config-reference.md +1724 −2389
6 6
7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.7User-level configuration lives in `~/.codex/config.toml`. You can also add project-scoped overrides in `.codex/config.toml` files. Codex loads project-scoped config files only when you trust the project.
8 8
99For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/security#network-access).Project-scoped config can't override machine-local provider, auth,
1010 notification, profile, or telemetry routing keys. Codex ignores
1111| Key | Type / Values | Details |`openai_base_url`, `chatgpt_base_url`, `model_provider`, `model_providers`,
1212| --- | --- | --- |`notify`, `profile`, `profiles`, `experimental_realtime_ws_base_url`, and
1313| `agents.<name>.config_file` | `string (path)` | Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. |`otel` when they appear in a project-local `.codex/config.toml`; put those in
1414| `agents.<name>.description` | `string` | Role guidance shown to Codex when choosing and spawning that agent type. |user-level config instead.
1515| `agents.job_max_runtime_seconds` | `number` | Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker. |
1616| `agents.max_depth` | `number` | Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1). |For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/agent-approvals-security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/agent-approvals-security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/agent-approvals-security#network-access).
1717| `agents.max_threads` | `number` | Maximum number of agent threads that can be open concurrently. |
1818| `allow_login_shell` | `boolean` | Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells. |<ConfigTable
1919| `approval_policy` | `untrusted | on-request | never | { reject = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool } }` | Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { reject = { ... } }` to auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. | options={[
2020| `approval_policy.reject.mcp_elicitations` | `boolean` | When `true`, MCP elicitation prompts are auto-rejected instead of shown to the user. | {
2121| `approval_policy.reject.rules` | `boolean` | When `true`, approvals triggered by execpolicy `prompt` rules are auto-rejected. | key: "model",
2222| `approval_policy.reject.sandbox_approval` | `boolean` | When `true`, sandbox escalation approval prompts are auto-rejected. | type: "string",
2323| `apps._default.destructive_enabled` | `boolean` | Default allow/deny for app tools with `destructive_hint = true`. | description: "Model to use (e.g., `gpt-5.5`).",
2424| `apps._default.enabled` | `boolean` | Default app enabled state for all apps unless overridden per app. | },
2525| `apps._default.open_world_enabled` | `boolean` | Default allow/deny for app tools with `open_world_hint = true`. | {
2626| `apps.<id>.default_tools_approval_mode` | `auto | prompt | approve` | Default approval behavior for tools in this app unless a per-tool override exists. | key: "review_model",
2727| `apps.<id>.default_tools_enabled` | `boolean` | Default enabled state for tools in this app unless a per-tool override exists. | type: "string",
2828| `apps.<id>.destructive_enabled` | `boolean` | Allow or block tools in this app that advertise `destructive_hint = true`. | description:
2929| `apps.<id>.enabled` | `boolean` | Enable or disable a specific app/connector by id (default: true). | "Optional model override used by `/review` (defaults to the current session model).",
3030| `apps.<id>.open_world_enabled` | `boolean` | Allow or block tools in this app that advertise `open_world_hint = true`. | },
3131| `apps.<id>.tools.<tool>.approval_mode` | `auto | prompt | approve` | Per-tool approval behavior override for a single app tool. | {
3232| `apps.<id>.tools.<tool>.enabled` | `boolean` | Per-tool enabled override for an app tool (for example `repos/list`). | key: "model_provider",
3333| `background_terminal_max_timeout` | `number` | Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key. | type: "string",
3434| `chatgpt_base_url` | `string` | Override the base URL used during the ChatGPT login flow. | description: "Provider id from `model_providers` (default: `openai`).",
3535| `check_for_update_on_startup` | `boolean` | Check for Codex updates on startup (set to false only when updates are centrally managed). | },
3636| `cli_auth_credentials_store` | `file | keyring | auto` | Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). | {
3737| `compact_prompt` | `string` | Inline override for the history compaction prompt. | key: "openai_base_url",
3838| `developer_instructions` | `string` | Additional developer instructions injected into the session (optional). | type: "string",
3939| `disable_paste_burst` | `boolean` | Disable burst-paste detection in the TUI. | description:
4040| `experimental_compact_prompt_file` | `string (path)` | Load the compaction prompt override from a file (experimental). | "Base URL override for the built-in `openai` model provider.",
4141| `experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. | },
4242| `experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. | {
4343| `features.apply_patch_freeform` | `boolean` | Expose the freeform `apply_patch` tool (experimental). | key: "model_context_window",
4444| `features.apps` | `boolean` | Enable ChatGPT Apps/connectors support (experimental). | type: "number",
4545| `features.apps_mcp_gateway` | `boolean` | Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). | description: "Context window tokens available to the active model.",
4646| `features.child_agents_md` | `boolean` | Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). | },
4747| `features.collaboration_modes` | `boolean` | Enable collaboration modes such as plan mode (stable; on by default). | {
4848| `features.multi_agent` | `boolean` | Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait`, `close_agent`, and `spawn_agents_on_csv`) (experimental; off by default). | key: "model_auto_compact_token_limit",
4949| `features.personality` | `boolean` | Enable personality selection controls (stable; on by default). | type: "number",
5050| `features.powershell_utf8` | `boolean` | Force PowerShell UTF-8 output (defaults to true). | description:
5151| `features.remote_models` | `boolean` | Refresh remote model list before showing readiness (experimental). | "Token threshold that triggers automatic history compaction (unset uses model defaults).",
5252| `features.request_rule` | `boolean` | Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). | },
5353| `features.runtime_metrics` | `boolean` | Show runtime metrics summary in TUI turn separators (experimental). | {
5454| `features.search_tool` | `boolean` | Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). | key: "model_catalog_json",
5555| `features.shell_snapshot` | `boolean` | Snapshot shell environment to speed up repeated commands (beta). | type: "string (path)",
5656| `features.shell_tool` | `boolean` | Enable the default `shell` tool for running commands (stable; on by default). | description:
5757| `features.unified_exec` | `boolean` | Use the unified PTY-backed exec tool (beta). | "Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile.",
5858| `features.use_linux_sandbox_bwrap` | `boolean` | Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). | },
5959| `features.web_search` | `boolean` | Deprecated legacy toggle; prefer the top-level `web_search` setting. | {
6060| `features.web_search_cached` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. | key: "oss_provider",
6161| `features.web_search_request` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. | type: "lmstudio | ollama",
6262| `feedback.enabled` | `boolean` | Enable feedback submission via `/feedback` across Codex surfaces (default: true). | description:
6363| `file_opener` | `vscode | vscode-insiders | windsurf | cursor | none` | URI scheme used to open citations from Codex output (default: `vscode`). | "Default local provider used when running with `--oss` (defaults to prompting if unset).",
6464| `forced_chatgpt_workspace_id` | `string (uuid)` | Limit ChatGPT logins to a specific workspace identifier. | },
6565| `forced_login_method` | `chatgpt | api` | Restrict Codex to a specific authentication method. | {
6666| `hide_agent_reasoning` | `boolean` | Suppress reasoning events in both the TUI and `codex exec` output. | key: "approval_policy",
6767| `history.max_bytes` | `number` | If set, caps the history file size in bytes by dropping oldest entries. | type: "untrusted | on-request | never | { granular = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool, request_permissions = bool, skill_approval = bool } }",
6868| `history.persistence` | `save-all | none` | Control whether Codex saves session transcripts to history.jsonl. | description:
6969| `include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | "Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { granular = { ... } }` to allow or auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs.",
7070| `instructions` | `string` | Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. | },
7171| `log_dir` | `string (path)` | Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. | {
7272| `mcp_oauth_callback_port` | `integer` | Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. | key: "approval_policy.granular.sandbox_approval",
7373| `mcp_oauth_callback_url` | `string` | Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port. | type: "boolean",
7474| `mcp_oauth_credentials_store` | `auto | file | keyring` | Preferred store for MCP OAuth credentials. | description:
7575| `mcp_servers.<id>.args` | `array<string>` | Arguments passed to the MCP stdio server command. | "When `true`, sandbox escalation approval prompts are allowed to surface.",
7676| `mcp_servers.<id>.bearer_token_env_var` | `string` | Environment variable sourcing the bearer token for an MCP HTTP server. | },
7777| `mcp_servers.<id>.command` | `string` | Launcher command for an MCP stdio server. | {
7878| `mcp_servers.<id>.cwd` | `string` | Working directory for the MCP stdio server process. | key: "approval_policy.granular.rules",
7979| `mcp_servers.<id>.disabled_tools` | `array<string>` | Deny list applied after `enabled_tools` for the MCP server. | type: "boolean",
8080| `mcp_servers.<id>.enabled` | `boolean` | Disable an MCP server without removing its configuration. | description:
8181| `mcp_servers.<id>.enabled_tools` | `array<string>` | Allow list of tool names exposed by the MCP server. | "When `true`, approvals triggered by execpolicy `prompt` rules are allowed to surface.",
8282| `mcp_servers.<id>.env` | `map<string,string>` | Environment variables forwarded to the MCP stdio server. | },
8383| `mcp_servers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables for an MCP HTTP server. | {
8484| `mcp_servers.<id>.env_vars` | `array<string>` | Additional environment variables to whitelist for an MCP stdio server. | key: "approval_policy.granular.mcp_elicitations",
8585| `mcp_servers.<id>.http_headers` | `map<string,string>` | Static HTTP headers included with each MCP HTTP request. | type: "boolean",
8686| `mcp_servers.<id>.required` | `boolean` | When true, fail startup/resume if this enabled MCP server cannot initialize. | description:
8787| `mcp_servers.<id>.startup_timeout_ms` | `number` | Alias for `startup_timeout_sec` in milliseconds. | "When `true`, MCP elicitation prompts are allowed to surface instead of being auto-rejected.",
8888| `mcp_servers.<id>.startup_timeout_sec` | `number` | Override the default 10s startup timeout for an MCP server. | },
8989| `mcp_servers.<id>.tool_timeout_sec` | `number` | Override the default 60s per-tool timeout for an MCP server. | {
9090| `mcp_servers.<id>.url` | `string` | Endpoint for an MCP streamable HTTP server. | key: "approval_policy.granular.request_permissions",
9191| `model` | `string` | Model to use (e.g., `gpt-5-codex`). | type: "boolean",
9292| `model_auto_compact_token_limit` | `number` | Token threshold that triggers automatic history compaction (unset uses model defaults). | description:
9393| `model_catalog_json` | `string (path)` | Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile. | "When `true`, prompts from the `request_permissions` tool are allowed to surface.",
9494| `model_context_window` | `number` | Context window tokens available to the active model. | },
9595| `model_instructions_file` | `string (path)` | Replacement for built-in instructions instead of `AGENTS.md`. | {
9696| `model_provider` | `string` | Provider id from `model_providers` (default: `openai`). | key: "approval_policy.granular.skill_approval",
9797| `model_providers.<id>.base_url` | `string` | API base URL for the model provider. | type: "boolean",
9898| `model_providers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables when present. | description:
9999| `model_providers.<id>.env_key` | `string` | Environment variable supplying the provider API key. | "When `true`, skill-script approval prompts are allowed to surface.",
100100| `model_providers.<id>.env_key_instructions` | `string` | Optional setup guidance for the provider API key. | },
101101| `model_providers.<id>.experimental_bearer_token` | `string` | Direct bearer token for the provider (discouraged; use `env_key`). | {
102102| `model_providers.<id>.http_headers` | `map<string,string>` | Static HTTP headers added to provider requests. | key: "approvals_reviewer",
103103| `model_providers.<id>.name` | `string` | Display name for a custom model provider. | type: "user | auto_review",
104104| `model_providers.<id>.query_params` | `map<string,string>` | Extra query parameters appended to provider requests. | description:
105105| `model_providers.<id>.request_max_retries` | `number` | Retry count for HTTP requests to the provider (default: 4). | "Who reviews eligible approval prompts under `on-request` or granular approval policies. Defaults to `user`; `auto_review` uses the reviewer subagent. This setting doesn't change sandboxing or review actions already allowed inside the sandbox.",
106106| `model_providers.<id>.requires_openai_auth` | `boolean` | The provider uses OpenAI authentication (defaults to false). | },
107107| `model_providers.<id>.stream_idle_timeout_ms` | `number` | Idle timeout for SSE streams in milliseconds (default: 300000). | {
108108| `model_providers.<id>.stream_max_retries` | `number` | Retry count for SSE streaming interruptions (default: 5). | key: "auto_review.policy",
109109| `model_providers.<id>.wire_api` | `chat | responses` | Protocol used by the provider (defaults to `chat` if omitted). | type: "string",
110110| `model_reasoning_effort` | `minimal | low | medium | high | xhigh` | Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). | description:
111111| `model_reasoning_summary` | `auto | concise | detailed | none` | Select reasoning summary detail or disable summaries entirely. | "Local Markdown policy instructions for automatic review. Managed `guardian_policy_config` takes precedence. Blank values are ignored.",
112112| `model_supports_reasoning_summaries` | `boolean` | Force Codex to send or not send reasoning metadata. | },
113113| `model_verbosity` | `low | medium | high` | Control GPT-5 Responses API verbosity (defaults to `medium`). | {
114114| `notice.hide_full_access_warning` | `boolean` | Track acknowledgement of the full access warning prompt. | key: "allow_login_shell",
115115| `notice.hide_gpt-5.1-codex-max_migration_prompt` | `boolean` | Track acknowledgement of the gpt-5.1-codex-max migration prompt. | type: "boolean",
116116| `notice.hide_gpt5_1_migration_prompt` | `boolean` | Track acknowledgement of the GPT-5.1 migration prompt. | description:
117117| `notice.hide_rate_limit_model_nudge` | `boolean` | Track opt-out of the rate limit model switch reminder. | "Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells.",
118118| `notice.hide_world_writable_warning` | `boolean` | Track acknowledgement of the Windows world-writable directories warning. | },
119119| `notice.model_migrations` | `map<string,string>` | Track acknowledged model migrations as old->new mappings. | {
120120| `notify` | `array<string>` | Command invoked for notifications; receives a JSON payload from Codex. | key: "sandbox_mode",
121121| `oss_provider` | `lmstudio | ollama` | Default local provider used when running with `--oss` (defaults to prompting if unset). | type: "read-only | workspace-write | danger-full-access",
122122| `otel.environment` | `string` | Environment tag applied to emitted OpenTelemetry events (default: `dev`). | description:
123123| `otel.exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry exporter and provide any endpoint metadata. | "Sandbox policy for filesystem and network access during command execution.",
124124| `otel.exporter.<id>.endpoint` | `string` | Exporter endpoint for OTEL logs. | },
125125| `otel.exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL exporter requests. | {
126126| `otel.exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP exporter. | key: "sandbox_workspace_write.writable_roots",
127127| `otel.exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL exporter TLS. | type: "array<string>",
128128| `otel.exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL exporter TLS. | description:
129129| `otel.exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL exporter TLS. | 'Additional writable roots when `sandbox_mode = "workspace-write"`.',
130130| `otel.log_user_prompt` | `boolean` | Opt in to exporting raw user prompts with OpenTelemetry logs. | },
131131| `otel.trace_exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry trace exporter and provide any endpoint metadata. | {
132132| `otel.trace_exporter.<id>.endpoint` | `string` | Trace exporter endpoint for OTEL logs. | key: "sandbox_workspace_write.network_access",
133133| `otel.trace_exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL trace exporter requests. | type: "boolean",
134134| `otel.trace_exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP trace exporter. | description:
135135| `otel.trace_exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL trace exporter TLS. | "Allow outbound network access inside the workspace-write sandbox.",
136136| `otel.trace_exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL trace exporter TLS. | },
137137| `otel.trace_exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL trace exporter TLS. | {
138138| `personality` | `none | friendly | pragmatic` | Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`. | key: "sandbox_workspace_write.exclude_tmpdir_env_var",
139139| `profile` | `string` | Default profile applied at startup (equivalent to `--profile`). | type: "boolean",
140140| `profiles.<name>.*` | `various` | Profile-scoped overrides for any of the supported configuration keys. | description:
141141| `profiles.<name>.experimental_use_freeform_apply_patch` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | "Exclude `$TMPDIR` from writable roots in workspace-write mode.",
142142| `profiles.<name>.experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec`. | },
143143| `profiles.<name>.include_apply_patch_tool` | `boolean` | Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. | {
144144| `profiles.<name>.model_catalog_json` | `string (path)` | Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile). | key: "sandbox_workspace_write.exclude_slash_tmp",
145145| `profiles.<name>.oss_provider` | `lmstudio | ollama` | Profile-scoped OSS provider for `--oss` sessions. | type: "boolean",
146146| `profiles.<name>.personality` | `none | friendly | pragmatic` | Profile-scoped communication style override for supported models. | description:
147147| `profiles.<name>.web_search` | `disabled | cached | live` | Profile-scoped web search mode override (default: `"cached"`). | "Exclude `/tmp` from writable roots in workspace-write mode.",
148148| `project_doc_fallback_filenames` | `array<string>` | Additional filenames to try when `AGENTS.md` is missing. | },
149149| `project_doc_max_bytes` | `number` | Maximum bytes read from `AGENTS.md` when building project instructions. | {
150150| `project_root_markers` | `array<string>` | List of project root marker filenames; used when searching parent directories for the project root. | key: "windows.sandbox",
151151| `projects.<path>.trust_level` | `string` | Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers. | type: "unelevated | elevated",
152152| `review_model` | `string` | Optional model override used by `/review` (defaults to the current session model). | description:
153153| `sandbox_mode` | `read-only | workspace-write | danger-full-access` | Sandbox policy for filesystem and network access during command execution. | "Windows-only native sandbox mode when running Codex natively on Windows.",
154154| `sandbox_workspace_write.exclude_slash_tmp` | `boolean` | Exclude `/tmp` from writable roots in workspace-write mode. | },
155155| `sandbox_workspace_write.exclude_tmpdir_env_var` | `boolean` | Exclude `$TMPDIR` from writable roots in workspace-write mode. | {
156156| `sandbox_workspace_write.network_access` | `boolean` | Allow outbound network access inside the workspace-write sandbox. | key: "windows.sandbox_private_desktop",
157157| `sandbox_workspace_write.writable_roots` | `array<string>` | Additional writable roots when `sandbox_mode = "workspace-write"`. | type: "boolean",
158158| `shell_environment_policy.exclude` | `array<string>` | Glob patterns for removing environment variables after the defaults. | description:
159159| `shell_environment_policy.experimental_use_profile` | `boolean` | Use the user shell profile when spawning subprocesses. | "Run the final sandboxed child process on a private desktop by default on native Windows. Set `false` only for compatibility with the older `Winsta0\\\\Default` behavior.",
160160| `shell_environment_policy.ignore_default_excludes` | `boolean` | Keep variables containing KEY/SECRET/TOKEN before other filters run. | },
161161| `shell_environment_policy.include_only` | `array<string>` | Whitelist of patterns; when set only matching variables are kept. | {
162162| `shell_environment_policy.inherit` | `all | core | none` | Baseline environment inheritance when spawning subprocesses. | key: "notify",
163163| `shell_environment_policy.set` | `map<string,string>` | Explicit environment overrides injected into every subprocess. | type: "array<string>",
164164| `show_raw_agent_reasoning` | `boolean` | Surface raw reasoning content when the active model emits it. | description:
165165| `skills.config` | `array<object>` | Per-skill enablement overrides stored in config.toml. | "Command invoked for notifications; receives a JSON payload from Codex.",
166166| `skills.config.<index>.enabled` | `boolean` | Enable or disable the referenced skill. | },
167167| `skills.config.<index>.path` | `string (path)` | Path to a skill folder containing `SKILL.md`. | {
168168| `sqlite_home` | `string (path)` | Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state. | key: "check_for_update_on_startup",
169169| `suppress_unstable_features_warning` | `boolean` | Suppress the warning that appears when under-development feature flags are enabled. | type: "boolean",
170170| `tool_output_token_limit` | `number` | Token budget for storing individual tool/function outputs in history. | description:
171171| `tools.web_search` | `boolean` | Deprecated legacy toggle for web search; prefer the top-level `web_search` setting. | "Check for Codex updates on startup (set to false only when updates are centrally managed).",
172172| `tui` | `table` | TUI-specific options such as enabling inline desktop notifications. | },
173173| `tui.alternate_screen` | `auto | always | never` | Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback). | {
174174| `tui.animations` | `boolean` | Enable terminal animations (welcome screen, shimmer, spinner) (default: true). | key: "feedback.enabled",
175175| `tui.notification_method` | `auto | osc9 | bel` | Notification method for unfocused terminal notifications (default: auto). | type: "boolean",
176176| `tui.notifications` | `boolean | array<string>` | Enable TUI notifications; optionally restrict to specific event types. | description:
177177| `tui.show_tooltips` | `boolean` | Show onboarding tooltips in the TUI welcome screen (default: true). | "Enable feedback submission via `/feedback` across Codex surfaces (default: true).",
178178| `tui.status_line` | `array<string> | null` | Ordered list of TUI footer status-line item identifiers. `null` disables the status line. | },
179179| `web_search` | `disabled | cached | live` | Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool. | {
180180| `windows_wsl_setup_acknowledged` | `boolean` | Track Windows onboarding acknowledgement (Windows only). | key: "analytics.enabled",
181181| `windows.sandbox` | `unelevated | elevated` | Windows-only native sandbox mode when running Codex natively on Windows. | type: "boolean",
182182 description:
183183Key "Enable or disable analytics for this machine/profile. When unset, the client default applies.",
184184 },
185185`agents.<name>.config_file` {
186186 key: "instructions",
187187Type / Values type: "string",
188188 description:
189189`string (path)` "Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`.",
190190 },
191191Details {
192192 key: "developer_instructions",
193193Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. type: "string",
194194 description:
195195Key "Additional developer instructions injected into the session (optional).",
196196 },
197197`agents.<name>.description` {
198198 key: "log_dir",
199199Type / Values type: "string (path)",
200200 description:
201201`string` "Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`.",
202202 },
203203Details {
204204 key: "sqlite_home",
205205Role guidance shown to Codex when choosing and spawning that agent type. type: "string (path)",
206206 description:
207207Key "Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state.",
208208 },
209209`agents.job_max_runtime_seconds` {
210210 key: "compact_prompt",
211211Type / Values type: "string",
212212 description: "Inline override for the history compaction prompt.",
213213`number` },
214214 {
215215Details key: "commit_attribution",
216216 type: "string",
217217Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker. description:
218218 'Commit co-author trailer used when `[features].codex_git_commit` is enabled. Defaults to `Codex <noreply@openai.com>`; set `""` to disable.',
219219Key },
220220 {
221221`agents.max_depth` key: "model_instructions_file",
222222 type: "string (path)",
223223Type / Values description:
224224 "Replacement for built-in instructions instead of `AGENTS.md`.",
225225`number` },
226226 {
227227Details key: "personality",
228228 type: "none | friendly | pragmatic",
229229Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1). description:
230230 "Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.",
231231Key },
232232 {
233233`agents.max_threads` key: "service_tier",
234234 type: "string",
235235Type / Values description:
236236 "Preferred service tier for new turns. Built-in values include `flex` and `fast`; legacy `fast` config maps to the request value `priority`, and catalog-provided tier IDs can also be stored.",
237237`number` },
238238 {
239239Details key: "experimental_compact_prompt_file",
240240 type: "string (path)",
241241Maximum number of agent threads that can be open concurrently. description:
242242 "Load the compaction prompt override from a file (experimental).",
243243Key },
244244 {
245245`allow_login_shell` key: "skills.config",
246246 type: "array<object>",
247247Type / Values description: "Per-skill enablement overrides stored in config.toml.",
248248 },
249249`boolean` {
250250 key: "skills.config.<index>.path",
251251Details type: "string (path)",
252252 description: "Path to a skill folder containing `SKILL.md`.",
253253Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells. },
254254 {
255255Key key: "skills.config.<index>.enabled",
256256 type: "boolean",
257257`approval_policy` description: "Enable or disable the referenced skill.",
258258 },
259259Type / Values {
260260 key: "apps.<id>.enabled",
261261`untrusted | on-request | never | { reject = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool } }` type: "boolean",
262262 description:
263263Details "Enable or disable a specific app/connector by id (default: true).",
264264 },
265265Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { reject = { ... } }` to auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. {
266266 key: "apps._default.enabled",
267267Key type: "boolean",
268268 description:
269269`approval_policy.reject.mcp_elicitations` "Default app enabled state for all apps unless overridden per app.",
270270 },
271271Type / Values {
272272 key: "apps._default.destructive_enabled",
273273`boolean` type: "boolean",
274274 description:
275275Details "Default allow/deny for app tools with `destructive_hint = true`.",
276276 },
277277When `true`, MCP elicitation prompts are auto-rejected instead of shown to the user. {
278278 key: "apps._default.open_world_enabled",
279279Key type: "boolean",
280280 description:
281281`approval_policy.reject.rules` "Default allow/deny for app tools with `open_world_hint = true`.",
282282 },
283283Type / Values {
284284 key: "apps.<id>.destructive_enabled",
285285`boolean` type: "boolean",
286286 description:
287287Details "Allow or block tools in this app that advertise `destructive_hint = true`.",
288288 },
289289When `true`, approvals triggered by execpolicy `prompt` rules are auto-rejected. {
290290 key: "apps.<id>.open_world_enabled",
291291Key type: "boolean",
292292 description:
293293`approval_policy.reject.sandbox_approval` "Allow or block tools in this app that advertise `open_world_hint = true`.",
294294 },
295295Type / Values {
296296 key: "apps.<id>.default_tools_enabled",
297297`boolean` type: "boolean",
298298 description:
299299Details "Default enabled state for tools in this app unless a per-tool override exists.",
300300 },
301301When `true`, sandbox escalation approval prompts are auto-rejected. {
302302 key: "apps.<id>.default_tools_approval_mode",
303303Key type: "auto | prompt | approve",
304304 description:
305305`apps._default.destructive_enabled` "Default approval behavior for tools in this app unless a per-tool override exists.",
306306 },
307307Type / Values {
308308 key: "apps.<id>.tools.<tool>.enabled",
309309`boolean` type: "boolean",
310310 description:
311311Details "Per-tool enabled override for an app tool (for example `repos/list`).",
312312 },
313313Default allow/deny for app tools with `destructive_hint = true`. {
314314 key: "apps.<id>.tools.<tool>.approval_mode",
315315Key type: "auto | prompt | approve",
316316 description: "Per-tool approval behavior override for a single app tool.",
317317`apps._default.enabled` },
318318 {
319319Type / Values key: "tool_suggest.discoverables",
320320 type: "array<table>",
321321`boolean` description:
322322 'Allow tool suggestions for additional discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
323323Details },
324324 {
325325Default app enabled state for all apps unless overridden per app. key: "tool_suggest.disabled_tools",
326326 type: "array<table>",
327327Key description:
328328 'Disable suggestions for specific discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
329329`apps._default.open_world_enabled` },
330330 {
331331Type / Values key: "features.apps",
332332 type: "boolean",
333333`boolean` description: "Enable ChatGPT Apps/connectors support (experimental).",
334334 },
335335Details {
336336 key: "features.hooks",
337337Default allow/deny for app tools with `open_world_hint = true`. type: "boolean",
338338 description:
339339Key "Enable lifecycle hooks loaded from `hooks.json` or inline `[hooks]` config. `features.codex_hooks` is a deprecated alias.",
340340 },
341341`apps.<id>.default_tools_approval_mode` {
342342 key: "features.codex_git_commit",
343343Type / Values type: "boolean",
344344 description:
345345`auto | prompt | approve` "Enable Codex-generated git commits. When enabled, Codex uses `commit_attribution` to append a `Co-authored-by:` trailer to generated commit messages.",
346346 },
347347Details {
348348 key: "hooks",
349349Default approval behavior for tools in this app unless a per-tool override exists. type: "table",
350350 description:
351351Key "Lifecycle hooks configured inline in `config.toml`. Uses the same event schema as `hooks.json`; see the Hooks guide for examples and supported events.",
352352 },
353353`apps.<id>.default_tools_enabled` {
354354 key: "features.plugin_hooks",
355355Type / Values type: "boolean",
356356 description:
357357`boolean` "Opt into lifecycle hooks bundled with enabled plugins. Off by default in this release; set to `true` to opt in.",
358358 },
359359Details {
360360 key: "features.memories",
361361Default enabled state for tools in this app unless a per-tool override exists. type: "boolean",
362362 description: "Enable [Memories](https://developers.openai.com/codex/memories) (off by default).",
363363Key },
364364 {
365365`apps.<id>.destructive_enabled` key: "mcp_servers.<id>.command",
366366 type: "string",
367367Type / Values description: "Launcher command for an MCP stdio server.",
368368 },
369369`boolean` {
370370 key: "mcp_servers.<id>.args",
371371Details type: "array<string>",
372372 description: "Arguments passed to the MCP stdio server command.",
373373Allow or block tools in this app that advertise `destructive_hint = true`. },
374374 {
375375Key key: "mcp_servers.<id>.env",
376376 type: "map<string,string>",
377377`apps.<id>.enabled` description: "Environment variables forwarded to the MCP stdio server.",
378378 },
379379Type / Values {
380380 key: "mcp_servers.<id>.env_vars",
381381`boolean` type: 'array<string | { name = string, source = "local" | "remote" }>',
382382 description:
383383Details 'Additional environment variables to whitelist for an MCP stdio server. String entries default to `source = "local"`; use `source = "remote"` only with executor-backed remote stdio.',
384384 },
385385Enable or disable a specific app/connector by id (default: true). {
386386 key: "mcp_servers.<id>.cwd",
387387Key type: "string",
388388 description: "Working directory for the MCP stdio server process.",
389389`apps.<id>.open_world_enabled` },
390390 {
391391Type / Values key: "mcp_servers.<id>.url",
392392 type: "string",
393393`boolean` description: "Endpoint for an MCP streamable HTTP server.",
394394 },
395395Details {
396396 key: "mcp_servers.<id>.bearer_token_env_var",
397397Allow or block tools in this app that advertise `open_world_hint = true`. type: "string",
398398 description:
399399Key "Environment variable sourcing the bearer token for an MCP HTTP server.",
400400 },
401401`apps.<id>.tools.<tool>.approval_mode` {
402402 key: "mcp_servers.<id>.http_headers",
403403Type / Values type: "map<string,string>",
404404 description: "Static HTTP headers included with each MCP HTTP request.",
405405`auto | prompt | approve` },
406406 {
407407Details key: "mcp_servers.<id>.env_http_headers",
408408 type: "map<string,string>",
409409Per-tool approval behavior override for a single app tool. description:
410410 "HTTP headers populated from environment variables for an MCP HTTP server.",
411411Key },
412412 {
413413`apps.<id>.tools.<tool>.enabled` key: "mcp_servers.<id>.enabled",
414414 type: "boolean",
415415Type / Values description: "Disable an MCP server without removing its configuration.",
416416 },
417417`boolean` {
418418 key: "mcp_servers.<id>.required",
419419Details type: "boolean",
420420 description:
421421Per-tool enabled override for an app tool (for example `repos/list`). "When true, fail startup/resume if this enabled MCP server cannot initialize.",
422422 },
423423Key {
424424 key: "mcp_servers.<id>.startup_timeout_sec",
425425`background_terminal_max_timeout` type: "number",
426426 description:
427427Type / Values "Override the default 10s startup timeout for an MCP server.",
428428 },
429429`number` {
430430 key: "mcp_servers.<id>.startup_timeout_ms",
431431Details type: "number",
432432 description: "Alias for `startup_timeout_sec` in milliseconds.",
433433Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key. },
434434 {
435435Key key: "mcp_servers.<id>.tool_timeout_sec",
436436 type: "number",
437437`chatgpt_base_url` description:
438438 "Override the default 60s per-tool timeout for an MCP server.",
439439Type / Values },
440440 {
441441`string` key: "mcp_servers.<id>.enabled_tools",
442442 type: "array<string>",
443443Details description: "Allow list of tool names exposed by the MCP server.",
444444 },
445445Override the base URL used during the ChatGPT login flow. {
446446 key: "mcp_servers.<id>.disabled_tools",
447447Key type: "array<string>",
448448 description:
449449`check_for_update_on_startup` "Deny list applied after `enabled_tools` for the MCP server.",
450450 },
451451Type / Values {
452452 key: "mcp_servers.<id>.default_tools_approval_mode",
453453`boolean` type: "auto | prompt | approve",
454454 description:
455455Details "Default approval behavior for MCP tools on this server unless a per-tool override exists.",
456456 },
457457Check for Codex updates on startup (set to false only when updates are centrally managed). {
458458 key: "mcp_servers.<id>.tools.<tool>.approval_mode",
459459Key type: "auto | prompt | approve",
460460 description:
461461`cli_auth_credentials_store` "Per-tool approval behavior override for one MCP tool on this server.",
462462 },
463463Type / Values {
464464 key: "mcp_servers.<id>.scopes",
465465`file | keyring | auto` type: "array<string>",
466466 description:
467467Details "OAuth scopes to request when authenticating to that MCP server.",
468468 },
469469Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). {
470470 key: "mcp_servers.<id>.oauth_resource",
471471Key type: "string",
472472 description:
473473`compact_prompt` "Optional RFC 8707 OAuth resource parameter to include during MCP login.",
474474 },
475475Type / Values {
476476 key: "mcp_servers.<id>.experimental_environment",
477477`string` type: "local | remote",
478478 description:
479479Details "Experimental placement for an MCP server. `remote` starts stdio servers through a remote executor environment; streamable HTTP remote placement is not implemented.",
480480 },
481481Inline override for the history compaction prompt. {
482482 key: "agents.max_threads",
483483Key type: "number",
484484 description:
485485`developer_instructions` "Maximum number of agent threads that can be open concurrently. Defaults to `6` when unset.",
486486 },
487487Type / Values {
488488 key: "agents.max_depth",
489489`string` type: "number",
490490 description:
491491Details "Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1).",
492492 },
493493Additional developer instructions injected into the session (optional). {
494494 key: "agents.job_max_runtime_seconds",
495495Key type: "number",
496496 description:
497497`disable_paste_burst` "Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker.",
498498 },
499499Type / Values {
500500 key: "agents.<name>.description",
501501`boolean` type: "string",
502502 description:
503503Details "Role guidance shown to Codex when choosing and spawning that agent type.",
504504 },
505505Disable burst-paste detection in the TUI. {
506506 key: "agents.<name>.config_file",
507507Key type: "string (path)",
508508 description:
509509`experimental_compact_prompt_file` "Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role.",
510510 },
511511Type / Values {
512512 key: "agents.<name>.nickname_candidates",
513513`string (path)` type: "array<string>",
514514 description:
515515Details "Optional pool of display nicknames for spawned agents in that role.",
516516 },
517517Load the compaction prompt override from a file (experimental). {
518518 key: "memories.generate_memories",
519519Key type: "boolean",
520520 description:
521521`experimental_use_freeform_apply_patch` "When `false`, newly created threads are not stored as memory-generation inputs. Defaults to `true`.",
522522 },
523523Type / Values {
524524 key: "memories.use_memories",
525525`boolean` type: "boolean",
526526 description:
527527Details "When `false`, Codex skips injecting existing memories into future sessions. Defaults to `true`.",
528528 },
529529Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform` or `codex --enable apply_patch_freeform`. {
530530 key: "memories.disable_on_external_context",
531531Key type: "boolean",
532532 description:
533533`experimental_use_unified_exec_tool` "When `true`, threads that use external context such as MCP tool calls, web search, or tool search are kept out of memory generation. Defaults to `false`. Legacy alias: `memories.no_memories_if_mcp_or_web_search`.",
534534 },
535535Type / Values {
536536 key: "memories.max_raw_memories_for_consolidation",
537537`boolean` type: "number",
538538 description:
539539Details "Maximum recent raw memories retained for global consolidation. Defaults to `256` and is capped at `4096`.",
540540 },
541541Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. {
542542 key: "memories.max_unused_days",
543543Key type: "number",
544544 description:
545545`features.apply_patch_freeform` "Maximum days since a memory was last used before it becomes ineligible for consolidation. Defaults to `30` and is clamped to `0`-`365`.",
546546 },
547547Type / Values {
548548 key: "memories.max_rollout_age_days",
549549`boolean` type: "number",
550550 description:
551551Details "Maximum age of threads considered for memory generation. Defaults to `30` and is clamped to `0`-`90`.",
552552 },
553553Expose the freeform `apply_patch` tool (experimental). {
554554 key: "memories.max_rollouts_per_startup",
555555Key type: "number",
556556 description:
557557`features.apps` "Maximum rollout candidates processed per startup pass. Defaults to `16` and is capped at `128`.",
558558 },
559559Type / Values {
560560 key: "memories.min_rollout_idle_hours",
561561`boolean` type: "number",
562562 description:
563563Details "Minimum idle time before a thread is considered for memory generation. Defaults to `6` and is clamped to `1`-`48`.",
564564 },
565565Enable ChatGPT Apps/connectors support (experimental). {
566566 key: "memories.min_rate_limit_remaining_percent",
567567Key type: "number",
568568 description:
569569`features.apps_mcp_gateway` "Minimum remaining percentage required in Codex rate-limit windows before memory generation starts. Defaults to `25` and is clamped to `0`-`100`.",
570570 },
571571Type / Values {
572572 key: "memories.extract_model",
573573`boolean` type: "string",
574574 description: "Optional model override for per-thread memory extraction.",
575575Details },
576576 {
577577Route Apps MCP calls through the OpenAI connectors MCP gateway (`https://api.openai.com/v1/connectors/mcp/`) instead of legacy routing (experimental). key: "memories.consolidation_model",
578578 type: "string",
579579Key description: "Optional model override for global memory consolidation.",
580580 },
581581`features.child_agents_md` {
582582 key: "features.unified_exec",
583583Type / Values type: "boolean",
584584 description:
585585`boolean` "Use the unified PTY-backed exec tool (stable; enabled by default except on Windows).",
586586 },
587587Details {
588588 key: "features.shell_snapshot",
589589Append AGENTS.md scope/precedence guidance even when no AGENTS.md is present (experimental). type: "boolean",
590590 description:
591591Key "Snapshot shell environment to speed up repeated commands (stable; on by default).",
592592 },
593593`features.collaboration_modes` {
594594 key: "features.undo",
595595Type / Values type: "boolean",
596596 description: "Enable undo support (stable; off by default).",
597597`boolean` },
598598 {
599599Details key: "features.multi_agent",
600600 type: "boolean",
601601Enable collaboration modes such as plan mode (stable; on by default). description:
602602 "Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait_agent`, and `close_agent`) (stable; on by default).",
603603Key },
604604 {
605605`features.multi_agent` key: "features.personality",
606606 type: "boolean",
607607Type / Values description:
608608 "Enable personality selection controls (stable; on by default).",
609609`boolean` },
610610 {
611611Details key: "features.network_proxy",
612612 type: "boolean | table",
613613Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait`, `close_agent`, and `spawn_agents_on_csv`) (experimental; off by default). description:
614614 "Enable sandboxed networking. Use a table form when setting network policy options such as `domains` (experimental; off by default).",
615615Key },
616616 {
617617`features.personality` key: "features.network_proxy.enabled",
618618 type: "boolean",
619619Type / Values description: "Enable sandboxed networking. Defaults to `false`.",
620620 },
621621`boolean` {
622622 key: "features.network_proxy.domains",
623623Details type: "map<string, allow | deny>",
624624 description:
625625Enable personality selection controls (stable; on by default). "Domain policy for sandboxed networking. Unset by default, which means no external destinations are allowed until you add `allow` rules. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. Add `deny` rules for blocked destinations; `deny` wins on conflicts.",
626626 },
627627Key {
628628 key: "features.network_proxy.unix_sockets",
629629`features.powershell_utf8` type: "map<string, allow | none>",
630630 description:
631631Type / Values "Unix socket policy for sandboxed networking. Unset by default; add `allow` entries for permitted sockets.",
632632 },
633633`boolean` {
634634 key: "features.network_proxy.allow_local_binding",
635635Details type: "boolean",
636636 description:
637637Force PowerShell UTF-8 output (defaults to true). "Allow broader local/private-network access. Defaults to `false`; exact local IP literal or `localhost` allow rules can still permit specific local targets.",
638638 },
639639Key {
640640 key: "features.network_proxy.enable_socks5",
641641`features.remote_models` type: "boolean",
642642 description: "Expose SOCKS5 support. Defaults to `true`.",
643643Type / Values },
644644 {
645645`boolean` key: "features.network_proxy.enable_socks5_udp",
646646 type: "boolean",
647647Details description: "Allow UDP over SOCKS5. Defaults to `true`.",
648648 },
649649Refresh remote model list before showing readiness (experimental). {
650650 key: "features.network_proxy.allow_upstream_proxy",
651651Key type: "boolean",
652652 description:
653653`features.request_rule` "Allow chaining through an upstream proxy from the environment. Defaults to `true`.",
654654 },
655655Type / Values {
656656 key: "features.network_proxy.dangerously_allow_non_loopback_proxy",
657657`boolean` type: "boolean",
658658 description:
659659Details "Permit non-loopback listener addresses. Defaults to `false`; enabling it can expose proxy listeners beyond localhost.",
660660 },
661661Enable Smart approvals (`prefix_rule` suggestions on escalation requests; stable; on by default). {
662662 key: "features.network_proxy.dangerously_allow_all_unix_sockets",
663663Key type: "boolean",
664664 description:
665665`features.runtime_metrics` "Permit arbitrary Unix socket destinations instead of allowlist-only access. Defaults to `false`; use only in tightly controlled environments.",
666666 },
667667Type / Values {
668668 key: "features.network_proxy.proxy_url",
669669`boolean` type: "string",
670670 description:
671671Details 'HTTP listener URL for sandboxed networking. Defaults to `"http://127.0.0.1:3128"`.',
672672 },
673673Show runtime metrics summary in TUI turn separators (experimental). {
674674 key: "features.network_proxy.socks_url",
675675Key type: "string",
676676 description:
677677`features.search_tool` 'SOCKS5 listener URL. Defaults to `"http://127.0.0.1:8081"`.',
678678 },
679679Type / Values {
680680 key: "features.web_search",
681681`boolean` type: "boolean",
682682 description:
683683Details "Deprecated legacy toggle; prefer the top-level `web_search` setting.",
684684 },
685685Enable `search_tool_bm25` for Apps tool discovery before invoking app MCP tools (experimental). {
686686 key: "features.web_search_cached",
687687Key type: "boolean",
688688 description:
689689`features.shell_snapshot` 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`.',
690690 },
691691Type / Values {
692692 key: "features.web_search_request",
693693`boolean` type: "boolean",
694694 description:
695695Details 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`.',
696696 },
697697Snapshot shell environment to speed up repeated commands (beta). {
698698 key: "features.shell_tool",
699699Key type: "boolean",
700700 description:
701701`features.shell_tool` "Enable the default `shell` tool for running commands (stable; on by default).",
702702 },
703703Type / Values {
704704 key: "features.enable_request_compression",
705705`boolean` type: "boolean",
706706 description:
707707Details "Compress streaming request bodies with zstd when supported (stable; on by default).",
708708 },
709709Enable the default `shell` tool for running commands (stable; on by default). {
710710 key: "features.skill_mcp_dependency_install",
711711Key type: "boolean",
712712 description:
713713`features.unified_exec` "Allow prompting and installing missing MCP dependencies for skills (stable; on by default).",
714714 },
715715Type / Values {
716716 key: "features.fast_mode",
717717`boolean` type: "boolean",
718718 description:
719719Details "Enable model-catalog service tier selection in the TUI, including Fast-tier commands when the active model advertises them (stable; on by default).",
720720 },
721721Use the unified PTY-backed exec tool (beta). {
722722 key: "features.prevent_idle_sleep",
723723Key type: "boolean",
724724 description:
725725`features.use_linux_sandbox_bwrap` "Prevent the machine from sleeping while a turn is actively running (experimental; off by default).",
726726 },
727727Type / Values {
728728 key: "suppress_unstable_features_warning",
729729`boolean` type: "boolean",
730730 description:
731731Details "Suppress the warning that appears when under-development feature flags are enabled.",
732732 },
733733Use the bubblewrap-based Linux sandbox pipeline (experimental; off by default). {
734734 key: "model_providers.<id>",
735735Key type: "table",
736736 description:
737737`features.web_search` "Custom provider definition. Built-in provider IDs (`openai`, `ollama`, and `lmstudio`) are reserved and cannot be overridden.",
738738 },
739739Type / Values {
740740 key: "model_providers.<id>.name",
741741`boolean` type: "string",
742742 description: "Display name for a custom model provider.",
743743Details },
744744 {
745745Deprecated legacy toggle; prefer the top-level `web_search` setting. key: "model_providers.<id>.base_url",
746746 type: "string",
747747Key description: "API base URL for the model provider.",
748748 },
749749`features.web_search_cached` {
750750 key: "model_providers.<id>.env_key",
751751Type / Values type: "string",
752752 description: "Environment variable supplying the provider API key.",
753753`boolean` },
754754 {
755755Details key: "model_providers.<id>.env_key_instructions",
756756 type: "string",
757757Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. description: "Optional setup guidance for the provider API key.",
758758 },
759759Key {
760760 key: "model_providers.<id>.experimental_bearer_token",
761761`features.web_search_request` type: "string",
762762 description:
763763Type / Values "Direct bearer token for the provider (discouraged; use `env_key`).",
764764 },
765765`boolean` {
766766 key: "model_providers.<id>.requires_openai_auth",
767767Details type: "boolean",
768768 description:
769769Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. "The provider uses OpenAI authentication (defaults to false).",
770770 },
771771Key {
772772 key: "model_providers.<id>.wire_api",
773773`feedback.enabled` type: "responses",
774774 description:
775775Type / Values "Protocol used by the provider. `responses` is the only supported value, and it is the default when omitted.",
776776 },
777777`boolean` {
778778 key: "model_providers.<id>.query_params",
779779Details type: "map<string,string>",
780780 description: "Extra query parameters appended to provider requests.",
781781Enable feedback submission via `/feedback` across Codex surfaces (default: true). },
782782 {
783783Key key: "model_providers.<id>.http_headers",
784784 type: "map<string,string>",
785785`file_opener` description: "Static HTTP headers added to provider requests.",
786786 },
787787Type / Values {
788788 key: "model_providers.<id>.env_http_headers",
789789`vscode | vscode-insiders | windsurf | cursor | none` type: "map<string,string>",
790790 description:
791791Details "HTTP headers populated from environment variables when present.",
792792 },
793793URI scheme used to open citations from Codex output (default: `vscode`). {
794794 key: "model_providers.<id>.request_max_retries",
795795Key type: "number",
796796 description:
797797`forced_chatgpt_workspace_id` "Retry count for HTTP requests to the provider (default: 4).",
798798 },
799799Type / Values {
800800 key: "model_providers.<id>.stream_max_retries",
801801`string (uuid)` type: "number",
802802 description: "Retry count for SSE streaming interruptions (default: 5).",
803803Details },
804804 {
805805Limit ChatGPT logins to a specific workspace identifier. key: "model_providers.<id>.stream_idle_timeout_ms",
806806 type: "number",
807807Key description:
808808 "Idle timeout for SSE streams in milliseconds (default: 300000).",
809809`forced_login_method` },
810810 {
811811Type / Values key: "model_providers.<id>.supports_websockets",
812812 type: "boolean",
813813`chatgpt | api` description:
814814 "Whether that provider supports the Responses API WebSocket transport.",
815815Details },
816816 {
817817Restrict Codex to a specific authentication method. key: "model_providers.<id>.auth",
818818 type: "table",
819819Key description:
820820 "Command-backed bearer token configuration for a custom provider. Do not combine with `env_key`, `experimental_bearer_token`, or `requires_openai_auth`.",
821821`hide_agent_reasoning` },
822822 {
823823Type / Values key: "model_providers.<id>.auth.command",
824824 type: "string",
825825`boolean` description:
826826 "Command to run when Codex needs a bearer token. The command must print the token to stdout.",
827827Details },
828828 {
829829Suppress reasoning events in both the TUI and `codex exec` output. key: "model_providers.<id>.auth.args",
830830 type: "array<string>",
831831Key description: "Arguments passed to the token command.",
832832 },
833833`history.max_bytes` {
834834 key: "model_providers.<id>.auth.timeout_ms",
835835Type / Values type: "number",
836836 description:
837837`number` "Maximum token command runtime in milliseconds (default: 5000).",
838838 },
839839Details {
840840 key: "model_providers.<id>.auth.refresh_interval_ms",
841841If set, caps the history file size in bytes by dropping oldest entries. type: "number",
842842 description:
843843Key "How often Codex proactively refreshes the token in milliseconds (default: 300000). Set to `0` to refresh only after an authentication retry.",
844844 },
845845`history.persistence` {
846846 key: "model_providers.<id>.auth.cwd",
847847Type / Values type: "string (path)",
848848 description: "Working directory for the token command.",
849849`save-all | none` },
850850 {
851851Details key: "model_providers.amazon-bedrock.aws.profile",
852852 type: "string",
853853Control whether Codex saves session transcripts to history.jsonl. description:
854854 "AWS profile name used by the built-in `amazon-bedrock` provider.",
855855Key },
856856 {
857857`include_apply_patch_tool` key: "model_providers.amazon-bedrock.aws.region",
858858 type: "string",
859859Type / Values description: "AWS region used by the built-in `amazon-bedrock` provider.",
860860 },
861861`boolean` {
862862 key: "model_reasoning_effort",
863863Details type: "minimal | low | medium | high | xhigh",
864864 description:
865865Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`. "Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent).",
866866 },
867867Key {
868868 key: "plan_mode_reasoning_effort",
869869`instructions` type: "none | minimal | low | medium | high | xhigh",
870870 description:
871871Type / Values "Plan-mode-specific reasoning override. When unset, Plan mode uses its built-in preset default.",
872872 },
873873`string` {
874874 key: "model_reasoning_summary",
875875Details type: "auto | concise | detailed | none",
876876 description:
877877Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. "Select reasoning summary detail or disable summaries entirely.",
878878 },
879879Key {
880880 key: "model_verbosity",
881881`log_dir` type: "low | medium | high",
882882 description:
883883Type / Values "Optional GPT-5 Responses API verbosity override; when unset, the selected model/preset default is used.",
884884 },
885885`string (path)` {
886886 key: "model_supports_reasoning_summaries",
887887Details type: "boolean",
888888 description: "Force Codex to send or not send reasoning metadata.",
889889Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. },
890890 {
891891Key key: "shell_environment_policy.inherit",
892892 type: "all | core | none",
893893`mcp_oauth_callback_port` description:
894894 "Baseline environment inheritance when spawning subprocesses.",
895895Type / Values },
896896 {
897897`integer` key: "shell_environment_policy.ignore_default_excludes",
898898 type: "boolean",
899899Details description:
900900 "Keep variables containing KEY/SECRET/TOKEN before other filters run.",
901901Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. },
902902 {
903903Key key: "shell_environment_policy.exclude",
904904 type: "array<string>",
905905`mcp_oauth_callback_url` description:
906906 "Glob patterns for removing environment variables after the defaults.",
907907Type / Values },
908908 {
909909`string` key: "shell_environment_policy.include_only",
910910 type: "array<string>",
911911Details description:
912912 "Whitelist of patterns; when set only matching variables are kept.",
913913Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port. },
914914 {
915915Key key: "shell_environment_policy.set",
916916 type: "map<string,string>",
917917`mcp_oauth_credentials_store` description:
918918 "Explicit environment overrides injected into every subprocess.",
919919Type / Values },
920920 {
921921`auto | file | keyring` key: "shell_environment_policy.experimental_use_profile",
922922 type: "boolean",
923923Details description: "Use the user shell profile when spawning subprocesses.",
924924 },
925925Preferred store for MCP OAuth credentials. {
926926 key: "project_root_markers",
927927Key type: "array<string>",
928928 description:
929929`mcp_servers.<id>.args` "List of project root marker filenames; used when searching parent directories for the project root.",
930930 },
931931Type / Values {
932932 key: "project_doc_max_bytes",
933933`array<string>` type: "number",
934934 description:
935935Details "Maximum bytes read from `AGENTS.md` when building project instructions.",
936936 },
937937Arguments passed to the MCP stdio server command. {
938938 key: "project_doc_fallback_filenames",
939939Key type: "array<string>",
940940 description: "Additional filenames to try when `AGENTS.md` is missing.",
941941`mcp_servers.<id>.bearer_token_env_var` },
942942 {
943943Type / Values key: "profile",
944944 type: "string",
945945`string` description:
946946 "Default profile applied at startup (equivalent to `--profile`).",
947947Details },
948948 {
949949Environment variable sourcing the bearer token for an MCP HTTP server. key: "profiles.<name>.*",
950950 type: "various",
951951Key description:
952952 "Profile-scoped overrides for any of the supported configuration keys.",
953953`mcp_servers.<id>.command` },
954954 {
955955Type / Values key: "profiles.<name>.service_tier",
956956 type: "string",
957957`string` description: "Profile-scoped service tier preference for new turns.",
958958 },
959959Details {
960960 key: "profiles.<name>.plan_mode_reasoning_effort",
961961Launcher command for an MCP stdio server. type: "none | minimal | low | medium | high | xhigh",
962962 description: "Profile-scoped Plan-mode reasoning override.",
963963Key },
964964 {
965965`mcp_servers.<id>.cwd` key: "profiles.<name>.web_search",
966966 type: "disabled | cached | live",
967967Type / Values description:
968968 'Profile-scoped web search mode override (default: `"cached"`).',
969969`string` },
970970 {
971971Details key: "profiles.<name>.personality",
972972 type: "none | friendly | pragmatic",
973973Working directory for the MCP stdio server process. description:
974974 "Profile-scoped communication style override for supported models.",
975975Key },
976976 {
977977`mcp_servers.<id>.disabled_tools` key: "profiles.<name>.model_catalog_json",
978978 type: "string (path)",
979979Type / Values description:
980980 "Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).",
981981`array<string>` },
982982 {
983983Details key: "profiles.<name>.model_instructions_file",
984984 type: "string (path)",
985985Deny list applied after `enabled_tools` for the MCP server. description:
986986 "Profile-scoped replacement for the built-in instruction file.",
987987Key },
988988 {
989989`mcp_servers.<id>.enabled` key: "profiles.<name>.experimental_use_unified_exec_tool",
990990 type: "boolean",
991991Type / Values description:
992992 "Legacy name for enabling unified exec; prefer `[features].unified_exec`.",
993993`boolean` },
994994 {
995995Details key: "profiles.<name>.oss_provider",
996996 type: "lmstudio | ollama",
997997Disable an MCP server without removing its configuration. description: "Profile-scoped OSS provider for `--oss` sessions.",
998998 },
999999Key {
10001000 key: "profiles.<name>.tools_view_image",
10011001`mcp_servers.<id>.enabled_tools` type: "boolean",
10021002 description: "Enable or disable the `view_image` tool in that profile.",
10031003Type / Values },
10041004 {
10051005`array<string>` key: "profiles.<name>.analytics.enabled",
10061006 type: "boolean",
10071007Details description: "Profile-scoped analytics enablement override.",
10081008 },
10091009Allow list of tool names exposed by the MCP server. {
10101010 key: "profiles.<name>.windows.sandbox",
10111011Key type: "unelevated | elevated",
10121012 description: "Profile-scoped Windows sandbox mode override.",
10131013`mcp_servers.<id>.env` },
10141014 {
10151015Type / Values key: "history.persistence",
10161016 type: "save-all | none",
10171017`map<string,string>` description:
10181018 "Control whether Codex saves session transcripts to history.jsonl.",
10191019Details },
10201020 {
10211021Environment variables forwarded to the MCP stdio server. key: "tool_output_token_limit",
10221022 type: "number",
10231023Key description:
10241024 "Token budget for storing individual tool/function outputs in history.",
10251025`mcp_servers.<id>.env_http_headers` },
10261026 {
10271027Type / Values key: "background_terminal_max_timeout",
10281028 type: "number",
10291029`map<string,string>` description:
10301030 "Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key.",
10311031Details },
10321032 {
10331033HTTP headers populated from environment variables for an MCP HTTP server. key: "history.max_bytes",
10341034 type: "number",
10351035Key description:
10361036 "If set, caps the history file size in bytes by dropping oldest entries.",
10371037`mcp_servers.<id>.env_vars` },
10381038 {
10391039Type / Values key: "file_opener",
10401040 type: "vscode | vscode-insiders | windsurf | cursor | none",
10411041`array<string>` description:
10421042 "URI scheme used to open citations from Codex output (default: `vscode`).",
10431043Details },
10441044 {
10451045Additional environment variables to whitelist for an MCP stdio server. key: "otel.environment",
10461046 type: "string",
10471047Key description:
10481048 "Environment tag applied to emitted OpenTelemetry events (default: `dev`).",
10491049`mcp_servers.<id>.http_headers` },
10501050 {
10511051Type / Values key: "otel.exporter",
10521052 type: "none | otlp-http | otlp-grpc",
10531053`map<string,string>` description:
10541054 "Select the OpenTelemetry exporter and provide any endpoint metadata.",
10551055Details },
10561056 {
10571057Static HTTP headers included with each MCP HTTP request. key: "otel.trace_exporter",
10581058 type: "none | otlp-http | otlp-grpc",
10591059Key description:
10601060 "Select the OpenTelemetry trace exporter and provide any endpoint metadata.",
10611061`mcp_servers.<id>.required` },
10621062 {
10631063Type / Values key: "otel.metrics_exporter",
10641064 type: "none | statsig | otlp-http | otlp-grpc",
10651065`boolean` description:
10661066 "Select the OpenTelemetry metrics exporter (defaults to `statsig`).",
10671067Details },
10681068 {
10691069When true, fail startup/resume if this enabled MCP server cannot initialize. key: "otel.log_user_prompt",
10701070 type: "boolean",
10711071Key description:
10721072 "Opt in to exporting raw user prompts with OpenTelemetry logs.",
10731073`mcp_servers.<id>.startup_timeout_ms` },
10741074 {
10751075Type / Values key: "otel.exporter.<id>.endpoint",
10761076 type: "string",
10771077`number` description: "Exporter endpoint for OTEL logs.",
10781078 },
10791079Details {
10801080 key: "otel.exporter.<id>.protocol",
10811081Alias for `startup_timeout_sec` in milliseconds. type: "binary | json",
10821082 description: "Protocol used by the OTLP/HTTP exporter.",
10831083Key },
10841084 {
10851085`mcp_servers.<id>.startup_timeout_sec` key: "otel.exporter.<id>.headers",
10861086 type: "map<string,string>",
10871087Type / Values description: "Static headers included with OTEL exporter requests.",
10881088 },
10891089`number` {
10901090 key: "otel.trace_exporter.<id>.endpoint",
10911091Details type: "string",
10921092 description: "Trace exporter endpoint for OTEL logs.",
10931093Override the default 10s startup timeout for an MCP server. },
10941094 {
10951095Key key: "otel.trace_exporter.<id>.protocol",
10961096 type: "binary | json",
10971097`mcp_servers.<id>.tool_timeout_sec` description: "Protocol used by the OTLP/HTTP trace exporter.",
10981098 },
10991099Type / Values {
11001100 key: "otel.trace_exporter.<id>.headers",
11011101`number` type: "map<string,string>",
11021102 description: "Static headers included with OTEL trace exporter requests.",
11031103Details },
11041104 {
11051105Override the default 60s per-tool timeout for an MCP server. key: "otel.exporter.<id>.tls.ca-certificate",
11061106 type: "string",
11071107Key description: "CA certificate path for OTEL exporter TLS.",
11081108 },
11091109`mcp_servers.<id>.url` {
11101110 key: "otel.exporter.<id>.tls.client-certificate",
11111111Type / Values type: "string",
11121112 description: "Client certificate path for OTEL exporter TLS.",
11131113`string` },
11141114 {
11151115Details key: "otel.exporter.<id>.tls.client-private-key",
11161116 type: "string",
11171117Endpoint for an MCP streamable HTTP server. description: "Client private key path for OTEL exporter TLS.",
11181118 },
11191119Key {
11201120 key: "otel.trace_exporter.<id>.tls.ca-certificate",
11211121`model` type: "string",
11221122 description: "CA certificate path for OTEL trace exporter TLS.",
11231123Type / Values },
11241124 {
11251125`string` key: "otel.trace_exporter.<id>.tls.client-certificate",
11261126 type: "string",
11271127Details description: "Client certificate path for OTEL trace exporter TLS.",
11281128 },
11291129Model to use (e.g., `gpt-5-codex`). {
11301130 key: "otel.trace_exporter.<id>.tls.client-private-key",
11311131Key type: "string",
11321132 description: "Client private key path for OTEL trace exporter TLS.",
11331133`model_auto_compact_token_limit` },
11341134 {
11351135Type / Values key: "tui",
11361136 type: "table",
11371137`number` description:
11381138 "TUI-specific options such as enabling inline desktop notifications.",
11391139Details },
11401140 {
11411141Token threshold that triggers automatic history compaction (unset uses model defaults). key: "tui.notifications",
11421142 type: "boolean | array<string>",
11431143Key description:
11441144 "Enable TUI notifications; optionally restrict to specific event types.",
11451145`model_catalog_json` },
11461146 {
11471147Type / Values key: "tui.notification_method",
11481148 type: "auto | osc9 | bel",
11491149`string (path)` description:
11501150 "Notification method for terminal notifications (default: auto).",
11511151Details },
11521152 {
11531153Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile. key: "tui.notification_condition",
11541154 type: "unfocused | always",
11551155Key description:
11561156 "Control whether TUI notifications fire only when the terminal is unfocused or regardless of focus. Defaults to `unfocused`.",
11571157`model_context_window` },
11581158 {
11591159Type / Values key: "tui.animations",
11601160 type: "boolean",
11611161`number` description:
11621162 "Enable terminal animations (welcome screen, shimmer, spinner) (default: true).",
11631163Details },
11641164 {
11651165Context window tokens available to the active model. key: "tui.alternate_screen",
11661166 type: "auto | always | never",
11671167Key description:
11681168 "Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).",
11691169`model_instructions_file` },
11701170 {
11711171Type / Values key: "tui.vim_mode_default",
11721172 type: "boolean",
11731173`string (path)` description:
11741174 "Start the composer in Vim normal mode instead of insert mode (default: false). You can still toggle it per session with `/vim`.",
11751175Details },
11761176 {
11771177Replacement for built-in instructions instead of `AGENTS.md`. key: "tui.raw_output_mode",
11781178 type: "boolean",
11791179Key description:
11801180 "Start the TUI in raw scrollback mode for copy-friendly terminal selection (default: false). You can toggle it with `/raw` or the default `alt-r` key binding.",
11811181`model_provider` },
11821182 {
11831183Type / Values key: "tui.show_tooltips",
11841184 type: "boolean",
11851185`string` description:
11861186 "Show onboarding tooltips in the TUI welcome screen (default: true).",
11871187Details },
11881188 {
11891189Provider id from `model_providers` (default: `openai`). key: "tui.status_line",
11901190 type: "array<string> | null",
11911191Key description:
11921192 "Ordered list of TUI footer status-line item identifiers. `null` disables the status line.",
11931193`model_providers.<id>.base_url` },
11941194 {
11951195Type / Values key: "tui.terminal_title",
11961196 type: "array<string> | null",
11971197`string` description:
11981198 'Ordered list of terminal window/tab title item identifiers. Defaults to `["spinner", "project"]`; `null` disables title updates.',
11991199Details },
12001200 {
12011201API base URL for the model provider. key: "tui.theme",
12021202 type: "string",
12031203Key description:
12041204 "Syntax-highlighting theme override (kebab-case theme name).",
12051205`model_providers.<id>.env_http_headers` },
12061206 {
12071207Type / Values key: "tui.keymap.<context>.<action>",
12081208 type: "string | array<string>",
12091209`map<string,string>` description:
12101210 "Keyboard shortcut binding for a TUI action. Supported contexts include `global`, `chat`, `composer`, `editor`, `pager`, `list`, and `approval`; context-specific bindings override `tui.keymap.global`.",
12111211Details },
12121212 {
12131213HTTP headers populated from environment variables when present. key: "tui.keymap.<context>.<action> = []",
12141214 type: "empty array",
12151215Key description:
12161216 "Unbind the action in that keymap context. Key names use normalized strings such as `ctrl-a`, `shift-enter`, `page-down`, or `minus`.",
12171217`model_providers.<id>.env_key` },
12181218 {
12191219Type / Values key: "plugins.<plugin>.mcp_servers.<server>.enabled",
12201220 type: "boolean",
12211221`string` description:
12221222 "Enable or disable an MCP server bundled by an installed plugin without changing the plugin manifest.",
12231223Details },
12241224 {
12251225Environment variable supplying the provider API key. key: "plugins.<plugin>.mcp_servers.<server>.default_tools_approval_mode",
12261226 type: "auto | prompt | approve",
12271227Key description:
12281228 "Default approval behavior for tools on a plugin-provided MCP server.",
12291229`model_providers.<id>.env_key_instructions` },
12301230 {
12311231Type / Values key: "plugins.<plugin>.mcp_servers.<server>.enabled_tools",
12321232 type: "array<string>",
12331233`string` description:
12341234 "Allow list of tools exposed from a plugin-provided MCP server.",
12351235Details },
12361236 {
12371237Optional setup guidance for the provider API key. key: "plugins.<plugin>.mcp_servers.<server>.disabled_tools",
12381238 type: "array<string>",
12391239Key description:
12401240 "Deny list applied after `enabled_tools` for a plugin-provided MCP server.",
12411241`model_providers.<id>.experimental_bearer_token` },
12421242 {
12431243Type / Values key: "plugins.<plugin>.mcp_servers.<server>.tools.<tool>.approval_mode",
12441244 type: "auto | prompt | approve",
12451245`string` description:
12461246 "Per-tool approval behavior override for a plugin-provided MCP tool.",
12471247Details },
12481248 {
12491249Direct bearer token for the provider (discouraged; use `env_key`). key: "tui.model_availability_nux.<model>",
12501250 type: "integer",
12511251Key description: "Internal startup-tooltip state keyed by model slug.",
12521252 },
12531253`model_providers.<id>.http_headers` {
12541254 key: "hide_agent_reasoning",
12551255Type / Values type: "boolean",
12561256 description:
12571257`map<string,string>` "Suppress reasoning events in both the TUI and `codex exec` output.",
12581258 },
12591259Details {
12601260 key: "show_raw_agent_reasoning",
12611261Static HTTP headers added to provider requests. type: "boolean",
12621262 description:
12631263Key "Surface raw reasoning content when the active model emits it.",
12641264 },
12651265`model_providers.<id>.name` {
12661266 key: "disable_paste_burst",
12671267Type / Values type: "boolean",
12681268 description: "Disable burst-paste detection in the TUI.",
12691269`string` },
12701270 {
12711271Details key: "windows_wsl_setup_acknowledged",
12721272 type: "boolean",
12731273Display name for a custom model provider. description: "Track Windows onboarding acknowledgement (Windows only).",
12741274 },
12751275Key {
12761276 key: "chatgpt_base_url",
12771277`model_providers.<id>.query_params` type: "string",
12781278 description: "Override the base URL used during the ChatGPT login flow.",
12791279Type / Values },
12801280 {
12811281`map<string,string>` key: "cli_auth_credentials_store",
12821282 type: "file | keyring | auto",
12831283Details description:
12841284 "Control where the CLI stores cached credentials (file-based auth.json vs OS keychain).",
12851285Extra query parameters appended to provider requests. },
12861286 {
12871287Key key: "mcp_oauth_credentials_store",
12881288 type: "auto | file | keyring",
12891289`model_providers.<id>.request_max_retries` description: "Preferred store for MCP OAuth credentials.",
12901290 },
12911291Type / Values {
12921292 key: "mcp_oauth_callback_port",
12931293`number` type: "integer",
12941294 description:
12951295Details "Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS.",
12961296 },
12971297Retry count for HTTP requests to the provider (default: 4). {
12981298 key: "mcp_oauth_callback_url",
12991299Key type: "string",
13001300 description:
13011301`model_providers.<id>.requires_openai_auth` "Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port.",
13021302 },
13031303Type / Values {
13041304 key: "experimental_use_unified_exec_tool",
13051305`boolean` type: "boolean",
13061306 description:
13071307Details "Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`.",
13081308 },
13091309The provider uses OpenAI authentication (defaults to false). {
13101310 key: "tools.web_search",
13111311Key type: 'boolean | { context_size = "low|medium|high", allowed_domains = [string], location = { country, region, city, timezone } }',
13121312 description:
13131313`model_providers.<id>.stream_idle_timeout_ms` "Optional web search tool configuration. The legacy boolean form is still accepted, but the object form lets you set search context size, allowed domains, and approximate user location.",
13141314 },
13151315Type / Values {
13161316 key: "tools.view_image",
13171317`number` type: "boolean",
13181318 description: "Enable the local-image attachment tool `view_image`.",
13191319Details },
13201320 {
13211321Idle timeout for SSE streams in milliseconds (default: 300000). key: "web_search",
13221322 type: "disabled | cached | live",
13231323Key description:
13241324 'Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.',
13251325`model_providers.<id>.stream_max_retries` },
13261326 {
13271327Type / Values key: "default_permissions",
13281328 type: "string",
13291329`number` description:
13301330 "Name of the default permissions profile to apply to sandboxed tool calls. Built-ins are `:read-only`, `:workspace`, and `:danger-no-sandbox`; custom profile names require matching `[permissions.<name>]` tables.",
13311331Details },
13321332 {
13331333Retry count for SSE streaming interruptions (default: 5). key: "permissions.<name>.filesystem",
13341334 type: "table",
13351335Key description:
13361336 "Named filesystem permission profile. Each key is an absolute path or special token such as `:minimal` or `:project_roots`.",
13371337`model_providers.<id>.wire_api` },
13381338 {
13391339Type / Values key: "permissions.<name>.filesystem.glob_scan_max_depth",
13401340 type: "number",
13411341`chat | responses` description:
13421342 "Maximum depth for expanding deny-read glob patterns on platforms that snapshot matches before sandbox startup. Must be at least `1` when set.",
13431343Details },
13441344 {
13451345Protocol used by the provider (defaults to `chat` if omitted). key: "permissions.<name>.filesystem.<path-or-glob>",
13461346 type: '"read" | "write" | "none" | table',
13471347Key description:
13481348 'Grant direct access for a path, glob pattern, or special token, or scope nested entries under that root. Use `"none"` to deny reads for matching paths.',
13491349`model_reasoning_effort` },
13501350 {
13511351Type / Values key: 'permissions.<name>.filesystem.":project_roots".<subpath-or-glob>',
13521352 type: '"read" | "write" | "none"',
13531353`minimal | low | medium | high | xhigh` description:
13541354 'Scoped filesystem access relative to the detected project roots. Use `"."` for the root itself; glob subpaths such as `"**/*.env"` can deny reads with `"none"`.',
13551355Details },
13561356 {
13571357Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). key: "permissions.<name>.network.enabled",
13581358 type: "boolean",
13591359Key description: "Enable network access for this named permissions profile.",
13601360 },
13611361`model_reasoning_summary` {
13621362 key: "permissions.<name>.network.proxy_url",
13631363Type / Values type: "string",
13641364 description:
13651365`auto | concise | detailed | none` "HTTP listener URL used when this permissions profile enables sandboxed networking.",
13661366 },
13671367Details {
13681368 key: "permissions.<name>.network.enable_socks5",
13691369Select reasoning summary detail or disable summaries entirely. type: "boolean",
13701370 description:
13711371Key "Expose SOCKS5 support when this permissions profile enables sandboxed networking.",
13721372 },
13731373`model_supports_reasoning_summaries` {
13741374 key: "permissions.<name>.network.socks_url",
13751375Type / Values type: "string",
13761376 description: "SOCKS5 proxy endpoint used by this permissions profile.",
13771377`boolean` },
13781378 {
13791379Details key: "permissions.<name>.network.enable_socks5_udp",
13801380 type: "boolean",
13811381Force Codex to send or not send reasoning metadata. description: "Allow UDP over the SOCKS5 listener when enabled.",
13821382 },
13831383Key {
13841384 key: "permissions.<name>.network.allow_upstream_proxy",
13851385`model_verbosity` type: "boolean",
13861386 description:
13871387Type / Values "Allow sandboxed networking to chain through another upstream proxy.",
13881388 },
13891389`low | medium | high` {
13901390 key: "permissions.<name>.network.dangerously_allow_non_loopback_proxy",
13911391Details type: "boolean",
13921392 description:
13931393Control GPT-5 Responses API verbosity (defaults to `medium`). "Permit non-loopback bind addresses for sandboxed networking listeners. Enabling it can expose listeners beyond localhost.",
13941394 },
13951395Key {
13961396 key: "permissions.<name>.network.dangerously_allow_all_unix_sockets",
13971397`notice.hide_full_access_warning` type: "boolean",
13981398 description:
13991399Type / Values "Allow arbitrary Unix socket destinations instead of the default restricted set. Use only in tightly controlled environments.",
14001400 },
14011401`boolean` {
14021402 key: "permissions.<name>.network.domains",
14031403Details type: "map<string, allow | deny>",
14041404 description:
14051405Track acknowledgement of the full access warning prompt. "Domain rules for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules. `deny` wins on conflicts.",
14061406 },
14071407Key {
14081408 key: "permissions.<name>.network.unix_sockets",
14091409`notice.hide_gpt-5.1-codex-max_migration_prompt` type: "map<string, allow | none>",
14101410 description:
14111411Type / Values "Unix socket rules for sandboxed networking. Use socket paths as keys, with `allow` or `none` values.",
14121412 },
14131413`boolean` {
14141414 key: "permissions.<name>.network.allow_local_binding",
14151415Details type: "boolean",
14161416 description:
14171417Track acknowledgement of the gpt-5.1-codex-max migration prompt. "Permit broader local/private-network access through sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",
14181418 },
14191419Key {
14201420 key: "projects.<path>.trust_level",
14211421`notice.hide_gpt5_1_migration_prompt` type: "string",
14221422 description:
14231423Type / Values 'Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers, including project-local config, hooks, and rules.',
14241424 },
14251425`boolean` {
14261426 key: "notice.hide_full_access_warning",
14271427Details type: "boolean",
14281428 description: "Track acknowledgement of the full access warning prompt.",
14291429Track acknowledgement of the GPT-5.1 migration prompt. },
14301430 {
14311431Key key: "notice.hide_world_writable_warning",
14321432 type: "boolean",
14331433`notice.hide_rate_limit_model_nudge` description:
14341434 "Track acknowledgement of the Windows world-writable directories warning.",
14351435Type / Values },
14361436 {
14371437`boolean` key: "notice.hide_rate_limit_model_nudge",
14381438 type: "boolean",
14391439Details description: "Track opt-out of the rate limit model switch reminder.",
14401440 },
14411441Track opt-out of the rate limit model switch reminder. {
14421442 key: "notice.hide_gpt5_1_migration_prompt",
14431443Key type: "boolean",
14441444 description: "Track acknowledgement of the GPT-5.1 migration prompt.",
14451445`notice.hide_world_writable_warning` },
14461446 {
14471447Type / Values key: "notice.hide_gpt-5.1-codex-max_migration_prompt",
14481448 type: "boolean",
14491449`boolean` description:
14501450 "Track acknowledgement of the gpt-5.1-codex-max migration prompt.",
14511451Details },
14521452 {
14531453Track acknowledgement of the Windows world-writable directories warning. key: "notice.model_migrations",
14541454 type: "map<string,string>",
14551455Key description: "Track acknowledged model migrations as old->new mappings.",
14561456 },
14571457`notice.model_migrations` {
14581458 key: "forced_login_method",
14591459Type / Values type: "chatgpt | api",
14601460 description: "Restrict Codex to a specific authentication method.",
14611461`map<string,string>` },
14621462 {
14631463Details key: "forced_chatgpt_workspace_id",
14641464 type: "string (uuid)",
14651465Track acknowledged model migrations as old->new mappings. description: "Limit ChatGPT logins to a specific workspace identifier.",
14661466 },
14671467Key ]}
14681468 client:load
14691469`notify`/>
1470
1471Type / Values
1472
1473`array<string>`
1474
1475Details
1476
1477Command invoked for notifications; receives a JSON payload from Codex.
1478
1479Key
1480
1481`oss_provider`
1482
1483Type / Values
1484
1485`lmstudio | ollama`
1486
1487Details
1488
1489Default local provider used when running with `--oss` (defaults to prompting if unset).
1490
1491Key
1492
1493`otel.environment`
1494
1495Type / Values
1496
1497`string`
1498
1499Details
1500
1501Environment tag applied to emitted OpenTelemetry events (default: `dev`).
1502
1503Key
1504
1505`otel.exporter`
1506
1507Type / Values
1508
1509`none | otlp-http | otlp-grpc`
1510
1511Details
1512
1513Select the OpenTelemetry exporter and provide any endpoint metadata.
1514
1515Key
1516
1517`otel.exporter.<id>.endpoint`
1518
1519Type / Values
1520
1521`string`
1522
1523Details
1524
1525Exporter endpoint for OTEL logs.
1526
1527Key
1528
1529`otel.exporter.<id>.headers`
1530
1531Type / Values
1532
1533`map<string,string>`
1534
1535Details
1536
1537Static headers included with OTEL exporter requests.
1538
1539Key
1540
1541`otel.exporter.<id>.protocol`
1542
1543Type / Values
1544
1545`binary | json`
1546
1547Details
1548
1549Protocol used by the OTLP/HTTP exporter.
1550
1551Key
1552
1553`otel.exporter.<id>.tls.ca-certificate`
1554
1555Type / Values
1556
1557`string`
1558
1559Details
1560
1561CA certificate path for OTEL exporter TLS.
1562
1563Key
1564
1565`otel.exporter.<id>.tls.client-certificate`
1566
1567Type / Values
1568
1569`string`
1570
1571Details
1572
1573Client certificate path for OTEL exporter TLS.
1574
1575Key
1576
1577`otel.exporter.<id>.tls.client-private-key`
1578
1579Type / Values
1580
1581`string`
1582
1583Details
1584
1585Client private key path for OTEL exporter TLS.
1586
1587Key
1588
1589`otel.log_user_prompt`
1590
1591Type / Values
1592
1593`boolean`
1594
1595Details
1596
1597Opt in to exporting raw user prompts with OpenTelemetry logs.
1598
1599Key
1600
1601`otel.trace_exporter`
1602
1603Type / Values
1604
1605`none | otlp-http | otlp-grpc`
1606
1607Details
1608
1609Select the OpenTelemetry trace exporter and provide any endpoint metadata.
1610
1611Key
1612
1613`otel.trace_exporter.<id>.endpoint`
1614
1615Type / Values
1616
1617`string`
1618
1619Details
1620
1621Trace exporter endpoint for OTEL logs.
1622
1623Key
1624
1625`otel.trace_exporter.<id>.headers`
1626
1627Type / Values
1628
1629`map<string,string>`
1630
1631Details
1632
1633Static headers included with OTEL trace exporter requests.
1634
1635Key
1636
1637`otel.trace_exporter.<id>.protocol`
1638
1639Type / Values
1640
1641`binary | json`
1642
1643Details
1644
1645Protocol used by the OTLP/HTTP trace exporter.
1646
1647Key
1648
1649`otel.trace_exporter.<id>.tls.ca-certificate`
1650
1651Type / Values
1652
1653`string`
1654
1655Details
1656
1657CA certificate path for OTEL trace exporter TLS.
1658
1659Key
1660
1661`otel.trace_exporter.<id>.tls.client-certificate`
1662
1663Type / Values
1664
1665`string`
1666
1667Details
1668
1669Client certificate path for OTEL trace exporter TLS.
1670
1671Key
1672
1673`otel.trace_exporter.<id>.tls.client-private-key`
1674
1675Type / Values
1676
1677`string`
1678
1679Details
1680
1681Client private key path for OTEL trace exporter TLS.
1682
1683Key
1684
1685`personality`
1686
1687Type / Values
1688
1689`none | friendly | pragmatic`
1690
1691Details
1692
1693Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.
1694
1695Key
1696
1697`profile`
1698
1699Type / Values
1700
1701`string`
1702
1703Details
1704
1705Default profile applied at startup (equivalent to `--profile`).
1706
1707Key
1708
1709`profiles.<name>.*`
1710
1711Type / Values
1712
1713`various`
1714
1715Details
1716
1717Profile-scoped overrides for any of the supported configuration keys.
1718
1719Key
1720
1721`profiles.<name>.experimental_use_freeform_apply_patch`
1722
1723Type / Values
1724
1725`boolean`
1726
1727Details
1728
1729Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.
1730
1731Key
1732
1733`profiles.<name>.experimental_use_unified_exec_tool`
1734
1735Type / Values
1736
1737`boolean`
1738
1739Details
1740
1741Legacy name for enabling unified exec; prefer `[features].unified_exec`.
1742
1743Key
1744
1745`profiles.<name>.include_apply_patch_tool`
1746
1747Type / Values
1748
1749`boolean`
1750
1751Details
1752
1753Legacy name for enabling freeform apply\_patch; prefer `[features].apply_patch_freeform`.
1754
1755Key
1756
1757`profiles.<name>.model_catalog_json`
1758
1759Type / Values
1760
1761`string (path)`
1762
1763Details
1764
1765Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).
1766
1767Key
1768
1769`profiles.<name>.oss_provider`
1770
1771Type / Values
1772
1773`lmstudio | ollama`
1774
1775Details
1776
1777Profile-scoped OSS provider for `--oss` sessions.
1778
1779Key
1780
1781`profiles.<name>.personality`
1782
1783Type / Values
1784
1785`none | friendly | pragmatic`
1786
1787Details
1788
1789Profile-scoped communication style override for supported models.
1790
1791Key
1792
1793`profiles.<name>.web_search`
1794
1795Type / Values
1796
1797`disabled | cached | live`
1798
1799Details
1800
1801Profile-scoped web search mode override (default: `"cached"`).
1802
1803Key
1804
1805`project_doc_fallback_filenames`
1806
1807Type / Values
1808
1809`array<string>`
1810
1811Details
1812
1813Additional filenames to try when `AGENTS.md` is missing.
1814
1815Key
1816
1817`project_doc_max_bytes`
1818
1819Type / Values
1820
1821`number`
1822
1823Details
1824
1825Maximum bytes read from `AGENTS.md` when building project instructions.
1826
1827Key
1828
1829`project_root_markers`
1830
1831Type / Values
1832
1833`array<string>`
1834
1835Details
1836
1837List of project root marker filenames; used when searching parent directories for the project root.
1838
1839Key
1840
1841`projects.<path>.trust_level`
1842
1843Type / Values
1844
1845`string`
1846
1847Details
1848
1849Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers.
1850
1851Key
1852
1853`review_model`
1854
1855Type / Values
1856
1857`string`
1858
1859Details
1860
1861Optional model override used by `/review` (defaults to the current session model).
1862
1863Key
1864
1865`sandbox_mode`
1866
1867Type / Values
1868
1869`read-only | workspace-write | danger-full-access`
1870
1871Details
1872
1873Sandbox policy for filesystem and network access during command execution.
1874
1875Key
1876
1877`sandbox_workspace_write.exclude_slash_tmp`
1878
1879Type / Values
1880
1881`boolean`
1882
1883Details
1884
1885Exclude `/tmp` from writable roots in workspace-write mode.
1886
1887Key
1888
1889`sandbox_workspace_write.exclude_tmpdir_env_var`
1890
1891Type / Values
1892
1893`boolean`
1894
1895Details
1896
1897Exclude `$TMPDIR` from writable roots in workspace-write mode.
1898
1899Key
1900
1901`sandbox_workspace_write.network_access`
1902
1903Type / Values
1904
1905`boolean`
1906
1907Details
1908
1909Allow outbound network access inside the workspace-write sandbox.
1910
1911Key
1912
1913`sandbox_workspace_write.writable_roots`
1914
1915Type / Values
1916
1917`array<string>`
1918
1919Details
1920
1921Additional writable roots when `sandbox_mode = "workspace-write"`.
1922
1923Key
1924
1925`shell_environment_policy.exclude`
1926
1927Type / Values
1928
1929`array<string>`
1930
1931Details
1932
1933Glob patterns for removing environment variables after the defaults.
1934
1935Key
1936
1937`shell_environment_policy.experimental_use_profile`
1938
1939Type / Values
1940
1941`boolean`
1942
1943Details
1944
1945Use the user shell profile when spawning subprocesses.
1946
1947Key
1948
1949`shell_environment_policy.ignore_default_excludes`
1950
1951Type / Values
1952
1953`boolean`
1954
1955Details
1956
1957Keep variables containing KEY/SECRET/TOKEN before other filters run.
1958
1959Key
1960
1961`shell_environment_policy.include_only`
1962
1963Type / Values
1964
1965`array<string>`
1966
1967Details
1968
1969Whitelist of patterns; when set only matching variables are kept.
1970
1971Key
1972
1973`shell_environment_policy.inherit`
1974
1975Type / Values
1976
1977`all | core | none`
1978
1979Details
1980
1981Baseline environment inheritance when spawning subprocesses.
1982
1983Key
1984
1985`shell_environment_policy.set`
1986
1987Type / Values
1988
1989`map<string,string>`
1990
1991Details
1992
1993Explicit environment overrides injected into every subprocess.
1994
1995Key
1996
1997`show_raw_agent_reasoning`
1998
1999Type / Values
2000
2001`boolean`
2002
2003Details
2004
2005Surface raw reasoning content when the active model emits it.
2006
2007Key
2008
2009`skills.config`
2010
2011Type / Values
2012
2013`array<object>`
2014
2015Details
2016
2017Per-skill enablement overrides stored in config.toml.
2018
2019Key
2020
2021`skills.config.<index>.enabled`
2022
2023Type / Values
2024
2025`boolean`
2026
2027Details
2028
2029Enable or disable the referenced skill.
2030
2031Key
2032
2033`skills.config.<index>.path`
2034
2035Type / Values
2036
2037`string (path)`
2038
2039Details
2040
2041Path to a skill folder containing `SKILL.md`.
2042
2043Key
2044
2045`sqlite_home`
2046
2047Type / Values
2048
2049`string (path)`
2050
2051Details
2052
2053Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state.
2054
2055Key
2056
2057`suppress_unstable_features_warning`
2058
2059Type / Values
2060
2061`boolean`
2062
2063Details
2064
2065Suppress the warning that appears when under-development feature flags are enabled.
2066
2067Key
2068
2069`tool_output_token_limit`
2070
2071Type / Values
2072
2073`number`
2074
2075Details
2076
2077Token budget for storing individual tool/function outputs in history.
2078
2079Key
2080
2081`tools.web_search`
2082
2083Type / Values
2084
2085`boolean`
2086
2087Details
2088
2089Deprecated legacy toggle for web search; prefer the top-level `web_search` setting.
2090
2091Key
2092
2093`tui`
2094
2095Type / Values
2096
2097`table`
2098
2099Details
2100
2101TUI-specific options such as enabling inline desktop notifications.
2102
2103Key
2104
2105`tui.alternate_screen`
2106
2107Type / Values
2108
2109`auto | always | never`
2110
2111Details
2112
2113Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).
2114
2115Key
2116
2117`tui.animations`
2118
2119Type / Values
2120
2121`boolean`
2122
2123Details
2124
2125Enable terminal animations (welcome screen, shimmer, spinner) (default: true).
2126
2127Key
2128
2129`tui.notification_method`
2130
2131Type / Values
2132
2133`auto | osc9 | bel`
2134
2135Details
2136
2137Notification method for unfocused terminal notifications (default: auto).
2138
2139Key
2140
2141`tui.notifications`
2142
2143Type / Values
2144
2145`boolean | array<string>`
2146
2147Details
2148
2149Enable TUI notifications; optionally restrict to specific event types.
2150
2151Key
2152
2153`tui.show_tooltips`
2154
2155Type / Values
2156
2157`boolean`
2158
2159Details
2160
2161Show onboarding tooltips in the TUI welcome screen (default: true).
2162
2163Key
2164
2165`tui.status_line`
2166
2167Type / Values
2168
2169`array<string> | null`
2170
2171Details
2172
2173Ordered list of TUI footer status-line item identifiers. `null` disables the status line.
2174
2175Key
2176
2177`web_search`
2178
2179Type / Values
2180
2181`disabled | cached | live`
2182
2183Details
2184
2185Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.
2186
2187Key
2188
2189`windows_wsl_setup_acknowledged`
2190
2191Type / Values
2192
2193`boolean`
2194
2195Details
2196
2197Track Windows onboarding acknowledgement (Windows only).
2198
2199Key
2200
2201`windows.sandbox`
2202
2203Type / Values
2204
2205`unelevated | elevated`
2206
2207Details
2208
2209Windows-only native sandbox mode when running Codex natively on Windows.
2210
2211Expand to view all
2212 1470
2213You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).1471You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).
2214 1472
2227For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched1485For ChatGPT Business and Enterprise users, Codex can also apply cloud-fetched
2228requirements. See the security page for precedence details.1486requirements. See the security page for precedence details.
2229 1487
22301488| Key | Type / Values | Details |Use `[features]` in `requirements.toml` to pin feature flags by the same
22311489| --- | --- | --- |canonical keys that `config.toml` uses. Omitted keys remain unconstrained.
22321490| `allowed_approval_policies` | `array<string>` | Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `reject`). |
22331491| `allowed_sandbox_modes` | `array<string>` | Allowed values for `sandbox_mode`. |<ConfigTable
22341492| `allowed_web_search_modes` | `array<string>` | Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. | options={[
22351493| `mcp_servers` | `table` | Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. | {
22361494| `mcp_servers.<id>.identity` | `table` | Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). | key: "allowed_approval_policies",
22371495| `mcp_servers.<id>.identity.command` | `string` | Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. | type: "array<string>",
22381496| `mcp_servers.<id>.identity.url` | `string` | Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. | description:
22391497| `rules` | `table` | Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. | "Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `granular`).",
22401498| `rules.prefix_rules` | `array<table>` | List of enforced prefix rules. Each rule must include `pattern` and `decision`. | },
22411499| `rules.prefix_rules[].decision` | `prompt | forbidden` | Required. Requirements rules can only prompt or forbid (not allow). | {
22421500| `rules.prefix_rules[].justification` | `string` | Optional non-empty rationale surfaced in approval prompts or rejection messages. | key: "allowed_approvals_reviewers",
22431501| `rules.prefix_rules[].pattern` | `array<table>` | Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. | type: "array<string>",
22441502| `rules.prefix_rules[].pattern[].any_of` | `array<string>` | A list of allowed alternative tokens at this position. | description:
22451503| `rules.prefix_rules[].pattern[].token` | `string` | A single literal token at this position. | "Allowed values for `approvals_reviewer`, such as `user` and `auto_review`.",
22461504 },
22471505Key {
22481506 key: "guardian_policy_config",
22491507`allowed_approval_policies` type: "string",
22501508 description:
22511509Type / Values "Managed Markdown policy instructions for automatic review. This takes precedence over local `[auto_review].policy`. Blank values are ignored.",
22521510 },
22531511`array<string>` {
22541512 key: "allowed_sandbox_modes",
22551513Details type: "array<string>",
22561514 description: "Allowed values for `sandbox_mode`.",
22571515Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `reject`). },
22581516 {
22591517Key key: "remote_sandbox_config",
22601518 type: "array<table>",
22611519`allowed_sandbox_modes` description:
22621520 "Host-specific sandbox requirements. The first entry whose `hostname_patterns` match the resolved host name overrides top-level `allowed_sandbox_modes` for that requirements source. Host-specific entries currently override sandbox modes only.",
22631521Type / Values },
22641522 {
22651523`array<string>` key: "remote_sandbox_config[].hostname_patterns",
22661524 type: "array<string>",
22671525Details description:
22681526 "Case-insensitive host name patterns. Supports `*` for any sequence of characters and `?` for one character.",
22691527Allowed values for `sandbox_mode`. },
22701528 {
22711529Key key: "remote_sandbox_config[].allowed_sandbox_modes",
22721530 type: "array<string>",
22731531`allowed_web_search_modes` description:
22741532 "Allowed sandbox modes to apply when this host-specific entry matches.",
22751533Type / Values },
22761534 {
22771535`array<string>` key: "allowed_web_search_modes",
22781536 type: "array<string>",
22791537Details description:
22801538 "Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`.",
22811539Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. },
22821540 {
22831541Key key: "features",
22841542 type: "table",
22851543`mcp_servers` description:
22861544 "Pinned feature values keyed by the canonical names from `config.toml`'s `[features]` table.",
22871545Type / Values },
22881546 {
22891547`table` key: "features.<name>",
22901548 type: "boolean",
22911549Details description:
22921550 "Require a specific canonical feature key to stay enabled or disabled.",
22931551Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. },
22941552 {
22951553Key key: "features.in_app_browser",
22961554 type: "boolean",
22971555`mcp_servers.<id>.identity` description:
22981556 "Set to `false` in `requirements.toml` to disable the in-app browser pane.",
22991557Type / Values },
23001558 {
23011559`table` key: "features.browser_use",
23021560 type: "boolean",
23031561Details description:
23041562 "Set to `false` in `requirements.toml` to disable Browser Use and Browser Agent availability.",
23051563Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). },
23061564 {
23071565Key key: "features.computer_use",
23081566 type: "boolean",
23091567`mcp_servers.<id>.identity.command` description:
23101568 "Set to `false` in `requirements.toml` to disable Computer Use availability and related install or enablement flows.",
23111569Type / Values },
23121570 {
23131571`string` key: "experimental_network",
23141572 type: "table",
23151573Details description:
23161574 "Network access requirements enforced from `requirements.toml`. These constraints are separate from `features.network_proxy` and can configure sandboxed networking without the user feature flag.",
23171575Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. },
23181576 {
23191577Key key: "experimental_network.enabled",
23201578 type: "boolean",
23211579`mcp_servers.<id>.identity.url` description:
23221580 "Enable sandboxed networking requirements. This does not grant network access when the active sandbox keeps command networking off.",
23231581Type / Values },
23241582 {
23251583`string` key: "experimental_network.http_port",
23261584 type: "integer",
23271585Details description:
23281586 "Loopback HTTP listener port to use for `[experimental_network]` requirements.",
23291587Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. },
23301588 {
23311589Key key: "experimental_network.socks_port",
23321590 type: "integer",
23331591`rules` description:
23341592 "Loopback SOCKS5 listener port to use for `[experimental_network]` requirements.",
23351593Type / Values },
23361594 {
23371595`table` key: "experimental_network.allow_upstream_proxy",
23381596 type: "boolean",
23391597Details description:
23401598 "Allow sandboxed networking to chain through an upstream proxy from the environment.",
23411599Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. },
23421600 {
23431601Key key: "experimental_network.dangerously_allow_non_loopback_proxy",
23441602 type: "boolean",
23451603`rules.prefix_rules` description:
23461604 "Permit non-loopback listener addresses for `[experimental_network]` requirements. Enabling it can expose listeners beyond localhost.",
23471605Type / Values },
23481606 {
23491607`array<table>` key: "experimental_network.dangerously_allow_all_unix_sockets",
23501608 type: "boolean",
23511609Details description:
23521610 "Permit arbitrary Unix socket destinations instead of allowlist-only access. Use only in tightly controlled environments.",
23531611List of enforced prefix rules. Each rule must include `pattern` and `decision`. },
23541612 {
23551613Key key: "experimental_network.domains",
23561614 type: "map<string, allow | deny>",
23571615`rules.prefix_rules[].decision` description:
23581616 "Map-shaped administrator domain policy for sandboxed networking. Supports exact hosts, `*.example.com` for subdomains only, `**.example.com` for apex plus subdomains, and global `*` allow rules; prefer scoped rules because `*` broadly opens public outbound access. `deny` wins on conflicts. Do not combine this with `experimental_network.allowed_domains` or `experimental_network.denied_domains`.",
23591617Type / Values },
23601618 {
23611619`prompt | forbidden` key: "experimental_network.allowed_domains",
23621620 type: "array<string>",
23631621Details description:
23641622 "List-shaped administrator allow rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",
23651623Required. Requirements rules can only prompt or forbid (not allow). },
23661624 {
23671625Key key: "experimental_network.denied_domains",
23681626 type: "array<string>",
23691627`rules.prefix_rules[].justification` description:
23701628 "List-shaped administrator deny rules for sandboxed networking. Do not combine this with `experimental_network.domains`.",
23711629Type / Values },
23721630 {
23731631`string` key: "experimental_network.managed_allowed_domains_only",
23741632 type: "boolean",
23751633Details description:
23761634 "When `true`, only administrator-managed allow rules remain effective while sandboxed networking requirements are active; user allowlist additions are ignored. Without managed allow rules, user-added domain allow rules do not remain effective.",
23771635Optional non-empty rationale surfaced in approval prompts or rejection messages. },
23781636 {
23791637Key key: "experimental_network.unix_sockets",
23801638 type: "map<string, allow | none>",
23811639`rules.prefix_rules[].pattern` description:
23821640 "Administrator-managed Unix socket policy for sandboxed networking.",
23831641Type / Values },
23841642 {
23851643`array<table>` key: "experimental_network.allow_local_binding",
23861644 type: "boolean",
23871645Details description:
23881646 "Permit broader local/private-network access for sandboxed networking. Exact local IP literal or `localhost` allow rules can still permit specific local targets when this stays `false`.",
23891647Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. },
23901648 {
23911649Key key: "hooks",
23921650 type: "table",
23931651`rules.prefix_rules[].pattern[].any_of` description:
23941652 "Admin-enforced managed lifecycle hooks. Requires a managed hook directory and uses the same event schema as inline `[hooks]` in `config.toml`.",
23951653Type / Values },
23961654 {
23971655`array<string>` key: "hooks.managed_dir",
23981656 type: "string (absolute path)",
23991657Details description:
24001658 "Directory containing managed hook scripts on macOS and Linux. Codex validates that it is absolute and exists before loading managed hooks.",
24011659A list of allowed alternative tokens at this position. },
24021660 {
24031661Key key: "hooks.windows_managed_dir",
24041662 type: "string (absolute path)",
24051663`rules.prefix_rules[].pattern[].token` description:
24061664 "Directory containing managed hook scripts on Windows. Codex validates that it is absolute and exists before loading managed hooks.",
24071665Type / Values },
24081666 {
24091667`string` key: "hooks.<Event>",
24101668 type: "array<table>",
24111669Details description:
24121670 "Matcher groups for a hook event such as `PreToolUse`, `PermissionRequest`, `PostToolUse`, `SessionStart`, `UserPromptSubmit`, or `Stop`.",
24131671A single literal token at this position. },
24141672 {
24151673Expand to view all key: "hooks.<Event>[].hooks",
1674 type: "array<table>",
1675 description:
1676 "Hook handlers for a matcher group. Command hooks are currently supported; prompt and agent hook handlers are parsed but skipped.",
1677 },
1678 {
1679 key: "permissions.filesystem.deny_read",
1680 type: "array<string>",
1681 description:
1682 "Admin-enforced filesystem read denials. Entries can be paths or glob patterns, and users cannot weaken them with local config.",
1683 },
1684 {
1685 key: "mcp_servers",
1686 type: "table",
1687 description:
1688 "Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled.",
1689 },
1690 {
1691 key: "mcp_servers.<id>.identity",
1692 type: "table",
1693 description:
1694 "Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP).",
1695 },
1696 {
1697 key: "mcp_servers.<id>.identity.command",
1698 type: "string",
1699 description:
1700 "Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command.",
1701 },
1702 {
1703 key: "mcp_servers.<id>.identity.url",
1704 type: "string",
1705 description:
1706 "Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL.",
1707 },
1708 {
1709 key: "rules",
1710 type: "table",
1711 description:
1712 "Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive.",
1713 },
1714 {
1715 key: "rules.prefix_rules",
1716 type: "array<table>",
1717 description:
1718 "List of enforced prefix rules. Each rule must include `pattern` and `decision`.",
1719 },
1720 {
1721 key: "rules.prefix_rules[].pattern",
1722 type: "array<table>",
1723 description:
1724 "Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`.",
1725 },
1726 {
1727 key: "rules.prefix_rules[].pattern[].token",
1728 type: "string",
1729 description: "A single literal token at this position.",
1730 },
1731 {
1732 key: "rules.prefix_rules[].pattern[].any_of",
1733 type: "array<string>",
1734 description: "A list of allowed alternative tokens at this position.",
1735 },
1736 {
1737 key: "rules.prefix_rules[].decision",
1738 type: "prompt | forbidden",
1739 description:
1740 "Required. Requirements rules can only prompt or forbid (not allow).",
1741 },
1742 {
1743 key: "rules.prefix_rules[].justification",
1744 type: "string",
1745 description:
1746 "Optional non-empty rationale surfaced in approval prompts or rejection messages.",
1747 },
1748 ]}
1749 client:load
1750/>