
12731273Key description: "Track Windows onboarding acknowledgement (Windows only).",
12741274 },
12751275`model_providers.<id>.request_max_retries` {
12761276 key: "chatgpt_base_url",
12771277Type / Values type: "string",
12781278 description: "Override the base URL used during the ChatGPT login flow.",
12791279`number` },
12801280 {
12811281Details key: "cli_auth_credentials_store",
12821282 type: "file | keyring | auto",
12831283Retry count for HTTP requests to the provider (default: 4). description:
12841284 "Control where the CLI stores cached credentials (file-based auth.json vs OS keychain).",
12851285Key },
12861286 {
12871287`model_providers.<id>.requires_openai_auth` key: "mcp_oauth_credentials_store",
12881288 type: "auto | file | keyring",
12891289Type / Values description: "Preferred store for MCP OAuth credentials.",
12901290 },
12911291`boolean` {
12921292 key: "mcp_oauth_callback_port",
12931293Details type: "integer",
12941294 description:
12951295The provider uses OpenAI authentication (defaults to false). "Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS.",
12961296 },
12971297Key {
12981298 key: "mcp_oauth_callback_url",
12991299`model_providers.<id>.stream_idle_timeout_ms` type: "string",
13001300 description:
13011301Type / Values "Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port.",
13021302 },
13031303`number` {
13041304 key: "experimental_use_unified_exec_tool",
13051305Details type: "boolean",
13061306 description:
13071307Idle timeout for SSE streams in milliseconds (default: 300000). "Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`.",
13081308 },
13091309Key {
13101310 key: "tools.web_search",
13111311`model_providers.<id>.stream_max_retries` type: 'boolean | { context_size = "low|medium|high", allowed_domains = [string], location = { country, region, city, timezone } }',
13121312 description:
13131313Type / Values "Optional web search tool configuration. The legacy boolean form is still accepted, but the object form lets you set search context size, allowed domains, and approximate user location.",
13141314 },
13151315`number` {
13161316 key: "tools.view_image",
13171317Details type: "boolean",
13181318 description: "Enable the local-image attachment tool `view_image`.",
13191319Retry count for SSE streaming interruptions (default: 5). },
13201320 {
13211321Key key: "web_search",
13221322 type: "disabled | cached | live",
13231323`model_providers.<id>.wire_api` description:
13241324 'Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.',
13251325Type / Values },
13261326 {
13271327`chat | responses` key: "default_permissions",
13281328 type: "string",
13291329Details description:
13301330 "Name of the default permissions profile to apply to sandboxed tool calls. Built-ins are `:read-only`, `:workspace`, and `:danger-no-sandbox`; custom profile names require matching `[permissions.<name>]` tables.",
13311331Protocol used by the provider (defaults to `chat` if omitted). },
13321332 {
13331333Key key: "permissions.<name>.filesystem",
13341334 type: "table",
13351335`model_reasoning_effort` description:
13361336 "Named filesystem permission profile. Each key is an absolute path or special token such as `:minimal` or `:project_roots`.",
13371337Type / Values },
13381338 {
13391339`minimal | low | medium | high | xhigh` key: "permissions.<name>.filesystem.glob_scan_max_depth",
13401340 type: "number",
13411341Details description:
13421342 "Maximum depth for expanding deny-read glob patterns on platforms that snapshot matches before sandbox startup. Must be at least `1` when set.",
13431343Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). },
13441344 {
13451345Key key: "permissions.<name>.filesystem.<path-or-glob>",
13461346 type: '"read" | "write" | "none" | table',
13471347`model_reasoning_summary` description:
13481348 'Grant direct access for a path, glob pattern, or special token, or scope nested entries under that root. Use `"none"` to deny reads for matching paths.',
13491349Type / Values },
13501350 {
13511351`auto | concise | detailed | none` key: 'permissions.<name>.filesystem.":project_roots".<subpath-or-glob>',
13521352 type: '"read" | "write" | "none"',
13531353Details description:
13541354 'Scoped filesystem access relative to the detected project roots. Use `"."` for the root itself; glob subpaths such as `"**/*.env"` can deny reads with `"none"`.',
13551355Select reasoning summary detail or disable summaries entirely. },
13561356 {
13571357Key key: "permissions.<name>.network.enabled",
13581358 type: "boolean",
13591359`model_supports_reasoning_summaries` description: "Enable network access for this named permissions profile.",
13601360 },
13611361Type / Values {
13621362 key: "permissions.<name>.network.proxy_url",
13631363`boolean` type: "string",
13641364 description:
13651365Details "HTTP listener URL used when this permissions profile enables sandboxed networking.",
13661366 },
13671367Force Codex to send or not send reasoning metadata. {
13681368 key: "permissions.<name>.network.enable_socks5",
13691369Key type: "boolean",
13701370 description:
13711371`model_verbosity` "Expose SOCKS5 support when this permissions profile enables sandboxed networking.",
13721372 },
13731373Type / Values {
13741374 key: "permissions.<name>.network.socks_url",
13751375`low | medium | high` type: "string",
13761376 description: "SOCKS5 proxy endpoint used by this permissions profile.",
13771377Details },
13781378 {
13791379Control GPT-5 Responses API verbosity (defaults to `medium`). key: "permissions.<name>.network.enable_socks5_udp",
13801380 type: "boolean",
13811381Key description: "Allow UDP over the SOCKS5 listener when enabled.",
13821382 },
13831383`notice.hide_full_access_warning` {
13841384 key: "permissions.<name>.network.allow_upstream_proxy",
13851385Type / Values type: "boolean",
13861386 description:
13871387`boolean` "Allow sandboxed networking to chain through another upstream proxy.",
13881388 },
13891389Details {
13901390 key: "permissions.<name>.network.dangerously_allow_non_loopback_proxy",
13911391Track acknowledgement of the full access warning prompt. type: "boolean",
13921392 description:
13931393Key "Permit non-loopback bind addresses for sandboxed networking listeners. Enabling it can expose listeners beyond localhost.",
13941394 },
13951395`notice.hide_gpt-5.1-codex-max_migration_prompt` {
13961396 key: "permissions.<name>.network.dangerously_allow_all_unix_sockets",
13971397Type / Values type: "boolean",
13981398 description:
13991399`boolean` "Allow arbitrary Unix socket destinations instead of the default restricted set. Use only in tightly controlled environments.",
14001400 },
14011401Details {
14021402 key: "permissions.<name>.network.domains",
14031403Track acknowledgement of the gpt-5.1-codex-max migration prompt. type: "map<string, allow | deny>",
14041404 description:
14051405Key "Domain rules for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules. `deny` wins on conflicts.",
14061406 },
14071407`notice.hide_gpt5_1_migration_prompt` {
14081408 key: "permissions.<name>.network.unix_sockets",
14091409Type / Values type: "map<string, allow | none>",
14101410 description:
14111411`boolean` "Unix socket rules for sandboxed networking. Use socket paths as keys, with `allow` or `none` values.",
14121412 },
14131413Details {
14141414 key: "permissions.<name>.network.allow_local_binding",
14151415Track acknowledgement of the GPT-5.1 migration prompt. type: "boolean",
14161416 description:
14171417Key "Permit broader local/private-network access through sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",
14181418 },
14191419`notice.hide_rate_limit_model_nudge` {
14201420 key: "projects.<path>.trust_level",
14211421Type / Values type: "string",
14221422 description:
14231423`boolean` 'Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers, including project-local config, hooks, and rules.',
14241424 },
14251425Details {
14261426 key: "notice.hide_full_access_warning",
14271427Track opt-out of the rate limit model switch reminder. type: "boolean",
14281428 description: "Track acknowledgement of the full access warning prompt.",
14291429Key },
14301430 {
14311431`notice.hide_world_writable_warning` key: "notice.hide_world_writable_warning",
14321432 type: "boolean",
14331433Type / Values description:
14341434 "Track acknowledgement of the Windows world-writable directories warning.",
14351435`boolean` },
14361436 {
14371437Details key: "notice.hide_rate_limit_model_nudge",
14381438 type: "boolean",
14391439Track acknowledgement of the Windows world-writable directories warning. description: "Track opt-out of the rate limit model switch reminder.",
14401440 },
14411441Key {
14421442 key: "notice.hide_gpt5_1_migration_prompt",
14431443`notice.model_migrations` type: "boolean",
14441444 description: "Track acknowledgement of the GPT-5.1 migration prompt.",
14451445Type / Values },
14461446 {
14471447`map<string,string>` key: "notice.hide_gpt-5.1-codex-max_migration_prompt",
14481448 type: "boolean",
14491449Details description:
14501450 "Track acknowledgement of the gpt-5.1-codex-max migration prompt.",
14511451Track acknowledged model migrations as old->new mappings. },
14521452 {
14531453Key key: "notice.model_migrations",
14541454 type: "map<string,string>",
14551455`notify` description: "Track acknowledged model migrations as old->new mappings.",
14561456 },
14571457Type / Values {
14581458 key: "forced_login_method",
14591459`array<string>` type: "chatgpt | api",
14601460 description: "Restrict Codex to a specific authentication method.",
14611461Details },
14621462 {
14631463Command invoked for notifications; receives a JSON payload from Codex. key: "forced_chatgpt_workspace_id",
14641464 type: "string (uuid)",
14651465Key description: "Limit ChatGPT logins to a specific workspace identifier.",
14661466 },
14671467`oss_provider` ]}
14681468 client:load
14691469Type / Values/>
1470
1471`lmstudio | ollama`
1472
1473Details
1474
1475Default local provider used when running with `--oss` (defaults to prompting if unset).
1476
1477Key
1478
1479`otel.environment`
1480
1481Type / Values
1482
1483`string`
1484
1485Details
1486
1487Environment tag applied to emitted OpenTelemetry events (default: `dev`).
1488
1489Key
1490
1491`otel.exporter`
1492
1493Type / Values
1494
1495`none | otlp-http | otlp-grpc`
1496
1497Details
1498
1499Select the OpenTelemetry exporter and provide any endpoint metadata.
1500
1501Key
1502
1503`otel.exporter.<id>.endpoint`
1504
1505Type / Values
1506
1507`string`
1508
1509Details
1510
1511Exporter endpoint for OTEL logs.
1512
1513Key
1514
1515`otel.exporter.<id>.headers`
1516
1517Type / Values
1518
1519`map<string,string>`
1520
1521Details
1522
1523Static headers included with OTEL exporter requests.
1524
1525Key
1526
1527`otel.exporter.<id>.protocol`
1528
1529Type / Values
1530
1531`binary | json`
1532
1533Details
1534
1535Protocol used by the OTLP/HTTP exporter.
1536
1537Key
1538
1539`otel.exporter.<id>.tls.ca-certificate`
1540
1541Type / Values
1542
1543`string`
1544
1545Details
1546
1547CA certificate path for OTEL exporter TLS.
1548
1549Key
1550
1551`otel.exporter.<id>.tls.client-certificate`
1552
1553Type / Values
1554
1555`string`
1556
1557Details
1558
1559Client certificate path for OTEL exporter TLS.
1560
1561Key
1562
1563`otel.exporter.<id>.tls.client-private-key`
1564
1565Type / Values
1566
1567`string`
1568
1569Details
1570
1571Client private key path for OTEL exporter TLS.
1572
1573Key
1574
1575`otel.log_user_prompt`
1576
1577Type / Values
1578
1579`boolean`
1580
1581Details
1582
1583Opt in to exporting raw user prompts with OpenTelemetry logs.
1584
1585Key
1586
1587`otel.trace_exporter`
1588
1589Type / Values
1590
1591`none | otlp-http | otlp-grpc`
1592
1593Details
1594
1595Select the OpenTelemetry trace exporter and provide any endpoint metadata.
1596
1597Key
1598
1599`otel.trace_exporter.<id>.endpoint`
1600
1601Type / Values
1602
1603`string`
1604
1605Details
1606
1607Trace exporter endpoint for OTEL logs.
1608
1609Key
1610
1611`otel.trace_exporter.<id>.headers`
1612
1613Type / Values
1614
1615`map<string,string>`
1616
1617Details
1618
1619Static headers included with OTEL trace exporter requests.
1620
1621Key
1622
1623`otel.trace_exporter.<id>.protocol`
1624
1625Type / Values
1626
1627`binary | json`
1628
1629Details
1630
1631Protocol used by the OTLP/HTTP trace exporter.
1632
1633Key
1634
1635`otel.trace_exporter.<id>.tls.ca-certificate`
1636
1637Type / Values
1638
1639`string`
1640
1641Details
1642
1643CA certificate path for OTEL trace exporter TLS.
1644
1645Key
1646
1647`otel.trace_exporter.<id>.tls.client-certificate`
1648
1649Type / Values
1650
1651`string`
1652
1653Details
1654
1655Client certificate path for OTEL trace exporter TLS.
1656
1657Key
1658
1659`otel.trace_exporter.<id>.tls.client-private-key`
1660
1661Type / Values
1662
1663`string`
1664
1665Details
1666
1667Client private key path for OTEL trace exporter TLS.
1668
1669Key
1670
1671`personality`
1672
1673Type / Values
1674
1675`none | friendly | pragmatic`
1676
1677Details
1678
1679Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.
1680
1681Key
1682
1683`profile`
1684
1685Type / Values
1686
1687`string`
1688
1689Details
1690
1691Default profile applied at startup (equivalent to `--profile`).
1692
1693Key
1694
1695`profiles.<name>.*`
1696
1697Type / Values
1698
1699`various`
1700
1701Details
1702
1703Profile-scoped overrides for any of the supported configuration keys.
1704
1705Key
1706
1707`profiles.<name>.experimental_use_freeform_apply_patch`
1708
1709Type / Values
1710
1711`boolean`
1712
1713Details
1714
1715Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.
1716
1717Key
1718
1719`profiles.<name>.experimental_use_unified_exec_tool`
1720
1721Type / Values
1722
1723`boolean`
1724
1725Details
1726
1727Legacy name for enabling unified exec; prefer `[features].unified_exec`.
1728
1729Key
1730
1731`profiles.<name>.include_apply_patch_tool`
1732
1733Type / Values
1734
1735`boolean`
1736
1737Details
1738
1739Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.
1740
1741Key
1742
1743`profiles.<name>.model_catalog_json`
1744
1745Type / Values
1746
1747`string (path)`
1748
1749Details
1750
1751Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).
1752
1753Key
1754
1755`profiles.<name>.oss_provider`
1756
1757Type / Values
1758
1759`lmstudio | ollama`
1760
1761Details
1762
1763Profile-scoped OSS provider for `--oss` sessions.
1764
1765Key
1766
1767`profiles.<name>.personality`
1768
1769Type / Values
1770
1771`none | friendly | pragmatic`
1772
1773Details
1774
1775Profile-scoped communication style override for supported models.
1776
1777Key
1778
1779`profiles.<name>.web_search`
1780
1781Type / Values
1782
1783`disabled | cached | live`
1784
1785Details
1786
1787Profile-scoped web search mode override (default: `"cached"`).
1788
1789Key
1790
1791`project_doc_fallback_filenames`
1792
1793Type / Values
1794
1795`array<string>`
1796
1797Details
1798
1799Additional filenames to try when `AGENTS.md` is missing.
1800
1801Key
1802
1803`project_doc_max_bytes`
1804
1805Type / Values
1806
1807`number`
1808
1809Details
1810
1811Maximum bytes read from `AGENTS.md` when building project instructions.
1812
1813Key
1814
1815`project_root_markers`
1816
1817Type / Values
1818
1819`array<string>`
1820
1821Details
1822
1823List of project root marker filenames; used when searching parent directories for the project root.
1824
1825Key
1826
1827`projects.<path>.trust_level`
1828
1829Type / Values
1830
1831`string`
1832
1833Details
1834
1835Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers.
1836
1837Key
1838
1839`review_model`
1840
1841Type / Values
1842
1843`string`
1844
1845Details
1846
1847Optional model override used by `/review` (defaults to the current session model).
1848
1849Key
1850
1851`sandbox_mode`
1852
1853Type / Values
1854
1855`read-only | workspace-write | danger-full-access`
1856
1857Details
1858
1859Sandbox policy for filesystem and network access during command execution.
1860
1861Key
1862
1863`sandbox_workspace_write.exclude_slash_tmp`
1864
1865Type / Values
1866
1867`boolean`
1868
1869Details
1870
1871Exclude `/tmp` from writable roots in workspace-write mode.
1872
1873Key
1874
1875`sandbox_workspace_write.exclude_tmpdir_env_var`
1876
1877Type / Values
1878
1879`boolean`
1880
1881Details
1882
1883Exclude `$TMPDIR` from writable roots in workspace-write mode.
1884
1885Key
1886
1887`sandbox_workspace_write.network_access`
1888
1889Type / Values
1890
1891`boolean`
1892
1893Details
1894
1895Allow outbound network access inside the workspace-write sandbox.
1896
1897Key
1898
1899`sandbox_workspace_write.writable_roots`
1900
1901Type / Values
1902
1903`array<string>`
1904
1905Details
1906
1907Additional writable roots when `sandbox_mode = "workspace-write"`.
1908
1909Key
1910
1911`shell_environment_policy.exclude`
1912
1913Type / Values
1914
1915`array<string>`
1916
1917Details
1918
1919Glob patterns for removing environment variables after the defaults.
1920
1921Key
1922
1923`shell_environment_policy.experimental_use_profile`
1924
1925Type / Values
1926
1927`boolean`
1928
1929Details
1930
1931Use the user shell profile when spawning subprocesses.
1932
1933Key
1934
1935`shell_environment_policy.ignore_default_excludes`
1936
1937Type / Values
1938
1939`boolean`
1940
1941Details
1942
1943Keep variables containing KEY/SECRET/TOKEN before other filters run.
1944
1945Key
1946
1947`shell_environment_policy.include_only`
1948
1949Type / Values
1950
1951`array<string>`
1952
1953Details
1954
1955Whitelist of patterns; when set only matching variables are kept.
1956
1957Key
1958
1959`shell_environment_policy.inherit`
1960
1961Type / Values
1962
1963`all | core | none`
1964
1965Details
1966
1967Baseline environment inheritance when spawning subprocesses.
1968
1969Key
1970
1971`shell_environment_policy.set`
1972
1973Type / Values
1974
1975`map<string,string>`
1976
1977Details
1978
1979Explicit environment overrides injected into every subprocess.
1980
1981Key
1982
1983`show_raw_agent_reasoning`
1984
1985Type / Values
1986
1987`boolean`
1988
1989Details
1990
1991Surface raw reasoning content when the active model emits it.
1992
1993Key
1994
1995`skills.config`
1996
1997Type / Values
1998
1999`array<object>`
2000
2001Details
2002
2003Per-skill enablement overrides stored in config.toml.
2004
2005Key
2006
2007`skills.config.<index>.enabled`
2008
2009Type / Values
2010
2011`boolean`
2012
2013Details
2014
2015Enable or disable the referenced skill.
2016
2017Key
2018
2019`skills.config.<index>.path`
2020
2021Type / Values
2022
2023`string (path)`
2024
2025Details
2026
2027Path to a skill folder containing `SKILL.md`.
2028
2029Key
2030
2031`suppress_unstable_features_warning`
2032
2033Type / Values
2034
2035`boolean`
2036
2037Details
2038
2039Suppress the warning that appears when under-development feature flags are enabled.
2040
2041Key
2042
2043`tool_output_token_limit`
2044
2045Type / Values
2046
2047`number`
2048
2049Details
2050
2051Token budget for storing individual tool/function outputs in history.
2052
2053Key
2054
2055`tools.web_search`
2056
2057Type / Values
2058
2059`boolean`
2060
2061Details
2062
2063Deprecated legacy toggle for web search; prefer the top-level `web_search` setting.
2064
2065Key
2066
2067`tui`
2068
2069Type / Values
2070
2071`table`
2072
2073Details
2074
2075TUI-specific options such as enabling inline desktop notifications.
2076
2077Key
2078
2079`tui.alternate_screen`
2080
2081Type / Values
2082
2083`auto | always | never`
2084
2085Details
2086
2087Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).
2088
2089Key
2090
2091`tui.animations`
2092
2093Type / Values
2094
2095`boolean`
2096
2097Details
2098
2099Enable terminal animations (welcome screen, shimmer, spinner) (default: true).
2100
2101Key
2102
2103`tui.notification_method`
2104
2105Type / Values
2106
2107`auto | osc9 | bel`
2108
2109Details
2110
2111Notification method for unfocused terminal notifications (default: auto).
2112
2113Key
2114
2115`tui.notifications`
2116
2117Type / Values
2118
2119`boolean | array<string>`
2120
2121Details
2122
2123Enable TUI notifications; optionally restrict to specific event types.
2124
2125Key
2126
2127`tui.show_tooltips`
2128
2129Type / Values
2130
2131`boolean`
2132
2133Details
2134
2135Show onboarding tooltips in the TUI welcome screen (default: true).
2136
2137Key
2138
2139`tui.status_line`
2140
2141Type / Values
2142
2143`array<string> | null`
2144
2145Details
2146
2147Ordered list of TUI footer status-line item identifiers. `null` disables the status line.
2148
2149Key
2150
2151`web_search`
2152
2153Type / Values
2154
2155`disabled | cached | live`
2156
2157Details
2158
2159Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.
2160
2161Key
2162
2163`windows_wsl_setup_acknowledged`
2164
2165Type / Values
2166
2167`boolean`
2168
2169Details
2170
2171Track Windows onboarding acknowledgement (Windows only).
2172
2173Key
2174
2175`windows.sandbox`
2176
2177Type / Values
2178
2179`unelevated | elevated`
2180
2181Details
2182
2183Windows-only native sandbox mode when running Codex natively on Windows.
2184
2185Expand to view all
2186 1470
2187You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).1471You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).
2188 1472
2201For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched1485For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched
2202requirements. See the security page for precedence details.1486requirements. See the security page for precedence details.
2203 1487
22041488| Key | Type / Values | Details |Use `[features]` in `requirements.toml` to pin feature flags by the same
22051489| --- | --- | --- |canonical keys that `config.toml` uses. Omitted keys remain unconstrained.
22061490| `allowed_approval_policies` | `array<string>` | Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `reject`). |
22071491| `allowed_sandbox_modes` | `array<string>` | Allowed values for `sandbox_mode`. |<ConfigTable
22081492| `allowed_web_search_modes` | `array<string>` | Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. | options={[
22091493| `mcp_servers` | `table` | Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. | {
22101494| `mcp_servers.<id>.identity` | `table` | Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). | key: "allowed_approval_policies",
22111495| `mcp_servers.<id>.identity.command` | `string` | Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. | type: "array<string>",
22121496| `mcp_servers.<id>.identity.url` | `string` | Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. | description:
22131497| `rules` | `table` | Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. | "Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `granular`).",
22141498| `rules.prefix_rules` | `array<table>` | List of enforced prefix rules. Each rule must include `pattern` and `decision`. | },
22151499| `rules.prefix_rules[].decision` | `prompt | forbidden` | Required. Requirements rules can only prompt or forbid (not allow). | {
22161500| `rules.prefix_rules[].justification` | `string` | Optional non-empty rationale surfaced in approval prompts or rejection messages. | key: "allowed_approvals_reviewers",
22171501| `rules.prefix_rules[].pattern` | `array<table>` | Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. | type: "array<string>",
22181502| `rules.prefix_rules[].pattern[].any_of` | `array<string>` | A list of allowed alternative tokens at this position. | description:
22191503| `rules.prefix_rules[].pattern[].token` | `string` | A single literal token at this position. | "Allowed values for `approvals_reviewer`, such as `user` and `auto_review`.",
22201504 },
22211505Key {
22221506 key: "guardian_policy_config",
22231507`allowed_approval_policies` type: "string",
22241508 description:
22251509Type / Values "Managed Markdown policy instructions for automatic review. This takes precedence over local `[auto_review].policy`. Blank values are ignored.",
22261510 },
22271511`array<string>` {
22281512 key: "allowed_sandbox_modes",
22291513Details type: "array<string>",
22301514 description: "Allowed values for `sandbox_mode`.",
22311515Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `reject`). },
22321516 {
22331517Key key: "remote_sandbox_config",
22341518 type: "array<table>",
22351519`allowed_sandbox_modes` description:
22361520 "Host-specific sandbox requirements. The first entry whose `hostname_patterns` match the resolved host name overrides top-level `allowed_sandbox_modes` for that requirements source. Host-specific entries currently override sandbox modes only.",
22371521Type / Values },
22381522 {
22391523`array<string>` key: "remote_sandbox_config[].hostname_patterns",
22401524 type: "array<string>",
22411525Details description:
22421526 "Case-insensitive host name patterns. Supports `*` for any sequence of characters and `?` for one character.",
22431527Allowed values for `sandbox_mode`. },
22441528 {
22451529Key key: "remote_sandbox_config[].allowed_sandbox_modes",
22461530 type: "array<string>",
22471531`allowed_web_search_modes` description:
22481532 "Allowed sandbox modes to apply when this host-specific entry matches.",
22491533Type / Values },
22501534 {
22511535`array<string>` key: "allowed_web_search_modes",
22521536 type: "array<string>",
22531537Details description:
22541538 "Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`.",
22551539Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. },
22561540 {
22571541Key key: "features",
22581542 type: "table",
22591543`mcp_servers` description:
22601544 "Pinned feature values keyed by the canonical names from `config.toml`'s `[features]` table.",
22611545Type / Values },
22621546 {
22631547`table` key: "features.<name>",
22641548 type: "boolean",
22651549Details description:
22661550 "Require a specific canonical feature key to stay enabled or disabled.",
22671551Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. },
22681552 {
22691553Key key: "features.in_app_browser",
22701554 type: "boolean",
22711555`mcp_servers.<id>.identity` description:
22721556 "Set to `false` in `requirements.toml` to disable the in-app browser pane.",
22731557Type / Values },
22741558 {
22751559`table` key: "features.browser_use",
22761560 type: "boolean",
22771561Details description:
22781562 "Set to `false` in `requirements.toml` to disable Browser Use and Browser Agent availability.",
22791563Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). },
22801564 {
22811565Key key: "features.computer_use",
22821566 type: "boolean",
22831567`mcp_servers.<id>.identity.command` description:
22841568 "Set to `false` in `requirements.toml` to disable Computer Use availability and related install or enablement flows.",
22851569Type / Values },
22861570 {
22871571`string` key: "experimental_network",
22881572 type: "table",
22891573Details description:
22901574 "Network access requirements enforced from `requirements.toml`. These constraints are separate from `features.network_proxy` and can configure sandboxed networking without the user feature flag.",
22911575Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. },
22921576 {
22931577Key key: "experimental_network.enabled",
22941578 type: "boolean",
22951579`mcp_servers.<id>.identity.url` description:
22961580 "Enable sandboxed networking requirements. This does not grant network access when the active sandbox keeps command networking off.",
22971581Type / Values },
22981582 {
22991583`string` key: "experimental_network.http_port",
23001584 type: "integer",
23011585Details description:
23021586 "Loopback HTTP listener port to use for `[experimental_network]` requirements.",
23031587Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. },
23041588 {
23051589Key key: "experimental_network.socks_port",
23061590 type: "integer",
23071591`rules` description:
23081592 "Loopback SOCKS5 listener port to use for `[experimental_network]` requirements.",
23091593Type / Values },
23101594 {
23111595`table` key: "experimental_network.allow_upstream_proxy",
23121596 type: "boolean",
23131597Details description:
23141598 "Allow sandboxed networking to chain through an upstream proxy from the environment.",
23151599Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. },
23161600 {
23171601Key key: "experimental_network.dangerously_allow_non_loopback_proxy",
23181602 type: "boolean",
23191603`rules.prefix_rules` description:
23201604 "Permit non-loopback listener addresses for `[experimental_network]` requirements. Enabling it can expose listeners beyond localhost.",
23211605Type / Values },
23221606 {
23231607`array<table>` key: "experimental_network.dangerously_allow_all_unix_sockets",
23241608 type: "boolean",
23251609Details description:
23261610 "Permit arbitrary Unix socket destinations instead of allowlist-only access. Use only in tightly controlled environments.",
23271611List of enforced prefix rules. Each rule must include `pattern` and `decision`. },
23281612 {
23291613Key key: "experimental_network.domains",
23301614 type: "map<string, allow | deny>",
23311615`rules.prefix_rules[].decision` description:
23321616 "Map-shaped administrator domain policy for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. `deny` wins on conflicts. Do not combine this with `experimental_network.allowed_domains` or `experimental_network.denied_domains`.",
23331617Type / Values },
23341618 {
23351619`prompt | forbidden` key: "experimental_network.allowed_domains",
23361620 type: "array<string>",
23371621Details description:
23381622 "List-shaped administrator allow rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",
23391623Required. Requirements rules can only prompt or forbid (not allow). },
23401624 {
23411625Key key: "experimental_network.denied_domains",
23421626 type: "array<string>",
23431627`rules.prefix_rules[].justification` description:
23441628 "List-shaped administrator deny rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",
23451629Type / Values },
23461630 {
23471631`string` key: "experimental_network.managed_allowed_domains_only",
23481632 type: "boolean",
23491633Details description:
23501634 "When `true`, only administrator-managed allow rules remain effective while sandboxed networking requirements are active; user allowlist additions are ignored. Without managed allow rules, user-added domain allow rules do not remain effective.",
23511635Optional non-empty rationale surfaced in approval prompts or rejection messages. },
23521636 {
23531637Key key: "experimental_network.unix_sockets",
23541638 type: "map<string, allow | none>",
23551639`rules.prefix_rules[].pattern` description:
23561640 "Administrator-managed Unix socket policy for sandboxed networking.",
23571641Type / Values },
23581642 {
23591643`array<table>` key: "experimental_network.allow_local_binding",
23601644 type: "boolean",
23611645Details description:
23621646 "Permit broader local/private-network access for sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",
23631647Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. },
23641648 {
23651649Key key: "hooks",
23661650 type: "table",
23671651`rules.prefix_rules[].pattern[].any_of` description:
23681652 "Admin-enforced managed lifecycle hooks. Requires a managed hook directory and uses the same event schema as inline `[hooks]` in `config.toml`.",
23691653Type / Values },
23701654 {
23711655`array<string>` key: "hooks.managed_dir",
23721656 type: "string (absolute path)",
23731657Details description:
23741658 "Directory containing managed hook scripts on macOS and Linux. Codex validates that it is absolute and exists before loading managed hooks.",
23751659A list of allowed alternative tokens at this position. },
23761660 {
23771661Key key: "hooks.windows_managed_dir",
23781662 type: "string (absolute path)",
23791663`rules.prefix_rules[].pattern[].token` description:
23801664 "Directory containing managed hook scripts on Windows. Codex validates that it is absolute and exists before loading managed hooks.",
23811665Type / Values },
23821666 {
23831667`string` key: "hooks.<Event>",
23841668 type: "array<table>",
23851669Details description:
23861670 "Matcher groups for a hook event such as `PreToolUse`, `PermissionRequest`, `PostToolUse`, `SessionStart`, `UserPromptSubmit`, or `Stop`.",
23871671A single literal token at this position. },
23881672 {
23891673Expand to view all key: "hooks.<Event>[].hooks",
1674 type: "array<table>",
1675 description:
1676 "Hook handlers for a matcher group. Command hooks are currently supported; prompt and agent hook handlers are parsed but skipped.",
1677 },
1678 {
1679 key: "permissions.filesystem.deny_read",
1680 type: "array<string>",
1681 description:
1682 "Admin-enforced filesystem read denials. Entries can be paths or glob patterns, and users cannot weaken them with local config.",
1683 },
1684 {
1685 key: "mcp_servers",
1686 type: "table",
1687 description:
1688 "Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled.",
1689 },
1690 {
1691 key: "mcp_servers.<id>.identity",
1692 type: "table",
1693 description:
1694 "Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP).",
1695 },
1696 {
1697 key: "mcp_servers.<id>.identity.command",
1698 type: "string",
1699 description:
1700 "Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command.",
1701 },
1702 {
1703 key: "mcp_servers.<id>.identity.url",
1704 type: "string",
1705 description:
1706 "Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL.",
1707 },
1708 {
1709 key: "rules",
1710 type: "table",
1711 description:
1712 "Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive.",
1713 },
1714 {
1715 key: "rules.prefix_rules",
1716 type: "array<table>",
1717 description:
1718 "List of enforced prefix rules. Each rule must include `pattern` and `decision`.",
1719 },
1720 {
1721 key: "rules.prefix_rules[].pattern",
1722 type: "array<table>",
1723 description:
1724 "Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`.",
1725 },
1726 {
1727 key: "rules.prefix_rules[].pattern[].token",
1728 type: "string",
1729 description: "A single literal token at this position.",
1730 },
1731 {
1732 key: "rules.prefix_rules[].pattern[].any_of",
1733 type: "array<string>",
1734 description: "A list of allowed alternative tokens at this position.",
1735 },
1736 {
1737 key: "rules.prefix_rules[].decision",
1738 type: "prompt | forbidden",
1739 description:
1740 "Required. Requirements rules can only prompt or forbid (not allow).",
1741 },
1742 {
1743 key: "rules.prefix_rules[].justification",
1744 type: "string",
1745 description:
1746 "Optional non-empty rationale surfaced in approval prompts or rejection messages.",
1747 },
1748 ]}
1749 client:load
1750/>