config-reference.md +1503 −3323
8 8
9For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/agent-approvals-security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/agent-approvals-security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/agent-approvals-security#network-access).9For sandbox and approval keys (`approval_policy`, `sandbox_mode`, and `sandbox_workspace_write.*`), pair this reference with [Sandbox and approvals](https://developers.openai.com/codex/agent-approvals-security#sandbox-and-approvals), [Protected paths in writable roots](https://developers.openai.com/codex/agent-approvals-security#protected-paths-in-writable-roots), and [Network access](https://developers.openai.com/codex/agent-approvals-security#network-access).
10 10
1111| Key | Type / Values | Details |<ConfigTable
1212| --- | --- | --- | options={[
1313| `agents.<name>.config_file` | `string (path)` | Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. | {
1414| `agents.<name>.description` | `string` | Role guidance shown to Codex when choosing and spawning that agent type. | key: "model",
1515| `agents.<name>.nickname_candidates` | `array<string>` | Optional pool of display nicknames for spawned agents in that role. | type: "string",
1616| `agents.job_max_runtime_seconds` | `number` | Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker. | description: "Model to use (e.g., `gpt-5.5`).",
1717| `agents.max_depth` | `number` | Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1). | },
1818| `agents.max_threads` | `number` | Maximum number of agent threads that can be open concurrently. Defaults to `6` when unset. | {
1919| `allow_login_shell` | `boolean` | Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells. | key: "review_model",
2020| `analytics.enabled` | `boolean` | Enable or disable analytics for this machine/profile. When unset, the client default applies. | type: "string",
2121| `approval_policy` | `untrusted | on-request | never | { granular = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool, request_permissions = bool, skill_approval = bool } }` | Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { granular = { ... } }` to allow or auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. | description:
2222| `approval_policy.granular.mcp_elicitations` | `boolean` | When `true`, MCP elicitation prompts are allowed to surface instead of being auto-rejected. | "Optional model override used by `/review` (defaults to the current session model).",
2323| `approval_policy.granular.request_permissions` | `boolean` | When `true`, prompts from the `request_permissions` tool are allowed to surface. | },
2424| `approval_policy.granular.rules` | `boolean` | When `true`, approvals triggered by execpolicy `prompt` rules are allowed to surface. | {
2525| `approval_policy.granular.sandbox_approval` | `boolean` | When `true`, sandbox escalation approval prompts are allowed to surface. | key: "model_provider",
2626| `approval_policy.granular.skill_approval` | `boolean` | When `true`, skill-script approval prompts are allowed to surface. | type: "string",
2727| `approvals_reviewer` | `user | auto_review` | Who reviews eligible approval prompts under `on-request` or granular approval policies. Defaults to `user`; `auto_review` uses the reviewer subagent. This setting doesn't change sandboxing or review actions already allowed inside the sandbox. | description: "Provider id from `model_providers` (default: `openai`).",
2828| `apps._default.destructive_enabled` | `boolean` | Default allow/deny for app tools with `destructive_hint = true`. | },
2929| `apps._default.enabled` | `boolean` | Default app enabled state for all apps unless overridden per app. | {
3030| `apps._default.open_world_enabled` | `boolean` | Default allow/deny for app tools with `open_world_hint = true`. | key: "openai_base_url",
3131| `apps.<id>.default_tools_approval_mode` | `auto | prompt | approve` | Default approval behavior for tools in this app unless a per-tool override exists. | type: "string",
3232| `apps.<id>.default_tools_enabled` | `boolean` | Default enabled state for tools in this app unless a per-tool override exists. | description:
3333| `apps.<id>.destructive_enabled` | `boolean` | Allow or block tools in this app that advertise `destructive_hint = true`. | "Base URL override for the built-in `openai` model provider.",
3434| `apps.<id>.enabled` | `boolean` | Enable or disable a specific app/connector by id (default: true). | },
3535| `apps.<id>.open_world_enabled` | `boolean` | Allow or block tools in this app that advertise `open_world_hint = true`. | {
3636| `apps.<id>.tools.<tool>.approval_mode` | `auto | prompt | approve` | Per-tool approval behavior override for a single app tool. | key: "model_context_window",
3737| `apps.<id>.tools.<tool>.enabled` | `boolean` | Per-tool enabled override for an app tool (for example `repos/list`). | type: "number",
3838| `auto_review.policy` | `string` | Local Markdown policy instructions for automatic review. Managed `guardian_policy_config` takes precedence. Blank values are ignored. | description: "Context window tokens available to the active model.",
3939| `background_terminal_max_timeout` | `number` | Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key. | },
4040| `chatgpt_base_url` | `string` | Override the base URL used during the ChatGPT login flow. | {
4141| `check_for_update_on_startup` | `boolean` | Check for Codex updates on startup (set to false only when updates are centrally managed). | key: "model_auto_compact_token_limit",
4242| `cli_auth_credentials_store` | `file | keyring | auto` | Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). | type: "number",
4343| `commit_attribution` | `string` | Override the commit co-author trailer text. Set an empty string to disable automatic attribution. | description:
4444| `compact_prompt` | `string` | Inline override for the history compaction prompt. | "Token threshold that triggers automatic history compaction (unset uses model defaults).",
4545| `default_permissions` | `string` | Name of the default permissions profile to apply to sandboxed tool calls. | },
4646| `developer_instructions` | `string` | Additional developer instructions injected into the session (optional). | {
4747| `disable_paste_burst` | `boolean` | Disable burst-paste detection in the TUI. | key: "model_catalog_json",
4848| `experimental_compact_prompt_file` | `string (path)` | Load the compaction prompt override from a file (experimental). | type: "string (path)",
4949| `experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. | description:
5050| `features.apps` | `boolean` | Enable ChatGPT Apps/connectors support (experimental). | "Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile.",
5151| `features.codex_hooks` | `boolean` | Enable lifecycle hooks loaded from `hooks.json` or inline `[hooks]` config. | },
5252| `features.enable_request_compression` | `boolean` | Compress streaming request bodies with zstd when supported (stable; on by default). | {
5353| `features.fast_mode` | `boolean` | Enable Fast mode selection and the `service_tier = "fast"` path (stable; on by default). | key: "oss_provider",
5454| `features.memories` | `boolean` | Enable [Memories](https://developers.openai.com/codex/memories) (off by default). | type: "lmstudio | ollama",
5555| `features.multi_agent` | `boolean` | Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait_agent`, and `close_agent`) (stable; on by default). | description:
5656| `features.personality` | `boolean` | Enable personality selection controls (stable; on by default). | "Default local provider used when running with `--oss` (defaults to prompting if unset).",
5757| `features.prevent_idle_sleep` | `boolean` | Prevent the machine from sleeping while a turn is actively running (experimental; off by default). | },
5858| `features.shell_snapshot` | `boolean` | Snapshot shell environment to speed up repeated commands (stable; on by default). | {
5959| `features.shell_tool` | `boolean` | Enable the default `shell` tool for running commands (stable; on by default). | key: "approval_policy",
6060| `features.skill_mcp_dependency_install` | `boolean` | Allow prompting and installing missing MCP dependencies for skills (stable; on by default). | type: "untrusted | on-request | never | { granular = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool, request_permissions = bool, skill_approval = bool } }",
6161| `features.undo` | `boolean` | Enable undo support (stable; off by default). | description:
6262| `features.unified_exec` | `boolean` | Use the unified PTY-backed exec tool (stable; enabled by default except on Windows). | "Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { granular = { ... } }` to allow or auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs.",
6363| `features.web_search` | `boolean` | Deprecated legacy toggle; prefer the top-level `web_search` setting. | },
6464| `features.web_search_cached` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. | {
6565| `features.web_search_request` | `boolean` | Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. | key: "approval_policy.granular.sandbox_approval",
6666| `feedback.enabled` | `boolean` | Enable feedback submission via `/feedback` across Codex surfaces (default: true). | type: "boolean",
6767| `file_opener` | `vscode | vscode-insiders | windsurf | cursor | none` | URI scheme used to open citations from Codex output (default: `vscode`). | description:
6868| `forced_chatgpt_workspace_id` | `string (uuid)` | Limit ChatGPT logins to a specific workspace identifier. | "When `true`, sandbox escalation approval prompts are allowed to surface.",
6969| `forced_login_method` | `chatgpt | api` | Restrict Codex to a specific authentication method. | },
7070| `hide_agent_reasoning` | `boolean` | Suppress reasoning events in both the TUI and `codex exec` output. | {
7171| `history.max_bytes` | `number` | If set, caps the history file size in bytes by dropping oldest entries. | key: "approval_policy.granular.rules",
7272| `history.persistence` | `save-all | none` | Control whether Codex saves session transcripts to history.jsonl. | type: "boolean",
7373| `hooks` | `table` | Lifecycle hooks configured inline in `config.toml`. Uses the same event schema as `hooks.json`; see the Hooks guide for examples and supported events. | description:
7474| `instructions` | `string` | Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. | "When `true`, approvals triggered by execpolicy `prompt` rules are allowed to surface.",
7575| `log_dir` | `string (path)` | Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. | },
7676| `mcp_oauth_callback_port` | `integer` | Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. | {
7777| `mcp_oauth_callback_url` | `string` | Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port. | key: "approval_policy.granular.mcp_elicitations",
7878| `mcp_oauth_credentials_store` | `auto | file | keyring` | Preferred store for MCP OAuth credentials. | type: "boolean",
7979| `mcp_servers.<id>.args` | `array<string>` | Arguments passed to the MCP stdio server command. | description:
8080| `mcp_servers.<id>.bearer_token_env_var` | `string` | Environment variable sourcing the bearer token for an MCP HTTP server. | "When `true`, MCP elicitation prompts are allowed to surface instead of being auto-rejected.",
8181| `mcp_servers.<id>.command` | `string` | Launcher command for an MCP stdio server. | },
8282| `mcp_servers.<id>.cwd` | `string` | Working directory for the MCP stdio server process. | {
8383| `mcp_servers.<id>.disabled_tools` | `array<string>` | Deny list applied after `enabled_tools` for the MCP server. | key: "approval_policy.granular.request_permissions",
8484| `mcp_servers.<id>.enabled` | `boolean` | Disable an MCP server without removing its configuration. | type: "boolean",
8585| `mcp_servers.<id>.enabled_tools` | `array<string>` | Allow list of tool names exposed by the MCP server. | description:
8686| `mcp_servers.<id>.env` | `map<string,string>` | Environment variables forwarded to the MCP stdio server. | "When `true`, prompts from the `request_permissions` tool are allowed to surface.",
8787| `mcp_servers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables for an MCP HTTP server. | },
8888| `mcp_servers.<id>.env_vars` | `array<string | { name = string, source = "local" | "remote" }>` | Additional environment variables to whitelist for an MCP stdio server. String entries default to `source = "local"`; use `source = "remote"` only with executor-backed remote stdio. | {
8989| `mcp_servers.<id>.experimental_environment` | `local | remote` | Experimental placement for an MCP server. `remote` starts stdio servers through a remote executor environment; streamable HTTP remote placement is not implemented. | key: "approval_policy.granular.skill_approval",
9090| `mcp_servers.<id>.http_headers` | `map<string,string>` | Static HTTP headers included with each MCP HTTP request. | type: "boolean",
9191| `mcp_servers.<id>.oauth_resource` | `string` | Optional RFC 8707 OAuth resource parameter to include during MCP login. | description:
9292| `mcp_servers.<id>.required` | `boolean` | When true, fail startup/resume if this enabled MCP server cannot initialize. | "When `true`, skill-script approval prompts are allowed to surface.",
9393| `mcp_servers.<id>.scopes` | `array<string>` | OAuth scopes to request when authenticating to that MCP server. | },
9494| `mcp_servers.<id>.startup_timeout_ms` | `number` | Alias for `startup_timeout_sec` in milliseconds. | {
9595| `mcp_servers.<id>.startup_timeout_sec` | `number` | Override the default 10s startup timeout for an MCP server. | key: "approvals_reviewer",
9696| `mcp_servers.<id>.tool_timeout_sec` | `number` | Override the default 60s per-tool timeout for an MCP server. | type: "user | auto_review",
9797| `mcp_servers.<id>.url` | `string` | Endpoint for an MCP streamable HTTP server. | description:
9898| `memories.consolidation_model` | `string` | Optional model override for global memory consolidation. | "Who reviews eligible approval prompts under `on-request` or granular approval policies. Defaults to `user`; `auto_review` uses the reviewer subagent. This setting doesn't change sandboxing or review actions already allowed inside the sandbox.",
9999| `memories.disable_on_external_context` | `boolean` | When `true`, threads that use external context such as MCP tool calls, web search, or tool search are kept out of memory generation. Defaults to `false`. Legacy alias: `memories.no_memories_if_mcp_or_web_search`. | },
100100| `memories.extract_model` | `string` | Optional model override for per-thread memory extraction. | {
101101| `memories.generate_memories` | `boolean` | When `false`, newly created threads are not stored as memory-generation inputs. Defaults to `true`. | key: "auto_review.policy",
102102| `memories.max_raw_memories_for_consolidation` | `number` | Maximum recent raw memories retained for global consolidation. Defaults to `256` and is capped at `4096`. | type: "string",
103103| `memories.max_rollout_age_days` | `number` | Maximum age of threads considered for memory generation. Defaults to `30` and is clamped to `0`-`90`. | description:
104104| `memories.max_rollouts_per_startup` | `number` | Maximum rollout candidates processed per startup pass. Defaults to `16` and is capped at `128`. | "Local Markdown policy instructions for automatic review. Managed `guardian_policy_config` takes precedence. Blank values are ignored.",
105105| `memories.max_unused_days` | `number` | Maximum days since a memory was last used before it becomes ineligible for consolidation. Defaults to `30` and is clamped to `0`-`365`. | },
106106| `memories.min_rollout_idle_hours` | `number` | Minimum idle time before a thread is considered for memory generation. Defaults to `6` and is clamped to `1`-`48`. | {
107107| `memories.use_memories` | `boolean` | When `false`, Codex skips injecting existing memories into future sessions. Defaults to `true`. | key: "allow_login_shell",
108108| `model` | `string` | Model to use (e.g., `gpt-5.5`). | type: "boolean",
109109| `model_auto_compact_token_limit` | `number` | Token threshold that triggers automatic history compaction (unset uses model defaults). | description:
110110| `model_catalog_json` | `string (path)` | Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile. | "Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells.",
111111| `model_context_window` | `number` | Context window tokens available to the active model. | },
112112| `model_instructions_file` | `string (path)` | Replacement for built-in instructions instead of `AGENTS.md`. | {
113113| `model_provider` | `string` | Provider id from `model_providers` (default: `openai`). | key: "sandbox_mode",
114114| `model_providers.<id>` | `table` | Custom provider definition. Built-in provider IDs (`openai`, `ollama`, and `lmstudio`) are reserved and cannot be overridden. | type: "read-only | workspace-write | danger-full-access",
115115| `model_providers.<id>.auth` | `table` | Command-backed bearer token configuration for a custom provider. Do not combine with `env_key`, `experimental_bearer_token`, or `requires_openai_auth`. | description:
116116| `model_providers.<id>.auth.args` | `array<string>` | Arguments passed to the token command. | "Sandbox policy for filesystem and network access during command execution.",
117117| `model_providers.<id>.auth.command` | `string` | Command to run when Codex needs a bearer token. The command must print the token to stdout. | },
118118| `model_providers.<id>.auth.cwd` | `string (path)` | Working directory for the token command. | {
119119| `model_providers.<id>.auth.refresh_interval_ms` | `number` | How often Codex proactively refreshes the token in milliseconds (default: 300000). Set to `0` to refresh only after an authentication retry. | key: "sandbox_workspace_write.writable_roots",
120120| `model_providers.<id>.auth.timeout_ms` | `number` | Maximum token command runtime in milliseconds (default: 5000). | type: "array<string>",
121121| `model_providers.<id>.base_url` | `string` | API base URL for the model provider. | description:
122122| `model_providers.<id>.env_http_headers` | `map<string,string>` | HTTP headers populated from environment variables when present. | 'Additional writable roots when `sandbox_mode = "workspace-write"`.',
123123| `model_providers.<id>.env_key` | `string` | Environment variable supplying the provider API key. | },
124124| `model_providers.<id>.env_key_instructions` | `string` | Optional setup guidance for the provider API key. | {
125125| `model_providers.<id>.experimental_bearer_token` | `string` | Direct bearer token for the provider (discouraged; use `env_key`). | key: "sandbox_workspace_write.network_access",
126126| `model_providers.<id>.http_headers` | `map<string,string>` | Static HTTP headers added to provider requests. | type: "boolean",
127127| `model_providers.<id>.name` | `string` | Display name for a custom model provider. | description:
128128| `model_providers.<id>.query_params` | `map<string,string>` | Extra query parameters appended to provider requests. | "Allow outbound network access inside the workspace-write sandbox.",
129129| `model_providers.<id>.request_max_retries` | `number` | Retry count for HTTP requests to the provider (default: 4). | },
130130| `model_providers.<id>.requires_openai_auth` | `boolean` | The provider uses OpenAI authentication (defaults to false). | {
131131| `model_providers.<id>.stream_idle_timeout_ms` | `number` | Idle timeout for SSE streams in milliseconds (default: 300000). | key: "sandbox_workspace_write.exclude_tmpdir_env_var",
132132| `model_providers.<id>.stream_max_retries` | `number` | Retry count for SSE streaming interruptions (default: 5). | type: "boolean",
133133| `model_providers.<id>.supports_websockets` | `boolean` | Whether that provider supports the Responses API WebSocket transport. | description:
134134| `model_providers.<id>.wire_api` | `responses` | Protocol used by the provider. `responses` is the only supported value, and it is the default when omitted. | "Exclude `$TMPDIR` from writable roots in workspace-write mode.",
135135| `model_reasoning_effort` | `minimal | low | medium | high | xhigh` | Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent). | },
136136| `model_reasoning_summary` | `auto | concise | detailed | none` | Select reasoning summary detail or disable summaries entirely. | {
137137| `model_supports_reasoning_summaries` | `boolean` | Force Codex to send or not send reasoning metadata. | key: "sandbox_workspace_write.exclude_slash_tmp",
138138| `model_verbosity` | `low | medium | high` | Optional GPT-5 Responses API verbosity override; when unset, the selected model/preset default is used. | type: "boolean",
139139| `notice.hide_full_access_warning` | `boolean` | Track acknowledgement of the full access warning prompt. | description:
140140| `notice.hide_gpt-5.1-codex-max_migration_prompt` | `boolean` | Track acknowledgement of the gpt-5.1-codex-max migration prompt. | "Exclude `/tmp` from writable roots in workspace-write mode.",
141141| `notice.hide_gpt5_1_migration_prompt` | `boolean` | Track acknowledgement of the GPT-5.1 migration prompt. | },
142142| `notice.hide_rate_limit_model_nudge` | `boolean` | Track opt-out of the rate limit model switch reminder. | {
143143| `notice.hide_world_writable_warning` | `boolean` | Track acknowledgement of the Windows world-writable directories warning. | key: "windows.sandbox",
144144| `notice.model_migrations` | `map<string,string>` | Track acknowledged model migrations as old->new mappings. | type: "unelevated | elevated",
145145| `notify` | `array<string>` | Command invoked for notifications; receives a JSON payload from Codex. | description:
146146| `openai_base_url` | `string` | Base URL override for the built-in `openai` model provider. | "Windows-only native sandbox mode when running Codex natively on Windows.",
147147| `oss_provider` | `lmstudio | ollama` | Default local provider used when running with `--oss` (defaults to prompting if unset). | },
148148| `otel.environment` | `string` | Environment tag applied to emitted OpenTelemetry events (default: `dev`). | {
149149| `otel.exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry exporter and provide any endpoint metadata. | key: "windows.sandbox_private_desktop",
150150| `otel.exporter.<id>.endpoint` | `string` | Exporter endpoint for OTEL logs. | type: "boolean",
151151| `otel.exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL exporter requests. | description:
152152| `otel.exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP exporter. | "Run the final sandboxed child process on a private desktop by default on native Windows. Set `false` only for compatibility with the older `Winsta0\\\\Default` behavior.",
153153| `otel.exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL exporter TLS. | },
154154| `otel.exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL exporter TLS. | {
155155| `otel.exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL exporter TLS. | key: "notify",
156156| `otel.log_user_prompt` | `boolean` | Opt in to exporting raw user prompts with OpenTelemetry logs. | type: "array<string>",
157157| `otel.metrics_exporter` | `none | statsig | otlp-http | otlp-grpc` | Select the OpenTelemetry metrics exporter (defaults to `statsig`). | description:
158158| `otel.trace_exporter` | `none | otlp-http | otlp-grpc` | Select the OpenTelemetry trace exporter and provide any endpoint metadata. | "Command invoked for notifications; receives a JSON payload from Codex.",
159159| `otel.trace_exporter.<id>.endpoint` | `string` | Trace exporter endpoint for OTEL logs. | },
160160| `otel.trace_exporter.<id>.headers` | `map<string,string>` | Static headers included with OTEL trace exporter requests. | {
161161| `otel.trace_exporter.<id>.protocol` | `binary | json` | Protocol used by the OTLP/HTTP trace exporter. | key: "check_for_update_on_startup",
162162| `otel.trace_exporter.<id>.tls.ca-certificate` | `string` | CA certificate path for OTEL trace exporter TLS. | type: "boolean",
163163| `otel.trace_exporter.<id>.tls.client-certificate` | `string` | Client certificate path for OTEL trace exporter TLS. | description:
164164| `otel.trace_exporter.<id>.tls.client-private-key` | `string` | Client private key path for OTEL trace exporter TLS. | "Check for Codex updates on startup (set to false only when updates are centrally managed).",
165165| `permissions.<name>.filesystem` | `table` | Named filesystem permission profile. Each key is an absolute path or special token such as `:minimal` or `:project_roots`. | },
166166| `permissions.<name>.filesystem.":project_roots".<subpath-or-glob>` | `"read" | "write" | "none"` | Scoped filesystem access relative to the detected project roots. Use `"."` for the root itself; glob subpaths such as `"**/*.env"` can deny reads with `"none"`. | {
167167| `permissions.<name>.filesystem.<path-or-glob>` | `"read" | "write" | "none" | table` | Grant direct access for a path, glob pattern, or special token, or scope nested entries under that root. Use `"none"` to deny reads for matching paths. | key: "feedback.enabled",
168168| `permissions.<name>.filesystem.glob_scan_max_depth` | `number` | Maximum depth for expanding deny-read glob patterns on platforms that snapshot matches before sandbox startup. Must be at least `1` when set. | type: "boolean",
169169| `permissions.<name>.network.allow_local_binding` | `boolean` | Permit local bind/listen operations through the managed proxy. | description:
170170| `permissions.<name>.network.allow_upstream_proxy` | `boolean` | Allow the managed proxy to chain to another upstream proxy. | "Enable feedback submission via `/feedback` across Codex surfaces (default: true).",
171171| `permissions.<name>.network.dangerously_allow_all_unix_sockets` | `boolean` | Allow the proxy to use arbitrary Unix sockets instead of the default restricted set. | },
172172| `permissions.<name>.network.dangerously_allow_non_loopback_proxy` | `boolean` | Permit non-loopback bind addresses for the managed proxy listener. | {
173173| `permissions.<name>.network.domains` | `map<string, allow | deny>` | Domain rules for the managed proxy. Use domain names or wildcard patterns as keys, with `allow` or `deny` values. | key: "analytics.enabled",
174174| `permissions.<name>.network.enable_socks5` | `boolean` | Expose a SOCKS5 listener when this permissions profile enables the managed network proxy. | type: "boolean",
175175| `permissions.<name>.network.enable_socks5_udp` | `boolean` | Allow UDP over the SOCKS5 listener when enabled. | description:
176176| `permissions.<name>.network.enabled` | `boolean` | Enable network access for this named permissions profile. | "Enable or disable analytics for this machine/profile. When unset, the client default applies.",
177177| `permissions.<name>.network.mode` | `limited | full` | Network proxy mode used for subprocess traffic. | },
178178| `permissions.<name>.network.proxy_url` | `string` | HTTP proxy endpoint used when this permissions profile enables the managed network proxy. | {
179179| `permissions.<name>.network.socks_url` | `string` | SOCKS5 proxy endpoint used by this permissions profile. | key: "instructions",
180180| `permissions.<name>.network.unix_sockets` | `map<string, allow | none>` | Unix socket rules for the managed proxy. Use socket paths as keys, with `allow` or `none` values. | type: "string",
181181| `personality` | `none | friendly | pragmatic` | Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`. | description:
182182| `plan_mode_reasoning_effort` | `none | minimal | low | medium | high | xhigh` | Plan-mode-specific reasoning override. When unset, Plan mode uses its built-in preset default. | "Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`.",
183183| `profile` | `string` | Default profile applied at startup (equivalent to `--profile`). | },
184184| `profiles.<name>.*` | `various` | Profile-scoped overrides for any of the supported configuration keys. | {
185185| `profiles.<name>.analytics.enabled` | `boolean` | Profile-scoped analytics enablement override. | key: "developer_instructions",
186186| `profiles.<name>.experimental_use_unified_exec_tool` | `boolean` | Legacy name for enabling unified exec; prefer `[features].unified_exec`. | type: "string",
187187| `profiles.<name>.model_catalog_json` | `string (path)` | Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile). | description:
188188| `profiles.<name>.model_instructions_file` | `string (path)` | Profile-scoped replacement for the built-in instruction file. | "Additional developer instructions injected into the session (optional).",
189189| `profiles.<name>.oss_provider` | `lmstudio | ollama` | Profile-scoped OSS provider for `--oss` sessions. | },
190190| `profiles.<name>.personality` | `none | friendly | pragmatic` | Profile-scoped communication style override for supported models. | {
191191| `profiles.<name>.plan_mode_reasoning_effort` | `none | minimal | low | medium | high | xhigh` | Profile-scoped Plan-mode reasoning override. | key: "log_dir",
192192| `profiles.<name>.service_tier` | `flex | fast` | Profile-scoped service tier preference for new turns. | type: "string (path)",
193193| `profiles.<name>.tools_view_image` | `boolean` | Enable or disable the `view_image` tool in that profile. | description:
194194| `profiles.<name>.web_search` | `disabled | cached | live` | Profile-scoped web search mode override (default: `"cached"`). | "Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`.",
195195| `profiles.<name>.windows.sandbox` | `unelevated | elevated` | Profile-scoped Windows sandbox mode override. | },
196196| `project_doc_fallback_filenames` | `array<string>` | Additional filenames to try when `AGENTS.md` is missing. | {
197197| `project_doc_max_bytes` | `number` | Maximum bytes read from `AGENTS.md` when building project instructions. | key: "sqlite_home",
198198| `project_root_markers` | `array<string>` | List of project root marker filenames; used when searching parent directories for the project root. | type: "string (path)",
199199| `projects.<path>.trust_level` | `string` | Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers, including project-local config, hooks, and rules. | description:
200200| `review_model` | `string` | Optional model override used by `/review` (defaults to the current session model). | "Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state.",
201201| `sandbox_mode` | `read-only | workspace-write | danger-full-access` | Sandbox policy for filesystem and network access during command execution. | },
202202| `sandbox_workspace_write.exclude_slash_tmp` | `boolean` | Exclude `/tmp` from writable roots in workspace-write mode. | {
203203| `sandbox_workspace_write.exclude_tmpdir_env_var` | `boolean` | Exclude `$TMPDIR` from writable roots in workspace-write mode. | key: "compact_prompt",
204204| `sandbox_workspace_write.network_access` | `boolean` | Allow outbound network access inside the workspace-write sandbox. | type: "string",
205205| `sandbox_workspace_write.writable_roots` | `array<string>` | Additional writable roots when `sandbox_mode = "workspace-write"`. | description: "Inline override for the history compaction prompt.",
206206| `service_tier` | `flex | fast` | Preferred service tier for new turns. | },
207207| `shell_environment_policy.exclude` | `array<string>` | Glob patterns for removing environment variables after the defaults. | {
208208| `shell_environment_policy.experimental_use_profile` | `boolean` | Use the user shell profile when spawning subprocesses. | key: "commit_attribution",
209209| `shell_environment_policy.ignore_default_excludes` | `boolean` | Keep variables containing KEY/SECRET/TOKEN before other filters run. | type: "string",
210210| `shell_environment_policy.include_only` | `array<string>` | Whitelist of patterns; when set only matching variables are kept. | description:
211211| `shell_environment_policy.inherit` | `all | core | none` | Baseline environment inheritance when spawning subprocesses. | "Override the commit co-author trailer text. Set an empty string to disable automatic attribution.",
212212| `shell_environment_policy.set` | `map<string,string>` | Explicit environment overrides injected into every subprocess. | },
213213| `show_raw_agent_reasoning` | `boolean` | Surface raw reasoning content when the active model emits it. | {
214214| `skills.config` | `array<object>` | Per-skill enablement overrides stored in config.toml. | key: "model_instructions_file",
215215| `skills.config.<index>.enabled` | `boolean` | Enable or disable the referenced skill. | type: "string (path)",
216216| `skills.config.<index>.path` | `string (path)` | Path to a skill folder containing `SKILL.md`. | description:
217217| `sqlite_home` | `string (path)` | Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state. | "Replacement for built-in instructions instead of `AGENTS.md`.",
218218| `suppress_unstable_features_warning` | `boolean` | Suppress the warning that appears when under-development feature flags are enabled. | },
219219| `tool_output_token_limit` | `number` | Token budget for storing individual tool/function outputs in history. | {
220220| `tool_suggest.discoverables` | `array<table>` | Allow tool suggestions for additional discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`. | key: "personality",
221221| `tools.view_image` | `boolean` | Enable the local-image attachment tool `view_image`. | type: "none | friendly | pragmatic",
222222| `tools.web_search` | `boolean | { context_size = "low|medium|high", allowed_domains = [string], location = { country, region, city, timezone } }` | Optional web search tool configuration. The legacy boolean form is still accepted, but the object form lets you set search context size, allowed domains, and approximate user location. | description:
223223| `tui` | `table` | TUI-specific options such as enabling inline desktop notifications. | "Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.",
224224| `tui.alternate_screen` | `auto | always | never` | Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback). | },
225225| `tui.animations` | `boolean` | Enable terminal animations (welcome screen, shimmer, spinner) (default: true). | {
226226| `tui.model_availability_nux.<model>` | `integer` | Internal startup-tooltip state keyed by model slug. | key: "service_tier",
227227| `tui.notification_condition` | `unfocused | always` | Control whether TUI notifications fire only when the terminal is unfocused or regardless of focus. Defaults to `unfocused`. | type: "flex | fast",
228228| `tui.notification_method` | `auto | osc9 | bel` | Notification method for terminal notifications (default: auto). | description: "Preferred service tier for new turns.",
229229| `tui.notifications` | `boolean | array<string>` | Enable TUI notifications; optionally restrict to specific event types. | },
230230| `tui.show_tooltips` | `boolean` | Show onboarding tooltips in the TUI welcome screen (default: true). | {
231231| `tui.status_line` | `array<string> | null` | Ordered list of TUI footer status-line item identifiers. `null` disables the status line. | key: "experimental_compact_prompt_file",
232232| `tui.terminal_title` | `array<string> | null` | Ordered list of terminal window/tab title item identifiers. Defaults to `["spinner", "project"]`; `null` disables title updates. | type: "string (path)",
233233| `tui.theme` | `string` | Syntax-highlighting theme override (kebab-case theme name). | description:
234234| `web_search` | `disabled | cached | live` | Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool. | "Load the compaction prompt override from a file (experimental).",
235235| `windows_wsl_setup_acknowledged` | `boolean` | Track Windows onboarding acknowledgement (Windows only). | },
236236| `windows.sandbox` | `unelevated | elevated` | Windows-only native sandbox mode when running Codex natively on Windows. | {
237237| `windows.sandbox_private_desktop` | `boolean` | Run the final sandboxed child process on a private desktop by default on native Windows. Set `false` only for compatibility with the older `Winsta0\\Default` behavior. | key: "skills.config",
238238 type: "array<object>",
239239Key description: "Per-skill enablement overrides stored in config.toml.",
240240 },
241241`agents.<name>.config_file` {
242242 key: "skills.config.<index>.path",
243243Type / Values type: "string (path)",
244244 description: "Path to a skill folder containing `SKILL.md`.",
245245`string (path)` },
246246 {
247247Details key: "skills.config.<index>.enabled",
248248 type: "boolean",
249249Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role. description: "Enable or disable the referenced skill.",
250250 },
251251Key {
252252 key: "apps.<id>.enabled",
253253`agents.<name>.description` type: "boolean",
254254 description:
255255Type / Values "Enable or disable a specific app/connector by id (default: true).",
256256 },
257257`string` {
258258 key: "apps._default.enabled",
259259Details type: "boolean",
260260 description:
261261Role guidance shown to Codex when choosing and spawning that agent type. "Default app enabled state for all apps unless overridden per app.",
262262 },
263263Key {
264264 key: "apps._default.destructive_enabled",
265265`agents.<name>.nickname_candidates` type: "boolean",
266266 description:
267267Type / Values "Default allow/deny for app tools with `destructive_hint = true`.",
268268 },
269269`array<string>` {
270270 key: "apps._default.open_world_enabled",
271271Details type: "boolean",
272272 description:
273273Optional pool of display nicknames for spawned agents in that role. "Default allow/deny for app tools with `open_world_hint = true`.",
274274 },
275275Key {
276276 key: "apps.<id>.destructive_enabled",
277277`agents.job_max_runtime_seconds` type: "boolean",
278278 description:
279279Type / Values "Allow or block tools in this app that advertise `destructive_hint = true`.",
280280 },
281281`number` {
282282 key: "apps.<id>.open_world_enabled",
283283Details type: "boolean",
284284 description:
285285Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker. "Allow or block tools in this app that advertise `open_world_hint = true`.",
286286 },
287287Key {
288288 key: "apps.<id>.default_tools_enabled",
289289`agents.max_depth` type: "boolean",
290290 description:
291291Type / Values "Default enabled state for tools in this app unless a per-tool override exists.",
292292 },
293293`number` {
294294 key: "apps.<id>.default_tools_approval_mode",
295295Details type: "auto | prompt | approve",
296296 description:
297297Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1). "Default approval behavior for tools in this app unless a per-tool override exists.",
298298 },
299299Key {
300300 key: "apps.<id>.tools.<tool>.enabled",
301301`agents.max_threads` type: "boolean",
302302 description:
303303Type / Values "Per-tool enabled override for an app tool (for example `repos/list`).",
304304 },
305305`number` {
306306 key: "apps.<id>.tools.<tool>.approval_mode",
307307Details type: "auto | prompt | approve",
308308 description: "Per-tool approval behavior override for a single app tool.",
309309Maximum number of agent threads that can be open concurrently. Defaults to `6` when unset. },
310310 {
311311Key key: "tool_suggest.discoverables",
312312 type: "array<table>",
313313`allow_login_shell` description:
314314 'Allow tool suggestions for additional discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
315315Type / Values },
316316 {
317317`boolean` key: "tool_suggest.disabled_tools",
318318 type: "array<table>",
319319Details description:
320320 'Disable suggestions for specific discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.',
321321Allow shell-based tools to use login-shell semantics. Defaults to `true`; when `false`, `login = true` requests are rejected and omitted `login` defaults to non-login shells. },
322322 {
323323Key key: "features.apps",
324324 type: "boolean",
325325`analytics.enabled` description: "Enable ChatGPT Apps/connectors support (experimental).",
326326 },
327327Type / Values {
328328 key: "features.codex_hooks",
329329`boolean` type: "boolean",
330330 description:
331331Details "Enable lifecycle hooks loaded from `hooks.json` or inline `[hooks]` config.",
332332 },
333333Enable or disable analytics for this machine/profile. When unset, the client default applies. {
334334 key: "hooks",
335335Key type: "table",
336336 description:
337337`approval_policy` "Lifecycle hooks configured inline in `config.toml`. Uses the same event schema as `hooks.json`; see the Hooks guide for examples and supported events.",
338338 },
339339Type / Values {
340340 key: "features.memories",
341341`untrusted | on-request | never | { granular = { sandbox_approval = bool, rules = bool, mcp_elicitations = bool, request_permissions = bool, skill_approval = bool } }` type: "boolean",
342342 description: "Enable [Memories](https://developers.openai.com/codex/memories) (off by default).",
343343Details },
344344 {
345345Controls when Codex pauses for approval before executing commands. You can also use `approval_policy = { granular = { ... } }` to allow or auto-reject specific prompt categories while keeping other prompts interactive. `on-failure` is deprecated; use `on-request` for interactive runs or `never` for non-interactive runs. key: "mcp_servers.<id>.command",
346346 type: "string",
347347Key description: "Launcher command for an MCP stdio server.",
348348 },
349349`approval_policy.granular.mcp_elicitations` {
350350 key: "mcp_servers.<id>.args",
351351Type / Values type: "array<string>",
352352 description: "Arguments passed to the MCP stdio server command.",
353353`boolean` },
354354 {
355355Details key: "mcp_servers.<id>.env",
356356 type: "map<string,string>",
357357When `true`, MCP elicitation prompts are allowed to surface instead of being auto-rejected. description: "Environment variables forwarded to the MCP stdio server.",
358358 },
359359Key {
360360 key: "mcp_servers.<id>.env_vars",
361361`approval_policy.granular.request_permissions` type: 'array<string | { name = string, source = "local" | "remote" }>',
362362 description:
363363Type / Values 'Additional environment variables to whitelist for an MCP stdio server. String entries default to `source = "local"`; use `source = "remote"` only with executor-backed remote stdio.',
364364 },
365365`boolean` {
366366 key: "mcp_servers.<id>.cwd",
367367Details type: "string",
368368 description: "Working directory for the MCP stdio server process.",
369369When `true`, prompts from the `request_permissions` tool are allowed to surface. },
370370 {
371371Key key: "mcp_servers.<id>.url",
372372 type: "string",
373373`approval_policy.granular.rules` description: "Endpoint for an MCP streamable HTTP server.",
374374 },
375375Type / Values {
376376 key: "mcp_servers.<id>.bearer_token_env_var",
377377`boolean` type: "string",
378378 description:
379379Details "Environment variable sourcing the bearer token for an MCP HTTP server.",
380380 },
381381When `true`, approvals triggered by execpolicy `prompt` rules are allowed to surface. {
382382 key: "mcp_servers.<id>.http_headers",
383383Key type: "map<string,string>",
384384 description: "Static HTTP headers included with each MCP HTTP request.",
385385`approval_policy.granular.sandbox_approval` },
386386 {
387387Type / Values key: "mcp_servers.<id>.env_http_headers",
388388 type: "map<string,string>",
389389`boolean` description:
390390 "HTTP headers populated from environment variables for an MCP HTTP server.",
391391Details },
392392 {
393393When `true`, sandbox escalation approval prompts are allowed to surface. key: "mcp_servers.<id>.enabled",
394394 type: "boolean",
395395Key description: "Disable an MCP server without removing its configuration.",
396396 },
397397`approval_policy.granular.skill_approval` {
398398 key: "mcp_servers.<id>.required",
399399Type / Values type: "boolean",
400400 description:
401401`boolean` "When true, fail startup/resume if this enabled MCP server cannot initialize.",
402402 },
403403Details {
404404 key: "mcp_servers.<id>.startup_timeout_sec",
405405When `true`, skill-script approval prompts are allowed to surface. type: "number",
406406 description:
407407Key "Override the default 10s startup timeout for an MCP server.",
408408 },
409409`approvals_reviewer` {
410410 key: "mcp_servers.<id>.startup_timeout_ms",
411411Type / Values type: "number",
412412 description: "Alias for `startup_timeout_sec` in milliseconds.",
413413`user | auto_review` },
414414 {
415415Details key: "mcp_servers.<id>.tool_timeout_sec",
416416 type: "number",
417417Who reviews eligible approval prompts under `on-request` or granular approval policies. Defaults to `user`; `auto_review` uses the reviewer subagent. This setting doesn't change sandboxing or review actions already allowed inside the sandbox. description:
418418 "Override the default 60s per-tool timeout for an MCP server.",
419419Key },
420420 {
421421`apps._default.destructive_enabled` key: "mcp_servers.<id>.enabled_tools",
422422 type: "array<string>",
423423Type / Values description: "Allow list of tool names exposed by the MCP server.",
424424 },
425425`boolean` {
426426 key: "mcp_servers.<id>.disabled_tools",
427427Details type: "array<string>",
428428 description:
429429Default allow/deny for app tools with `destructive_hint = true`. "Deny list applied after `enabled_tools` for the MCP server.",
430430 },
431431Key {
432432 key: "mcp_servers.<id>.scopes",
433433`apps._default.enabled` type: "array<string>",
434434 description:
435435Type / Values "OAuth scopes to request when authenticating to that MCP server.",
436436 },
437437`boolean` {
438438 key: "mcp_servers.<id>.oauth_resource",
439439Details type: "string",
440440 description:
441441Default app enabled state for all apps unless overridden per app. "Optional RFC 8707 OAuth resource parameter to include during MCP login.",
442442 },
443443Key {
444444 key: "mcp_servers.<id>.experimental_environment",
445445`apps._default.open_world_enabled` type: "local | remote",
446446 description:
447447Type / Values "Experimental placement for an MCP server. `remote` starts stdio servers through a remote executor environment; streamable HTTP remote placement is not implemented.",
448448 },
449449`boolean` {
450450 key: "agents.max_threads",
451451Details type: "number",
452452 description:
453453Default allow/deny for app tools with `open_world_hint = true`. "Maximum number of agent threads that can be open concurrently. Defaults to `6` when unset.",
454454 },
455455Key {
456456 key: "agents.max_depth",
457457`apps.<id>.default_tools_approval_mode` type: "number",
458458 description:
459459Type / Values "Maximum nesting depth allowed for spawned agent threads (root sessions start at depth 0; default: 1).",
460460 },
461461`auto | prompt | approve` {
462462 key: "agents.job_max_runtime_seconds",
463463Details type: "number",
464464 description:
465465Default approval behavior for tools in this app unless a per-tool override exists. "Default per-worker timeout for `spawn_agents_on_csv` jobs. When unset, the tool falls back to 1800 seconds per worker.",
466466 },
467467Key {
468468 key: "agents.<name>.description",
469469`apps.<id>.default_tools_enabled` type: "string",
470470 description:
471471Type / Values "Role guidance shown to Codex when choosing and spawning that agent type.",
472472 },
473473`boolean` {
474474 key: "agents.<name>.config_file",
475475Details type: "string (path)",
476476 description:
477477Default enabled state for tools in this app unless a per-tool override exists. "Path to a TOML config layer for that role; relative paths resolve from the config file that declares the role.",
478478 },
479479Key {
480480 key: "agents.<name>.nickname_candidates",
481481`apps.<id>.destructive_enabled` type: "array<string>",
482482 description:
483483Type / Values "Optional pool of display nicknames for spawned agents in that role.",
484484 },
485485`boolean` {
486486 key: "memories.generate_memories",
487487Details type: "boolean",
488488 description:
489489Allow or block tools in this app that advertise `destructive_hint = true`. "When `false`, newly created threads are not stored as memory-generation inputs. Defaults to `true`.",
490490 },
491491Key {
492492 key: "memories.use_memories",
493493`apps.<id>.enabled` type: "boolean",
494494 description:
495495Type / Values "When `false`, Codex skips injecting existing memories into future sessions. Defaults to `true`.",
496496 },
497497`boolean` {
498498 key: "memories.disable_on_external_context",
499499Details type: "boolean",
500500 description:
501501Enable or disable a specific app/connector by id (default: true). "When `true`, threads that use external context such as MCP tool calls, web search, or tool search are kept out of memory generation. Defaults to `false`. Legacy alias: `memories.no_memories_if_mcp_or_web_search`.",
502502 },
503503Key {
504504 key: "memories.max_raw_memories_for_consolidation",
505505`apps.<id>.open_world_enabled` type: "number",
506506 description:
507507Type / Values "Maximum recent raw memories retained for global consolidation. Defaults to `256` and is capped at `4096`.",
508508 },
509509`boolean` {
510510 key: "memories.max_unused_days",
511511Details type: "number",
512512 description:
513513Allow or block tools in this app that advertise `open_world_hint = true`. "Maximum days since a memory was last used before it becomes ineligible for consolidation. Defaults to `30` and is clamped to `0`-`365`.",
514514 },
515515Key {
516516 key: "memories.max_rollout_age_days",
517517`apps.<id>.tools.<tool>.approval_mode` type: "number",
518518 description:
519519Type / Values "Maximum age of threads considered for memory generation. Defaults to `30` and is clamped to `0`-`90`.",
520520 },
521521`auto | prompt | approve` {
522522 key: "memories.max_rollouts_per_startup",
523523Details type: "number",
524524 description:
525525Per-tool approval behavior override for a single app tool. "Maximum rollout candidates processed per startup pass. Defaults to `16` and is capped at `128`.",
526526 },
527527Key {
528528 key: "memories.min_rollout_idle_hours",
529529`apps.<id>.tools.<tool>.enabled` type: "number",
530530 description:
531531Type / Values "Minimum idle time before a thread is considered for memory generation. Defaults to `6` and is clamped to `1`-`48`.",
532532 },
533533`boolean` {
534534 key: "memories.min_rate_limit_remaining_percent",
535535Details type: "number",
536536 description:
537537Per-tool enabled override for an app tool (for example `repos/list`). "Minimum remaining percentage required in Codex rate-limit windows before memory generation starts. Defaults to `25` and is clamped to `0`-`100`.",
538538 },
539539Key {
540540 key: "memories.extract_model",
541541`auto_review.policy` type: "string",
542542 description: "Optional model override for per-thread memory extraction.",
543543Type / Values },
544544 {
545545`string` key: "memories.consolidation_model",
546546 type: "string",
547547Details description: "Optional model override for global memory consolidation.",
548548 },
549549Local Markdown policy instructions for automatic review. Managed `guardian_policy_config` takes precedence. Blank values are ignored. {
550550 key: "features.unified_exec",
551551Key type: "boolean",
552552 description:
553553`background_terminal_max_timeout` "Use the unified PTY-backed exec tool (stable; enabled by default except on Windows).",
554554 },
555555Type / Values {
556556 key: "features.shell_snapshot",
557557`number` type: "boolean",
558558 description:
559559Details "Snapshot shell environment to speed up repeated commands (stable; on by default).",
560560 },
561561Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key. {
562562 key: "features.undo",
563563Key type: "boolean",
564564 description: "Enable undo support (stable; off by default).",
565565`chatgpt_base_url` },
566566 {
567567Type / Values key: "features.multi_agent",
568568 type: "boolean",
569569`string` description:
570570 "Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait_agent`, and `close_agent`) (stable; on by default).",
571571Details },
572572 {
573573Override the base URL used during the ChatGPT login flow. key: "features.personality",
574574 type: "boolean",
575575Key description:
576576 "Enable personality selection controls (stable; on by default).",
577577`check_for_update_on_startup` },
578578 {
579579Type / Values key: "features.web_search",
580580 type: "boolean",
581581`boolean` description:
582582 "Deprecated legacy toggle; prefer the top-level `web_search` setting.",
583583Details },
584584 {
585585Check for Codex updates on startup (set to false only when updates are centrally managed). key: "features.web_search_cached",
586586 type: "boolean",
587587Key description:
588588 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`.',
589589`cli_auth_credentials_store` },
590590 {
591591Type / Values key: "features.web_search_request",
592592 type: "boolean",
593593`file | keyring | auto` description:
594594 'Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`.',
595595Details },
596596 {
597597Control where the CLI stores cached credentials (file-based auth.json vs OS keychain). key: "features.shell_tool",
598598 type: "boolean",
599599Key description:
600600 "Enable the default `shell` tool for running commands (stable; on by default).",
601601`commit_attribution` },
602602 {
603603Type / Values key: "features.enable_request_compression",
604604 type: "boolean",
605605`string` description:
606606 "Compress streaming request bodies with zstd when supported (stable; on by default).",
607607Details },
608608 {
609609Override the commit co-author trailer text. Set an empty string to disable automatic attribution. key: "features.skill_mcp_dependency_install",
610610 type: "boolean",
611611Key description:
612612 "Allow prompting and installing missing MCP dependencies for skills (stable; on by default).",
613613`compact_prompt` },
614614 {
615615Type / Values key: "features.fast_mode",
616616 type: "boolean",
617617`string` description:
618618 'Enable Fast mode selection and the `service_tier = "fast"` path (stable; on by default).',
619619Details },
620620 {
621621Inline override for the history compaction prompt. key: "features.prevent_idle_sleep",
622622 type: "boolean",
623623Key description:
624624 "Prevent the machine from sleeping while a turn is actively running (experimental; off by default).",
625625`default_permissions` },
626626 {
627627Type / Values key: "suppress_unstable_features_warning",
628628 type: "boolean",
629629`string` description:
630630 "Suppress the warning that appears when under-development feature flags are enabled.",
631631Details },
632632 {
633633Name of the default permissions profile to apply to sandboxed tool calls. key: "model_providers.<id>",
634634 type: "table",
635635Key description:
636636 "Custom provider definition. Built-in provider IDs (`openai`, `ollama`, and `lmstudio`) are reserved and cannot be overridden.",
637637`developer_instructions` },
638638 {
639639Type / Values key: "model_providers.<id>.name",
640640 type: "string",
641641`string` description: "Display name for a custom model provider.",
642642 },
643643Details {
644644 key: "model_providers.<id>.base_url",
645645Additional developer instructions injected into the session (optional). type: "string",
646646 description: "API base URL for the model provider.",
647647Key },
648648 {
649649`disable_paste_burst` key: "model_providers.<id>.env_key",
650650 type: "string",
651651Type / Values description: "Environment variable supplying the provider API key.",
652652 },
653653`boolean` {
654654 key: "model_providers.<id>.env_key_instructions",
655655Details type: "string",
656656 description: "Optional setup guidance for the provider API key.",
657657Disable burst-paste detection in the TUI. },
658658 {
659659Key key: "model_providers.<id>.experimental_bearer_token",
660660 type: "string",
661661`experimental_compact_prompt_file` description:
662662 "Direct bearer token for the provider (discouraged; use `env_key`).",
663663Type / Values },
664664 {
665665`string (path)` key: "model_providers.<id>.requires_openai_auth",
666666 type: "boolean",
667667Details description:
668668 "The provider uses OpenAI authentication (defaults to false).",
669669Load the compaction prompt override from a file (experimental). },
670670 {
671671Key key: "model_providers.<id>.wire_api",
672672 type: "responses",
673673`experimental_use_unified_exec_tool` description:
674674 "Protocol used by the provider. `responses` is the only supported value, and it is the default when omitted.",
675675Type / Values },
676676 {
677677`boolean` key: "model_providers.<id>.query_params",
678678 type: "map<string,string>",
679679Details description: "Extra query parameters appended to provider requests.",
680680 },
681681Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`. {
682682 key: "model_providers.<id>.http_headers",
683683Key type: "map<string,string>",
684684 description: "Static HTTP headers added to provider requests.",
685685`features.apps` },
686686 {
687687Type / Values key: "model_providers.<id>.env_http_headers",
688688 type: "map<string,string>",
689689`boolean` description:
690690 "HTTP headers populated from environment variables when present.",
691691Details },
692692 {
693693Enable ChatGPT Apps/connectors support (experimental). key: "model_providers.<id>.request_max_retries",
694694 type: "number",
695695Key description:
696696 "Retry count for HTTP requests to the provider (default: 4).",
697697`features.codex_hooks` },
698698 {
699699Type / Values key: "model_providers.<id>.stream_max_retries",
700700 type: "number",
701701`boolean` description: "Retry count for SSE streaming interruptions (default: 5).",
702702 },
703703Details {
704704 key: "model_providers.<id>.stream_idle_timeout_ms",
705705Enable lifecycle hooks loaded from `hooks.json` or inline `[hooks]` config. type: "number",
706706 description:
707707Key "Idle timeout for SSE streams in milliseconds (default: 300000).",
708708 },
709709`features.enable_request_compression` {
710710 key: "model_providers.<id>.supports_websockets",
711711Type / Values type: "boolean",
712712 description:
713713`boolean` "Whether that provider supports the Responses API WebSocket transport.",
714714 },
715715Details {
716716 key: "model_providers.<id>.auth",
717717Compress streaming request bodies with zstd when supported (stable; on by default). type: "table",
718718 description:
719719Key "Command-backed bearer token configuration for a custom provider. Do not combine with `env_key`, `experimental_bearer_token`, or `requires_openai_auth`.",
720720 },
721721`features.fast_mode` {
722722 key: "model_providers.<id>.auth.command",
723723Type / Values type: "string",
724724 description:
725725`boolean` "Command to run when Codex needs a bearer token. The command must print the token to stdout.",
726726 },
727727Details {
728728 key: "model_providers.<id>.auth.args",
729729Enable Fast mode selection and the `service_tier = "fast"` path (stable; on by default). type: "array<string>",
730730 description: "Arguments passed to the token command.",
731731Key },
732732 {
733733`features.memories` key: "model_providers.<id>.auth.timeout_ms",
734734 type: "number",
735735Type / Values description:
736736 "Maximum token command runtime in milliseconds (default: 5000).",
737737`boolean` },
738738 {
739739Details key: "model_providers.<id>.auth.refresh_interval_ms",
740740 type: "number",
741741Enable [Memories](https://developers.openai.com/codex/memories) (off by default). description:
742742 "How often Codex proactively refreshes the token in milliseconds (default: 300000). Set to `0` to refresh only after an authentication retry.",
743743Key },
744744 {
745745`features.multi_agent` key: "model_providers.<id>.auth.cwd",
746746 type: "string (path)",
747747Type / Values description: "Working directory for the token command.",
748748 },
749749`boolean` {
750750 key: "model_providers.amazon-bedrock.aws.profile",
751751Details type: "string",
752752 description:
753753Enable multi-agent collaboration tools (`spawn_agent`, `send_input`, `resume_agent`, `wait_agent`, and `close_agent`) (stable; on by default). "AWS profile name used by the built-in `amazon-bedrock` provider.",
754754 },
755755Key {
756756 key: "model_providers.amazon-bedrock.aws.region",
757757`features.personality` type: "string",
758758 description: "AWS region used by the built-in `amazon-bedrock` provider.",
759759Type / Values },
760760 {
761761`boolean` key: "model_reasoning_effort",
762762 type: "minimal | low | medium | high | xhigh",
763763Details description:
764764 "Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent).",
765765Enable personality selection controls (stable; on by default). },
766766 {
767767Key key: "plan_mode_reasoning_effort",
768768 type: "none | minimal | low | medium | high | xhigh",
769769`features.prevent_idle_sleep` description:
770770 "Plan-mode-specific reasoning override. When unset, Plan mode uses its built-in preset default.",
771771Type / Values },
772772 {
773773`boolean` key: "model_reasoning_summary",
774774 type: "auto | concise | detailed | none",
775775Details description:
776776 "Select reasoning summary detail or disable summaries entirely.",
777777Prevent the machine from sleeping while a turn is actively running (experimental; off by default). },
778778 {
779779Key key: "model_verbosity",
780780 type: "low | medium | high",
781781`features.shell_snapshot` description:
782782 "Optional GPT-5 Responses API verbosity override; when unset, the selected model/preset default is used.",
783783Type / Values },
784784 {
785785`boolean` key: "model_supports_reasoning_summaries",
786786 type: "boolean",
787787Details description: "Force Codex to send or not send reasoning metadata.",
788788 },
789789Snapshot shell environment to speed up repeated commands (stable; on by default). {
790790 key: "shell_environment_policy.inherit",
791791Key type: "all | core | none",
792792 description:
793793`features.shell_tool` "Baseline environment inheritance when spawning subprocesses.",
794794 },
795795Type / Values {
796796 key: "shell_environment_policy.ignore_default_excludes",
797797`boolean` type: "boolean",
798798 description:
799799Details "Keep variables containing KEY/SECRET/TOKEN before other filters run.",
800800 },
801801Enable the default `shell` tool for running commands (stable; on by default). {
802802 key: "shell_environment_policy.exclude",
803803Key type: "array<string>",
804804 description:
805805`features.skill_mcp_dependency_install` "Glob patterns for removing environment variables after the defaults.",
806806 },
807807Type / Values {
808808 key: "shell_environment_policy.include_only",
809809`boolean` type: "array<string>",
810810 description:
811811Details "Whitelist of patterns; when set only matching variables are kept.",
812812 },
813813Allow prompting and installing missing MCP dependencies for skills (stable; on by default). {
814814 key: "shell_environment_policy.set",
815815Key type: "map<string,string>",
816816 description:
817817`features.undo` "Explicit environment overrides injected into every subprocess.",
818818 },
819819Type / Values {
820820 key: "shell_environment_policy.experimental_use_profile",
821821`boolean` type: "boolean",
822822 description: "Use the user shell profile when spawning subprocesses.",
823823Details },
824824 {
825825Enable undo support (stable; off by default). key: "project_root_markers",
826826 type: "array<string>",
827827Key description:
828828 "List of project root marker filenames; used when searching parent directories for the project root.",
829829`features.unified_exec` },
830830 {
831831Type / Values key: "project_doc_max_bytes",
832832 type: "number",
833833`boolean` description:
834834 "Maximum bytes read from `AGENTS.md` when building project instructions.",
835835Details },
836836 {
837837Use the unified PTY-backed exec tool (stable; enabled by default except on Windows). key: "project_doc_fallback_filenames",
838838 type: "array<string>",
839839Key description: "Additional filenames to try when `AGENTS.md` is missing.",
840840 },
841841`features.web_search` {
842842 key: "profile",
843843Type / Values type: "string",
844844 description:
845845`boolean` "Default profile applied at startup (equivalent to `--profile`).",
846846 },
847847Details {
848848 key: "profiles.<name>.*",
849849Deprecated legacy toggle; prefer the top-level `web_search` setting. type: "various",
850850 description:
851851Key "Profile-scoped overrides for any of the supported configuration keys.",
852852 },
853853`features.web_search_cached` {
854854 key: "profiles.<name>.service_tier",
855855Type / Values type: "flex | fast",
856856 description: "Profile-scoped service tier preference for new turns.",
857857`boolean` },
858858 {
859859Details key: "profiles.<name>.plan_mode_reasoning_effort",
860860 type: "none | minimal | low | medium | high | xhigh",
861861Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "cached"`. description: "Profile-scoped Plan-mode reasoning override.",
862862 },
863863Key {
864864 key: "profiles.<name>.web_search",
865865`features.web_search_request` type: "disabled | cached | live",
866866 description:
867867Type / Values 'Profile-scoped web search mode override (default: `"cached"`).',
868868 },
869869`boolean` {
870870 key: "profiles.<name>.personality",
871871Details type: "none | friendly | pragmatic",
872872 description:
873873Deprecated legacy toggle. When `web_search` is unset, true maps to `web_search = "live"`. "Profile-scoped communication style override for supported models.",
874874 },
875875Key {
876876 key: "profiles.<name>.model_catalog_json",
877877`feedback.enabled` type: "string (path)",
878878 description:
879879Type / Values "Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).",
880880 },
881881`boolean` {
882882 key: "profiles.<name>.model_instructions_file",
883883Details type: "string (path)",
884884 description:
885885Enable feedback submission via `/feedback` across Codex surfaces (default: true). "Profile-scoped replacement for the built-in instruction file.",
886886 },
887887Key {
888888 key: "profiles.<name>.experimental_use_unified_exec_tool",
889889`file_opener` type: "boolean",
890890 description:
891891Type / Values "Legacy name for enabling unified exec; prefer `[features].unified_exec`.",
892892 },
893893`vscode | vscode-insiders | windsurf | cursor | none` {
894894 key: "profiles.<name>.oss_provider",
895895Details type: "lmstudio | ollama",
896896 description: "Profile-scoped OSS provider for `--oss` sessions.",
897897URI scheme used to open citations from Codex output (default: `vscode`). },
898898 {
899899Key key: "profiles.<name>.tools_view_image",
900900 type: "boolean",
901901`forced_chatgpt_workspace_id` description: "Enable or disable the `view_image` tool in that profile.",
902902 },
903903Type / Values {
904904 key: "profiles.<name>.analytics.enabled",
905905`string (uuid)` type: "boolean",
906906 description: "Profile-scoped analytics enablement override.",
907907Details },
908908 {
909909Limit ChatGPT logins to a specific workspace identifier. key: "profiles.<name>.windows.sandbox",
910910 type: "unelevated | elevated",
911911Key description: "Profile-scoped Windows sandbox mode override.",
912912 },
913913`forced_login_method` {
914914 key: "history.persistence",
915915Type / Values type: "save-all | none",
916916 description:
917917`chatgpt | api` "Control whether Codex saves session transcripts to history.jsonl.",
918918 },
919919Details {
920920 key: "tool_output_token_limit",
921921Restrict Codex to a specific authentication method. type: "number",
922922 description:
923923Key "Token budget for storing individual tool/function outputs in history.",
924924 },
925925`hide_agent_reasoning` {
926926 key: "background_terminal_max_timeout",
927927Type / Values type: "number",
928928 description:
929929`boolean` "Maximum poll window in milliseconds for empty `write_stdin` polls (background terminal polling). Default: `300000` (5 minutes). Replaces the older `background_terminal_timeout` key.",
930930 },
931931Details {
932932 key: "history.max_bytes",
933933Suppress reasoning events in both the TUI and `codex exec` output. type: "number",
934934 description:
935935Key "If set, caps the history file size in bytes by dropping oldest entries.",
936936 },
937937`history.max_bytes` {
938938 key: "file_opener",
939939Type / Values type: "vscode | vscode-insiders | windsurf | cursor | none",
940940 description:
941941`number` "URI scheme used to open citations from Codex output (default: `vscode`).",
942942 },
943943Details {
944944 key: "otel.environment",
945945If set, caps the history file size in bytes by dropping oldest entries. type: "string",
946946 description:
947947Key "Environment tag applied to emitted OpenTelemetry events (default: `dev`).",
948948 },
949949`history.persistence` {
950950 key: "otel.exporter",
951951Type / Values type: "none | otlp-http | otlp-grpc",
952952 description:
953953`save-all | none` "Select the OpenTelemetry exporter and provide any endpoint metadata.",
954954 },
955955Details {
956956 key: "otel.trace_exporter",
957957Control whether Codex saves session transcripts to history.jsonl. type: "none | otlp-http | otlp-grpc",
958958 description:
959959Key "Select the OpenTelemetry trace exporter and provide any endpoint metadata.",
960960 },
961961`hooks` {
962962 key: "otel.metrics_exporter",
963963Type / Values type: "none | statsig | otlp-http | otlp-grpc",
964964 description:
965965`table` "Select the OpenTelemetry metrics exporter (defaults to `statsig`).",
966966 },
967967Details {
968968 key: "otel.log_user_prompt",
969969Lifecycle hooks configured inline in `config.toml`. Uses the same event schema as `hooks.json`; see the Hooks guide for examples and supported events. type: "boolean",
970970 description:
971971Key "Opt in to exporting raw user prompts with OpenTelemetry logs.",
972972 },
973973`instructions` {
974974 key: "otel.exporter.<id>.endpoint",
975975Type / Values type: "string",
976976 description: "Exporter endpoint for OTEL logs.",
977977`string` },
978978 {
979979Details key: "otel.exporter.<id>.protocol",
980980 type: "binary | json",
981981Reserved for future use; prefer `model_instructions_file` or `AGENTS.md`. description: "Protocol used by the OTLP/HTTP exporter.",
982982 },
983983Key {
984984 key: "otel.exporter.<id>.headers",
985985`log_dir` type: "map<string,string>",
986986 description: "Static headers included with OTEL exporter requests.",
987987Type / Values },
988988 {
989989`string (path)` key: "otel.trace_exporter.<id>.endpoint",
990990 type: "string",
991991Details description: "Trace exporter endpoint for OTEL logs.",
992992 },
993993Directory where Codex writes log files (for example `codex-tui.log`); defaults to `$CODEX_HOME/log`. {
994994 key: "otel.trace_exporter.<id>.protocol",
995995Key type: "binary | json",
996996 description: "Protocol used by the OTLP/HTTP trace exporter.",
997997`mcp_oauth_callback_port` },
998998 {
999999Type / Values key: "otel.trace_exporter.<id>.headers",
10001000 type: "map<string,string>",
10011001`integer` description: "Static headers included with OTEL trace exporter requests.",
10021002 },
10031003Details {
10041004 key: "otel.exporter.<id>.tls.ca-certificate",
10051005Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS. type: "string",
10061006 description: "CA certificate path for OTEL exporter TLS.",
10071007Key },
10081008 {
10091009`mcp_oauth_callback_url` key: "otel.exporter.<id>.tls.client-certificate",
10101010 type: "string",
10111011Type / Values description: "Client certificate path for OTEL exporter TLS.",
10121012 },
10131013`string` {
10141014 key: "otel.exporter.<id>.tls.client-private-key",
10151015Details type: "string",
10161016 description: "Client private key path for OTEL exporter TLS.",
10171017Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port. },
10181018 {
10191019Key key: "otel.trace_exporter.<id>.tls.ca-certificate",
10201020 type: "string",
10211021`mcp_oauth_credentials_store` description: "CA certificate path for OTEL trace exporter TLS.",
10221022 },
10231023Type / Values {
10241024 key: "otel.trace_exporter.<id>.tls.client-certificate",
10251025`auto | file | keyring` type: "string",
10261026 description: "Client certificate path for OTEL trace exporter TLS.",
10271027Details },
10281028 {
10291029Preferred store for MCP OAuth credentials. key: "otel.trace_exporter.<id>.tls.client-private-key",
10301030 type: "string",
10311031Key description: "Client private key path for OTEL trace exporter TLS.",
10321032 },
10331033`mcp_servers.<id>.args` {
10341034 key: "tui",
10351035Type / Values type: "table",
10361036 description:
10371037`array<string>` "TUI-specific options such as enabling inline desktop notifications.",
10381038 },
10391039Details {
10401040 key: "tui.notifications",
10411041Arguments passed to the MCP stdio server command. type: "boolean | array<string>",
10421042 description:
10431043Key "Enable TUI notifications; optionally restrict to specific event types.",
10441044 },
10451045`mcp_servers.<id>.bearer_token_env_var` {
10461046 key: "tui.notification_method",
10471047Type / Values type: "auto | osc9 | bel",
10481048 description:
10491049`string` "Notification method for terminal notifications (default: auto).",
10501050 },
10511051Details {
10521052 key: "tui.notification_condition",
10531053Environment variable sourcing the bearer token for an MCP HTTP server. type: "unfocused | always",
10541054 description:
10551055Key "Control whether TUI notifications fire only when the terminal is unfocused or regardless of focus. Defaults to `unfocused`.",
10561056 },
10571057`mcp_servers.<id>.command` {
10581058 key: "tui.animations",
10591059Type / Values type: "boolean",
10601060 description:
10611061`string` "Enable terminal animations (welcome screen, shimmer, spinner) (default: true).",
10621062 },
10631063Details {
10641064 key: "tui.alternate_screen",
10651065Launcher command for an MCP stdio server. type: "auto | always | never",
10661066 description:
10671067Key "Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).",
10681068 },
10691069`mcp_servers.<id>.cwd` {
10701070 key: "tui.show_tooltips",
10711071Type / Values type: "boolean",
10721072 description:
10731073`string` "Show onboarding tooltips in the TUI welcome screen (default: true).",
10741074 },
10751075Details {
10761076 key: "tui.status_line",
10771077Working directory for the MCP stdio server process. type: "array<string> | null",
10781078 description:
10791079Key "Ordered list of TUI footer status-line item identifiers. `null` disables the status line.",
10801080 },
10811081`mcp_servers.<id>.disabled_tools` {
10821082 key: "tui.terminal_title",
10831083Type / Values type: "array<string> | null",
10841084 description:
10851085`array<string>` 'Ordered list of terminal window/tab title item identifiers. Defaults to `["spinner", "project"]`; `null` disables title updates.',
10861086 },
10871087Details {
10881088 key: "tui.theme",
10891089Deny list applied after `enabled_tools` for the MCP server. type: "string",
10901090 description:
10911091Key "Syntax-highlighting theme override (kebab-case theme name).",
10921092 },
10931093`mcp_servers.<id>.enabled` {
10941094 key: "tui.keymap.<context>.<action>",
10951095Type / Values type: "string | array<string>",
10961096 description:
10971097`boolean` "Keyboard shortcut binding for a TUI action. Supported contexts include `global`, `chat`, `composer`, `editor`, `pager`, `list`, and `approval`; context-specific bindings override `tui.keymap.global`.",
10981098 },
10991099Details {
11001100 key: "tui.keymap.<context>.<action> = []",
11011101Disable an MCP server without removing its configuration. type: "empty array",
11021102 description:
11031103Key "Unbind the action in that keymap context. Key names use normalized strings such as `ctrl-a`, `shift-enter`, or `page-down`.",
11041104 },
11051105`mcp_servers.<id>.enabled_tools` {
11061106 key: "tui.model_availability_nux.<model>",
11071107Type / Values type: "integer",
11081108 description: "Internal startup-tooltip state keyed by model slug.",
11091109`array<string>` },
11101110 {
11111111Details key: "hide_agent_reasoning",
11121112 type: "boolean",
11131113Allow list of tool names exposed by the MCP server. description:
11141114 "Suppress reasoning events in both the TUI and `codex exec` output.",
11151115Key },
11161116 {
11171117`mcp_servers.<id>.env` key: "show_raw_agent_reasoning",
11181118 type: "boolean",
11191119Type / Values description:
11201120 "Surface raw reasoning content when the active model emits it.",
11211121`map<string,string>` },
11221122 {
11231123Details key: "disable_paste_burst",
11241124 type: "boolean",
11251125Environment variables forwarded to the MCP stdio server. description: "Disable burst-paste detection in the TUI.",
11261126 },
11271127Key {
11281128 key: "windows_wsl_setup_acknowledged",
11291129`mcp_servers.<id>.env_http_headers` type: "boolean",
11301130 description: "Track Windows onboarding acknowledgement (Windows only).",
11311131Type / Values },
11321132 {
11331133`map<string,string>` key: "chatgpt_base_url",
11341134 type: "string",
11351135Details description: "Override the base URL used during the ChatGPT login flow.",
11361136 },
11371137HTTP headers populated from environment variables for an MCP HTTP server. {
11381138 key: "cli_auth_credentials_store",
11391139Key type: "file | keyring | auto",
11401140 description:
11411141`mcp_servers.<id>.env_vars` "Control where the CLI stores cached credentials (file-based auth.json vs OS keychain).",
11421142 },
11431143Type / Values {
11441144 key: "mcp_oauth_credentials_store",
11451145`array<string | { name = string, source = "local" | "remote" }>` type: "auto | file | keyring",
11461146 description: "Preferred store for MCP OAuth credentials.",
11471147Details },
11481148 {
11491149Additional environment variables to whitelist for an MCP stdio server. String entries default to `source = "local"`; use `source = "remote"` only with executor-backed remote stdio. key: "mcp_oauth_callback_port",
11501150 type: "integer",
11511151Key description:
11521152 "Optional fixed port for the local HTTP callback server used during MCP OAuth login. When unset, Codex binds to an ephemeral port chosen by the OS.",
11531153`mcp_servers.<id>.experimental_environment` },
11541154 {
11551155Type / Values key: "mcp_oauth_callback_url",
11561156 type: "string",
11571157`local | remote` description:
11581158 "Optional redirect URI override for MCP OAuth login (for example, a devbox ingress URL). `mcp_oauth_callback_port` still controls the callback listener port.",
11591159Details },
11601160 {
11611161Experimental placement for an MCP server. `remote` starts stdio servers through a remote executor environment; streamable HTTP remote placement is not implemented. key: "experimental_use_unified_exec_tool",
11621162 type: "boolean",
11631163Key description:
11641164 "Legacy name for enabling unified exec; prefer `[features].unified_exec` or `codex --enable unified_exec`.",
11651165`mcp_servers.<id>.http_headers` },
11661166 {
11671167Type / Values key: "tools.web_search",
11681168 type: 'boolean | { context_size = "low|medium|high", allowed_domains = [string], location = { country, region, city, timezone } }',
11691169`map<string,string>` description:
11701170 "Optional web search tool configuration. The legacy boolean form is still accepted, but the object form lets you set search context size, allowed domains, and approximate user location.",
11711171Details },
11721172 {
11731173Static HTTP headers included with each MCP HTTP request. key: "tools.view_image",
11741174 type: "boolean",
11751175Key description: "Enable the local-image attachment tool `view_image`.",
11761176 },
11771177`mcp_servers.<id>.oauth_resource` {
11781178 key: "web_search",
11791179Type / Values type: "disabled | cached | live",
11801180 description:
11811181`string` 'Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.',
11821182 },
11831183Details {
11841184 key: "default_permissions",
11851185Optional RFC 8707 OAuth resource parameter to include during MCP login. type: "string",
11861186 description:
11871187Key "Name of the default permissions profile to apply to sandboxed tool calls. Built-ins are `:read-only`, `:workspace`, and `:danger-no-sandbox`; custom profile names require matching `[permissions.<name>]` tables.",
11881188 },
11891189`mcp_servers.<id>.required` {
11901190 key: "permissions.<name>.filesystem",
11911191Type / Values type: "table",
11921192 description:
11931193`boolean` "Named filesystem permission profile. Each key is an absolute path or special token such as `:minimal` or `:project_roots`.",
11941194 },
11951195Details {
11961196 key: "permissions.<name>.filesystem.glob_scan_max_depth",
11971197When true, fail startup/resume if this enabled MCP server cannot initialize. type: "number",
11981198 description:
11991199Key "Maximum depth for expanding deny-read glob patterns on platforms that snapshot matches before sandbox startup. Must be at least `1` when set.",
12001200 },
12011201`mcp_servers.<id>.scopes` {
12021202 key: "permissions.<name>.filesystem.<path-or-glob>",
12031203Type / Values type: '"read" | "write" | "none" | table',
12041204 description:
12051205`array<string>` 'Grant direct access for a path, glob pattern, or special token, or scope nested entries under that root. Use `"none"` to deny reads for matching paths.',
12061206 },
12071207Details {
12081208 key: 'permissions.<name>.filesystem.":project_roots".<subpath-or-glob>',
12091209OAuth scopes to request when authenticating to that MCP server. type: '"read" | "write" | "none"',
12101210 description:
12111211Key 'Scoped filesystem access relative to the detected project roots. Use `"."` for the root itself; glob subpaths such as `"**/*.env"` can deny reads with `"none"`.',
12121212 },
12131213`mcp_servers.<id>.startup_timeout_ms` {
12141214 key: "permissions.<name>.network.enabled",
12151215Type / Values type: "boolean",
12161216 description: "Enable network access for this named permissions profile.",
12171217`number` },
12181218 {
12191219Details key: "permissions.<name>.network.proxy_url",
12201220 type: "string",
12211221Alias for `startup_timeout_sec` in milliseconds. description:
12221222 "HTTP proxy endpoint used when this permissions profile enables the managed network proxy.",
12231223Key },
12241224 {
12251225`mcp_servers.<id>.startup_timeout_sec` key: "permissions.<name>.network.enable_socks5",
12261226 type: "boolean",
12271227Type / Values description:
12281228 "Expose a SOCKS5 listener when this permissions profile enables the managed network proxy.",
12291229`number` },
12301230 {
12311231Details key: "permissions.<name>.network.socks_url",
12321232 type: "string",
12331233Override the default 10s startup timeout for an MCP server. description: "SOCKS5 proxy endpoint used by this permissions profile.",
12341234 },
12351235Key {
12361236 key: "permissions.<name>.network.enable_socks5_udp",
12371237`mcp_servers.<id>.tool_timeout_sec` type: "boolean",
12381238 description: "Allow UDP over the SOCKS5 listener when enabled.",
12391239Type / Values },
12401240 {
12411241`number` key: "permissions.<name>.network.allow_upstream_proxy",
12421242 type: "boolean",
12431243Details description:
12441244 "Allow the managed proxy to chain to another upstream proxy.",
12451245Override the default 60s per-tool timeout for an MCP server. },
12461246 {
12471247Key key: "permissions.<name>.network.dangerously_allow_non_loopback_proxy",
12481248 type: "boolean",
12491249`mcp_servers.<id>.url` description:
12501250 "Permit non-loopback bind addresses for the managed proxy listener.",
12511251Type / Values },
12521252 {
12531253`string` key: "permissions.<name>.network.dangerously_allow_all_unix_sockets",
12541254 type: "boolean",
12551255Details description:
12561256 "Allow the proxy to use arbitrary Unix sockets instead of the default restricted set.",
12571257Endpoint for an MCP streamable HTTP server. },
12581258 {
12591259Key key: "permissions.<name>.network.mode",
12601260 type: "limited | full",
12611261`memories.consolidation_model` description: "Network proxy mode used for subprocess traffic.",
12621262 },
12631263Type / Values {
12641264 key: "permissions.<name>.network.domains",
12651265`string` type: "map<string, allow | deny>",
12661266 description:
12671267Details "Domain rules for the managed proxy. Use domain names or wildcard patterns as keys, with `allow` or `deny` values.",
12681268 },
12691269Optional model override for global memory consolidation. {
12701270 key: "permissions.<name>.network.unix_sockets",
12711271Key type: "map<string, allow | none>",
12721272 description:
12731273`memories.disable_on_external_context` "Unix socket rules for the managed proxy. Use socket paths as keys, with `allow` or `none` values.",
12741274 },
12751275Type / Values {
12761276 key: "permissions.<name>.network.allow_local_binding",
12771277`boolean` type: "boolean",
12781278 description:
12791279Details "Permit local bind/listen operations through the managed proxy.",
12801280 },
12811281When `true`, threads that use external context such as MCP tool calls, web search, or tool search are kept out of memory generation. Defaults to `false`. Legacy alias: `memories.no_memories_if_mcp_or_web_search`. {
12821282 key: "projects.<path>.trust_level",
12831283Key type: "string",
12841284 description:
12851285`memories.extract_model` 'Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers, including project-local config, hooks, and rules.',
12861286 },
12871287Type / Values {
12881288 key: "notice.hide_full_access_warning",
12891289`string` type: "boolean",
12901290 description: "Track acknowledgement of the full access warning prompt.",
12911291Details },
12921292 {
12931293Optional model override for per-thread memory extraction. key: "notice.hide_world_writable_warning",
12941294 type: "boolean",
12951295Key description:
12961296 "Track acknowledgement of the Windows world-writable directories warning.",
12971297`memories.generate_memories` },
12981298 {
12991299Type / Values key: "notice.hide_rate_limit_model_nudge",
13001300 type: "boolean",
13011301`boolean` description: "Track opt-out of the rate limit model switch reminder.",
13021302 },
13031303Details {
13041304 key: "notice.hide_gpt5_1_migration_prompt",
13051305When `false`, newly created threads are not stored as memory-generation inputs. Defaults to `true`. type: "boolean",
13061306 description: "Track acknowledgement of the GPT-5.1 migration prompt.",
13071307Key },
13081308 {
13091309`memories.max_raw_memories_for_consolidation` key: "notice.hide_gpt-5.1-codex-max_migration_prompt",
13101310 type: "boolean",
13111311Type / Values description:
13121312 "Track acknowledgement of the gpt-5.1-codex-max migration prompt.",
13131313`number` },
13141314 {
13151315Details key: "notice.model_migrations",
13161316 type: "map<string,string>",
13171317Maximum recent raw memories retained for global consolidation. Defaults to `256` and is capped at `4096`. description: "Track acknowledged model migrations as old->new mappings.",
13181318 },
13191319Key {
13201320 key: "forced_login_method",
13211321`memories.max_rollout_age_days` type: "chatgpt | api",
13221322 description: "Restrict Codex to a specific authentication method.",
13231323Type / Values },
13241324 {
13251325`number` key: "forced_chatgpt_workspace_id",
13261326 type: "string (uuid)",
13271327Details description: "Limit ChatGPT logins to a specific workspace identifier.",
13281328 },
13291329Maximum age of threads considered for memory generation. Defaults to `30` and is clamped to `0`-`90`. ]}
13301330 client:load
13311331Key/>
1332
1333`memories.max_rollouts_per_startup`
1334
1335Type / Values
1336
1337`number`
1338
1339Details
1340
1341Maximum rollout candidates processed per startup pass. Defaults to `16` and is capped at `128`.
1342
1343Key
1344
1345`memories.max_unused_days`
1346
1347Type / Values
1348
1349`number`
1350
1351Details
1352
1353Maximum days since a memory was last used before it becomes ineligible for consolidation. Defaults to `30` and is clamped to `0`-`365`.
1354
1355Key
1356
1357`memories.min_rollout_idle_hours`
1358
1359Type / Values
1360
1361`number`
1362
1363Details
1364
1365Minimum idle time before a thread is considered for memory generation. Defaults to `6` and is clamped to `1`-`48`.
1366
1367Key
1368
1369`memories.use_memories`
1370
1371Type / Values
1372
1373`boolean`
1374
1375Details
1376
1377When `false`, Codex skips injecting existing memories into future sessions. Defaults to `true`.
1378
1379Key
1380
1381`model`
1382
1383Type / Values
1384
1385`string`
1386
1387Details
1388
1389Model to use (e.g., `gpt-5.5`).
1390
1391Key
1392
1393`model_auto_compact_token_limit`
1394
1395Type / Values
1396
1397`number`
1398
1399Details
1400
1401Token threshold that triggers automatic history compaction (unset uses model defaults).
1402
1403Key
1404
1405`model_catalog_json`
1406
1407Type / Values
1408
1409`string (path)`
1410
1411Details
1412
1413Optional path to a JSON model catalog loaded on startup. Profile-level `profiles.<name>.model_catalog_json` can override this per profile.
1414
1415Key
1416
1417`model_context_window`
1418
1419Type / Values
1420
1421`number`
1422
1423Details
1424
1425Context window tokens available to the active model.
1426
1427Key
1428
1429`model_instructions_file`
1430
1431Type / Values
1432
1433`string (path)`
1434
1435Details
1436
1437Replacement for built-in instructions instead of `AGENTS.md`.
1438
1439Key
1440
1441`model_provider`
1442
1443Type / Values
1444
1445`string`
1446
1447Details
1448
1449Provider id from `model_providers` (default: `openai`).
1450
1451Key
1452
1453`model_providers.<id>`
1454
1455Type / Values
1456
1457`table`
1458
1459Details
1460
1461Custom provider definition. Built-in provider IDs (`openai`, `ollama`, and `lmstudio`) are reserved and cannot be overridden.
1462
1463Key
1464
1465`model_providers.<id>.auth`
1466
1467Type / Values
1468
1469`table`
1470
1471Details
1472
1473Command-backed bearer token configuration for a custom provider. Do not combine with `env_key`, `experimental_bearer_token`, or `requires_openai_auth`.
1474
1475Key
1476
1477`model_providers.<id>.auth.args`
1478
1479Type / Values
1480
1481`array<string>`
1482
1483Details
1484
1485Arguments passed to the token command.
1486
1487Key
1488
1489`model_providers.<id>.auth.command`
1490
1491Type / Values
1492
1493`string`
1494
1495Details
1496
1497Command to run when Codex needs a bearer token. The command must print the token to stdout.
1498
1499Key
1500
1501`model_providers.<id>.auth.cwd`
1502
1503Type / Values
1504
1505`string (path)`
1506
1507Details
1508
1509Working directory for the token command.
1510
1511Key
1512
1513`model_providers.<id>.auth.refresh_interval_ms`
1514
1515Type / Values
1516
1517`number`
1518
1519Details
1520
1521How often Codex proactively refreshes the token in milliseconds (default: 300000). Set to `0` to refresh only after an authentication retry.
1522
1523Key
1524
1525`model_providers.<id>.auth.timeout_ms`
1526
1527Type / Values
1528
1529`number`
1530
1531Details
1532
1533Maximum token command runtime in milliseconds (default: 5000).
1534
1535Key
1536
1537`model_providers.<id>.base_url`
1538
1539Type / Values
1540
1541`string`
1542
1543Details
1544
1545API base URL for the model provider.
1546
1547Key
1548
1549`model_providers.<id>.env_http_headers`
1550
1551Type / Values
1552
1553`map<string,string>`
1554
1555Details
1556
1557HTTP headers populated from environment variables when present.
1558
1559Key
1560
1561`model_providers.<id>.env_key`
1562
1563Type / Values
1564
1565`string`
1566
1567Details
1568
1569Environment variable supplying the provider API key.
1570
1571Key
1572
1573`model_providers.<id>.env_key_instructions`
1574
1575Type / Values
1576
1577`string`
1578
1579Details
1580
1581Optional setup guidance for the provider API key.
1582
1583Key
1584
1585`model_providers.<id>.experimental_bearer_token`
1586
1587Type / Values
1588
1589`string`
1590
1591Details
1592
1593Direct bearer token for the provider (discouraged; use `env_key`).
1594
1595Key
1596
1597`model_providers.<id>.http_headers`
1598
1599Type / Values
1600
1601`map<string,string>`
1602
1603Details
1604
1605Static HTTP headers added to provider requests.
1606
1607Key
1608
1609`model_providers.<id>.name`
1610
1611Type / Values
1612
1613`string`
1614
1615Details
1616
1617Display name for a custom model provider.
1618
1619Key
1620
1621`model_providers.<id>.query_params`
1622
1623Type / Values
1624
1625`map<string,string>`
1626
1627Details
1628
1629Extra query parameters appended to provider requests.
1630
1631Key
1632
1633`model_providers.<id>.request_max_retries`
1634
1635Type / Values
1636
1637`number`
1638
1639Details
1640
1641Retry count for HTTP requests to the provider (default: 4).
1642
1643Key
1644
1645`model_providers.<id>.requires_openai_auth`
1646
1647Type / Values
1648
1649`boolean`
1650
1651Details
1652
1653The provider uses OpenAI authentication (defaults to false).
1654
1655Key
1656
1657`model_providers.<id>.stream_idle_timeout_ms`
1658
1659Type / Values
1660
1661`number`
1662
1663Details
1664
1665Idle timeout for SSE streams in milliseconds (default: 300000).
1666
1667Key
1668
1669`model_providers.<id>.stream_max_retries`
1670
1671Type / Values
1672
1673`number`
1674
1675Details
1676
1677Retry count for SSE streaming interruptions (default: 5).
1678
1679Key
1680
1681`model_providers.<id>.supports_websockets`
1682
1683Type / Values
1684
1685`boolean`
1686
1687Details
1688
1689Whether that provider supports the Responses API WebSocket transport.
1690
1691Key
1692
1693`model_providers.<id>.wire_api`
1694
1695Type / Values
1696
1697`responses`
1698
1699Details
1700
1701Protocol used by the provider. `responses` is the only supported value, and it is the default when omitted.
1702
1703Key
1704
1705`model_reasoning_effort`
1706
1707Type / Values
1708
1709`minimal | low | medium | high | xhigh`
1710
1711Details
1712
1713Adjust reasoning effort for supported models (Responses API only; `xhigh` is model-dependent).
1714
1715Key
1716
1717`model_reasoning_summary`
1718
1719Type / Values
1720
1721`auto | concise | detailed | none`
1722
1723Details
1724
1725Select reasoning summary detail or disable summaries entirely.
1726
1727Key
1728
1729`model_supports_reasoning_summaries`
1730
1731Type / Values
1732
1733`boolean`
1734
1735Details
1736
1737Force Codex to send or not send reasoning metadata.
1738
1739Key
1740
1741`model_verbosity`
1742
1743Type / Values
1744
1745`low | medium | high`
1746
1747Details
1748
1749Optional GPT-5 Responses API verbosity override; when unset, the selected model/preset default is used.
1750
1751Key
1752
1753`notice.hide_full_access_warning`
1754
1755Type / Values
1756
1757`boolean`
1758
1759Details
1760
1761Track acknowledgement of the full access warning prompt.
1762
1763Key
1764
1765`notice.hide_gpt-5.1-codex-max_migration_prompt`
1766
1767Type / Values
1768
1769`boolean`
1770
1771Details
1772
1773Track acknowledgement of the gpt-5.1-codex-max migration prompt.
1774
1775Key
1776
1777`notice.hide_gpt5_1_migration_prompt`
1778
1779Type / Values
1780
1781`boolean`
1782
1783Details
1784
1785Track acknowledgement of the GPT-5.1 migration prompt.
1786
1787Key
1788
1789`notice.hide_rate_limit_model_nudge`
1790
1791Type / Values
1792
1793`boolean`
1794
1795Details
1796
1797Track opt-out of the rate limit model switch reminder.
1798
1799Key
1800
1801`notice.hide_world_writable_warning`
1802
1803Type / Values
1804
1805`boolean`
1806
1807Details
1808
1809Track acknowledgement of the Windows world-writable directories warning.
1810
1811Key
1812
1813`notice.model_migrations`
1814
1815Type / Values
1816
1817`map<string,string>`
1818
1819Details
1820
1821Track acknowledged model migrations as old->new mappings.
1822
1823Key
1824
1825`notify`
1826
1827Type / Values
1828
1829`array<string>`
1830
1831Details
1832
1833Command invoked for notifications; receives a JSON payload from Codex.
1834
1835Key
1836
1837`openai_base_url`
1838
1839Type / Values
1840
1841`string`
1842
1843Details
1844
1845Base URL override for the built-in `openai` model provider.
1846
1847Key
1848
1849`oss_provider`
1850
1851Type / Values
1852
1853`lmstudio | ollama`
1854
1855Details
1856
1857Default local provider used when running with `--oss` (defaults to prompting if unset).
1858
1859Key
1860
1861`otel.environment`
1862
1863Type / Values
1864
1865`string`
1866
1867Details
1868
1869Environment tag applied to emitted OpenTelemetry events (default: `dev`).
1870
1871Key
1872
1873`otel.exporter`
1874
1875Type / Values
1876
1877`none | otlp-http | otlp-grpc`
1878
1879Details
1880
1881Select the OpenTelemetry exporter and provide any endpoint metadata.
1882
1883Key
1884
1885`otel.exporter.<id>.endpoint`
1886
1887Type / Values
1888
1889`string`
1890
1891Details
1892
1893Exporter endpoint for OTEL logs.
1894
1895Key
1896
1897`otel.exporter.<id>.headers`
1898
1899Type / Values
1900
1901`map<string,string>`
1902
1903Details
1904
1905Static headers included with OTEL exporter requests.
1906
1907Key
1908
1909`otel.exporter.<id>.protocol`
1910
1911Type / Values
1912
1913`binary | json`
1914
1915Details
1916
1917Protocol used by the OTLP/HTTP exporter.
1918
1919Key
1920
1921`otel.exporter.<id>.tls.ca-certificate`
1922
1923Type / Values
1924
1925`string`
1926
1927Details
1928
1929CA certificate path for OTEL exporter TLS.
1930
1931Key
1932
1933`otel.exporter.<id>.tls.client-certificate`
1934
1935Type / Values
1936
1937`string`
1938
1939Details
1940
1941Client certificate path for OTEL exporter TLS.
1942
1943Key
1944
1945`otel.exporter.<id>.tls.client-private-key`
1946
1947Type / Values
1948
1949`string`
1950
1951Details
1952
1953Client private key path for OTEL exporter TLS.
1954
1955Key
1956
1957`otel.log_user_prompt`
1958
1959Type / Values
1960
1961`boolean`
1962
1963Details
1964
1965Opt in to exporting raw user prompts with OpenTelemetry logs.
1966
1967Key
1968
1969`otel.metrics_exporter`
1970
1971Type / Values
1972
1973`none | statsig | otlp-http | otlp-grpc`
1974
1975Details
1976
1977Select the OpenTelemetry metrics exporter (defaults to `statsig`).
1978
1979Key
1980
1981`otel.trace_exporter`
1982
1983Type / Values
1984
1985`none | otlp-http | otlp-grpc`
1986
1987Details
1988
1989Select the OpenTelemetry trace exporter and provide any endpoint metadata.
1990
1991Key
1992
1993`otel.trace_exporter.<id>.endpoint`
1994
1995Type / Values
1996
1997`string`
1998
1999Details
2000
2001Trace exporter endpoint for OTEL logs.
2002
2003Key
2004
2005`otel.trace_exporter.<id>.headers`
2006
2007Type / Values
2008
2009`map<string,string>`
2010
2011Details
2012
2013Static headers included with OTEL trace exporter requests.
2014
2015Key
2016
2017`otel.trace_exporter.<id>.protocol`
2018
2019Type / Values
2020
2021`binary | json`
2022
2023Details
2024
2025Protocol used by the OTLP/HTTP trace exporter.
2026
2027Key
2028
2029`otel.trace_exporter.<id>.tls.ca-certificate`
2030
2031Type / Values
2032
2033`string`
2034
2035Details
2036
2037CA certificate path for OTEL trace exporter TLS.
2038
2039Key
2040
2041`otel.trace_exporter.<id>.tls.client-certificate`
2042
2043Type / Values
2044
2045`string`
2046
2047Details
2048
2049Client certificate path for OTEL trace exporter TLS.
2050
2051Key
2052
2053`otel.trace_exporter.<id>.tls.client-private-key`
2054
2055Type / Values
2056
2057`string`
2058
2059Details
2060
2061Client private key path for OTEL trace exporter TLS.
2062
2063Key
2064
2065`permissions.<name>.filesystem`
2066
2067Type / Values
2068
2069`table`
2070
2071Details
2072
2073Named filesystem permission profile. Each key is an absolute path or special token such as `:minimal` or `:project_roots`.
2074
2075Key
2076
2077`permissions.<name>.filesystem.":project_roots".<subpath-or-glob>`
2078
2079Type / Values
2080
2081`"read" | "write" | "none"`
2082
2083Details
2084
2085Scoped filesystem access relative to the detected project roots. Use `"."` for the root itself; glob subpaths such as `"**/*.env"` can deny reads with `"none"`.
2086
2087Key
2088
2089`permissions.<name>.filesystem.<path-or-glob>`
2090
2091Type / Values
2092
2093`"read" | "write" | "none" | table`
2094
2095Details
2096
2097Grant direct access for a path, glob pattern, or special token, or scope nested entries under that root. Use `"none"` to deny reads for matching paths.
2098
2099Key
2100
2101`permissions.<name>.filesystem.glob_scan_max_depth`
2102
2103Type / Values
2104
2105`number`
2106
2107Details
2108
2109Maximum depth for expanding deny-read glob patterns on platforms that snapshot matches before sandbox startup. Must be at least `1` when set.
2110
2111Key
2112
2113`permissions.<name>.network.allow_local_binding`
2114
2115Type / Values
2116
2117`boolean`
2118
2119Details
2120
2121Permit local bind/listen operations through the managed proxy.
2122
2123Key
2124
2125`permissions.<name>.network.allow_upstream_proxy`
2126
2127Type / Values
2128
2129`boolean`
2130
2131Details
2132
2133Allow the managed proxy to chain to another upstream proxy.
2134
2135Key
2136
2137`permissions.<name>.network.dangerously_allow_all_unix_sockets`
2138
2139Type / Values
2140
2141`boolean`
2142
2143Details
2144
2145Allow the proxy to use arbitrary Unix sockets instead of the default restricted set.
2146
2147Key
2148
2149`permissions.<name>.network.dangerously_allow_non_loopback_proxy`
2150
2151Type / Values
2152
2153`boolean`
2154
2155Details
2156
2157Permit non-loopback bind addresses for the managed proxy listener.
2158
2159Key
2160
2161`permissions.<name>.network.domains`
2162
2163Type / Values
2164
2165`map<string, allow | deny>`
2166
2167Details
2168
2169Domain rules for the managed proxy. Use domain names or wildcard patterns as keys, with `allow` or `deny` values.
2170
2171Key
2172
2173`permissions.<name>.network.enable_socks5`
2174
2175Type / Values
2176
2177`boolean`
2178
2179Details
2180
2181Expose a SOCKS5 listener when this permissions profile enables the managed network proxy.
2182
2183Key
2184
2185`permissions.<name>.network.enable_socks5_udp`
2186
2187Type / Values
2188
2189`boolean`
2190
2191Details
2192
2193Allow UDP over the SOCKS5 listener when enabled.
2194
2195Key
2196
2197`permissions.<name>.network.enabled`
2198
2199Type / Values
2200
2201`boolean`
2202
2203Details
2204
2205Enable network access for this named permissions profile.
2206
2207Key
2208
2209`permissions.<name>.network.mode`
2210
2211Type / Values
2212
2213`limited | full`
2214
2215Details
2216
2217Network proxy mode used for subprocess traffic.
2218
2219Key
2220
2221`permissions.<name>.network.proxy_url`
2222
2223Type / Values
2224
2225`string`
2226
2227Details
2228
2229HTTP proxy endpoint used when this permissions profile enables the managed network proxy.
2230
2231Key
2232
2233`permissions.<name>.network.socks_url`
2234
2235Type / Values
2236
2237`string`
2238
2239Details
2240
2241SOCKS5 proxy endpoint used by this permissions profile.
2242
2243Key
2244
2245`permissions.<name>.network.unix_sockets`
2246
2247Type / Values
2248
2249`map<string, allow | none>`
2250
2251Details
2252
2253Unix socket rules for the managed proxy. Use socket paths as keys, with `allow` or `none` values.
2254
2255Key
2256
2257`personality`
2258
2259Type / Values
2260
2261`none | friendly | pragmatic`
2262
2263Details
2264
2265Default communication style for models that advertise `supportsPersonality`; can be overridden per thread/turn or via `/personality`.
2266
2267Key
2268
2269`plan_mode_reasoning_effort`
2270
2271Type / Values
2272
2273`none | minimal | low | medium | high | xhigh`
2274
2275Details
2276
2277Plan-mode-specific reasoning override. When unset, Plan mode uses its built-in preset default.
2278
2279Key
2280
2281`profile`
2282
2283Type / Values
2284
2285`string`
2286
2287Details
2288
2289Default profile applied at startup (equivalent to `--profile`).
2290
2291Key
2292
2293`profiles.<name>.*`
2294
2295Type / Values
2296
2297`various`
2298
2299Details
2300
2301Profile-scoped overrides for any of the supported configuration keys.
2302
2303Key
2304
2305`profiles.<name>.analytics.enabled`
2306
2307Type / Values
2308
2309`boolean`
2310
2311Details
2312
2313Profile-scoped analytics enablement override.
2314
2315Key
2316
2317`profiles.<name>.experimental_use_unified_exec_tool`
2318
2319Type / Values
2320
2321`boolean`
2322
2323Details
2324
2325Legacy name for enabling unified exec; prefer `[features].unified_exec`.
2326
2327Key
2328
2329`profiles.<name>.model_catalog_json`
2330
2331Type / Values
2332
2333`string (path)`
2334
2335Details
2336
2337Profile-scoped model catalog JSON path override (applied on startup only; overrides the top-level `model_catalog_json` for that profile).
2338
2339Key
2340
2341`profiles.<name>.model_instructions_file`
2342
2343Type / Values
2344
2345`string (path)`
2346
2347Details
2348
2349Profile-scoped replacement for the built-in instruction file.
2350
2351Key
2352
2353`profiles.<name>.oss_provider`
2354
2355Type / Values
2356
2357`lmstudio | ollama`
2358
2359Details
2360
2361Profile-scoped OSS provider for `--oss` sessions.
2362
2363Key
2364
2365`profiles.<name>.personality`
2366
2367Type / Values
2368
2369`none | friendly | pragmatic`
2370
2371Details
2372
2373Profile-scoped communication style override for supported models.
2374
2375Key
2376
2377`profiles.<name>.plan_mode_reasoning_effort`
2378
2379Type / Values
2380
2381`none | minimal | low | medium | high | xhigh`
2382
2383Details
2384
2385Profile-scoped Plan-mode reasoning override.
2386
2387Key
2388
2389`profiles.<name>.service_tier`
2390
2391Type / Values
2392
2393`flex | fast`
2394
2395Details
2396
2397Profile-scoped service tier preference for new turns.
2398
2399Key
2400
2401`profiles.<name>.tools_view_image`
2402
2403Type / Values
2404
2405`boolean`
2406
2407Details
2408
2409Enable or disable the `view_image` tool in that profile.
2410
2411Key
2412
2413`profiles.<name>.web_search`
2414
2415Type / Values
2416
2417`disabled | cached | live`
2418
2419Details
2420
2421Profile-scoped web search mode override (default: `"cached"`).
2422
2423Key
2424
2425`profiles.<name>.windows.sandbox`
2426
2427Type / Values
2428
2429`unelevated | elevated`
2430
2431Details
2432
2433Profile-scoped Windows sandbox mode override.
2434
2435Key
2436
2437`project_doc_fallback_filenames`
2438
2439Type / Values
2440
2441`array<string>`
2442
2443Details
2444
2445Additional filenames to try when `AGENTS.md` is missing.
2446
2447Key
2448
2449`project_doc_max_bytes`
2450
2451Type / Values
2452
2453`number`
2454
2455Details
2456
2457Maximum bytes read from `AGENTS.md` when building project instructions.
2458
2459Key
2460
2461`project_root_markers`
2462
2463Type / Values
2464
2465`array<string>`
2466
2467Details
2468
2469List of project root marker filenames; used when searching parent directories for the project root.
2470
2471Key
2472
2473`projects.<path>.trust_level`
2474
2475Type / Values
2476
2477`string`
2478
2479Details
2480
2481Mark a project or worktree as trusted or untrusted (`"trusted"` | `"untrusted"`). Untrusted projects skip project-scoped `.codex/` layers, including project-local config, hooks, and rules.
2482
2483Key
2484
2485`review_model`
2486
2487Type / Values
2488
2489`string`
2490
2491Details
2492
2493Optional model override used by `/review` (defaults to the current session model).
2494
2495Key
2496
2497`sandbox_mode`
2498
2499Type / Values
2500
2501`read-only | workspace-write | danger-full-access`
2502
2503Details
2504
2505Sandbox policy for filesystem and network access during command execution.
2506
2507Key
2508
2509`sandbox_workspace_write.exclude_slash_tmp`
2510
2511Type / Values
2512
2513`boolean`
2514
2515Details
2516
2517Exclude `/tmp` from writable roots in workspace-write mode.
2518
2519Key
2520
2521`sandbox_workspace_write.exclude_tmpdir_env_var`
2522
2523Type / Values
2524
2525`boolean`
2526
2527Details
2528
2529Exclude `$TMPDIR` from writable roots in workspace-write mode.
2530
2531Key
2532
2533`sandbox_workspace_write.network_access`
2534
2535Type / Values
2536
2537`boolean`
2538
2539Details
2540
2541Allow outbound network access inside the workspace-write sandbox.
2542
2543Key
2544
2545`sandbox_workspace_write.writable_roots`
2546
2547Type / Values
2548
2549`array<string>`
2550
2551Details
2552
2553Additional writable roots when `sandbox_mode = "workspace-write"`.
2554
2555Key
2556
2557`service_tier`
2558
2559Type / Values
2560
2561`flex | fast`
2562
2563Details
2564
2565Preferred service tier for new turns.
2566
2567Key
2568
2569`shell_environment_policy.exclude`
2570
2571Type / Values
2572
2573`array<string>`
2574
2575Details
2576
2577Glob patterns for removing environment variables after the defaults.
2578
2579Key
2580
2581`shell_environment_policy.experimental_use_profile`
2582
2583Type / Values
2584
2585`boolean`
2586
2587Details
2588
2589Use the user shell profile when spawning subprocesses.
2590
2591Key
2592
2593`shell_environment_policy.ignore_default_excludes`
2594
2595Type / Values
2596
2597`boolean`
2598
2599Details
2600
2601Keep variables containing KEY/SECRET/TOKEN before other filters run.
2602
2603Key
2604
2605`shell_environment_policy.include_only`
2606
2607Type / Values
2608
2609`array<string>`
2610
2611Details
2612
2613Whitelist of patterns; when set only matching variables are kept.
2614
2615Key
2616
2617`shell_environment_policy.inherit`
2618
2619Type / Values
2620
2621`all | core | none`
2622
2623Details
2624
2625Baseline environment inheritance when spawning subprocesses.
2626
2627Key
2628
2629`shell_environment_policy.set`
2630
2631Type / Values
2632
2633`map<string,string>`
2634
2635Details
2636
2637Explicit environment overrides injected into every subprocess.
2638
2639Key
2640
2641`show_raw_agent_reasoning`
2642
2643Type / Values
2644
2645`boolean`
2646
2647Details
2648
2649Surface raw reasoning content when the active model emits it.
2650
2651Key
2652
2653`skills.config`
2654
2655Type / Values
2656
2657`array<object>`
2658
2659Details
2660
2661Per-skill enablement overrides stored in config.toml.
2662
2663Key
2664
2665`skills.config.<index>.enabled`
2666
2667Type / Values
2668
2669`boolean`
2670
2671Details
2672
2673Enable or disable the referenced skill.
2674
2675Key
2676
2677`skills.config.<index>.path`
2678
2679Type / Values
2680
2681`string (path)`
2682
2683Details
2684
2685Path to a skill folder containing `SKILL.md`.
2686
2687Key
2688
2689`sqlite_home`
2690
2691Type / Values
2692
2693`string (path)`
2694
2695Details
2696
2697Directory where Codex stores the SQLite-backed state DB used by agent jobs and other resumable runtime state.
2698
2699Key
2700
2701`suppress_unstable_features_warning`
2702
2703Type / Values
2704
2705`boolean`
2706
2707Details
2708
2709Suppress the warning that appears when under-development feature flags are enabled.
2710
2711Key
2712
2713`tool_output_token_limit`
2714
2715Type / Values
2716
2717`number`
2718
2719Details
2720
2721Token budget for storing individual tool/function outputs in history.
2722
2723Key
2724
2725`tool_suggest.discoverables`
2726
2727Type / Values
2728
2729`array<table>`
2730
2731Details
2732
2733Allow tool suggestions for additional discoverable connectors or plugins. Each entry uses `type = "connector"` or `"plugin"` and an `id`.
2734
2735Key
2736
2737`tools.view_image`
2738
2739Type / Values
2740
2741`boolean`
2742
2743Details
2744
2745Enable the local-image attachment tool `view_image`.
2746
2747Key
2748
2749`tools.web_search`
2750
2751Type / Values
2752
2753`boolean | { context_size = "low|medium|high", allowed_domains = [string], location = { country, region, city, timezone } }`
2754
2755Details
2756
2757Optional web search tool configuration. The legacy boolean form is still accepted, but the object form lets you set search context size, allowed domains, and approximate user location.
2758
2759Key
2760
2761`tui`
2762
2763Type / Values
2764
2765`table`
2766
2767Details
2768
2769TUI-specific options such as enabling inline desktop notifications.
2770
2771Key
2772
2773`tui.alternate_screen`
2774
2775Type / Values
2776
2777`auto | always | never`
2778
2779Details
2780
2781Control alternate screen usage for the TUI (default: auto; auto skips it in Zellij to preserve scrollback).
2782
2783Key
2784
2785`tui.animations`
2786
2787Type / Values
2788
2789`boolean`
2790
2791Details
2792
2793Enable terminal animations (welcome screen, shimmer, spinner) (default: true).
2794
2795Key
2796
2797`tui.model_availability_nux.<model>`
2798
2799Type / Values
2800
2801`integer`
2802
2803Details
2804
2805Internal startup-tooltip state keyed by model slug.
2806
2807Key
2808
2809`tui.notification_condition`
2810
2811Type / Values
2812
2813`unfocused | always`
2814
2815Details
2816
2817Control whether TUI notifications fire only when the terminal is unfocused or regardless of focus. Defaults to `unfocused`.
2818
2819Key
2820
2821`tui.notification_method`
2822
2823Type / Values
2824
2825`auto | osc9 | bel`
2826
2827Details
2828
2829Notification method for terminal notifications (default: auto).
2830
2831Key
2832
2833`tui.notifications`
2834
2835Type / Values
2836
2837`boolean | array<string>`
2838
2839Details
2840
2841Enable TUI notifications; optionally restrict to specific event types.
2842
2843Key
2844
2845`tui.show_tooltips`
2846
2847Type / Values
2848
2849`boolean`
2850
2851Details
2852
2853Show onboarding tooltips in the TUI welcome screen (default: true).
2854
2855Key
2856
2857`tui.status_line`
2858
2859Type / Values
2860
2861`array<string> | null`
2862
2863Details
2864
2865Ordered list of TUI footer status-line item identifiers. `null` disables the status line.
2866
2867Key
2868
2869`tui.terminal_title`
2870
2871Type / Values
2872
2873`array<string> | null`
2874
2875Details
2876
2877Ordered list of terminal window/tab title item identifiers. Defaults to `["spinner", "project"]`; `null` disables title updates.
2878
2879Key
2880
2881`tui.theme`
2882
2883Type / Values
2884
2885`string`
2886
2887Details
2888
2889Syntax-highlighting theme override (kebab-case theme name).
2890
2891Key
2892
2893`web_search`
2894
2895Type / Values
2896
2897`disabled | cached | live`
2898
2899Details
2900
2901Web search mode (default: `"cached"`; cached uses an OpenAI-maintained index and does not fetch live pages; if you use `--yolo` or another full access sandbox setting, it defaults to `"live"`). Use `"live"` to fetch the most recent data from the web, or `"disabled"` to remove the tool.
2902
2903Key
2904
2905`windows_wsl_setup_acknowledged`
2906
2907Type / Values
2908
2909`boolean`
2910
2911Details
2912
2913Track Windows onboarding acknowledgement (Windows only).
2914
2915Key
2916
2917`windows.sandbox`
2918
2919Type / Values
2920
2921`unelevated | elevated`
2922
2923Details
2924
2925Windows-only native sandbox mode when running Codex natively on Windows.
2926
2927Key
2928
2929`windows.sandbox_private_desktop`
2930
2931Type / Values
2932
2933`boolean`
2934
2935Details
2936
2937Run the final sandboxed child process on a private desktop by default on native Windows. Set `false` only for compatibility with the older `Winsta0\\Default` behavior.
2938
2939Expand to view all
2940 1332
2941You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).1333You can find the latest JSON schema for `config.toml` [here](https://developers.openai.com/codex/config-schema.json).
2942 1334
2958Use `[features]` in `requirements.toml` to pin feature flags by the same1350Use `[features]` in `requirements.toml` to pin feature flags by the same
2959canonical keys that `config.toml` uses. Omitted keys remain unconstrained.1351canonical keys that `config.toml` uses. Omitted keys remain unconstrained.
2960 1352
29611353| Key | Type / Values | Details |<ConfigTable
29621354| --- | --- | --- | options={[
29631355| `allowed_approval_policies` | `array<string>` | Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `granular`). | {
29641356| `allowed_approvals_reviewers` | `array<string>` | Allowed values for `approvals_reviewer`, such as `user` and `auto_review`. | key: "allowed_approval_policies",
29651357| `allowed_sandbox_modes` | `array<string>` | Allowed values for `sandbox_mode`. | type: "array<string>",
29661358| `allowed_web_search_modes` | `array<string>` | Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. | description:
29671359| `features` | `table` | Pinned feature values keyed by the canonical names from `config.toml`'s `[features]` table. | "Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `granular`).",
29681360| `features.<name>` | `boolean` | Require a specific canonical feature key to stay enabled or disabled. | },
29691361| `features.browser_use` | `boolean` | Set to `false` in `requirements.toml` to disable Browser Use and Browser Agent availability. | {
29701362| `features.computer_use` | `boolean` | Set to `false` in `requirements.toml` to disable Computer Use availability and related install or enablement flows. | key: "allowed_approvals_reviewers",
29711363| `features.in_app_browser` | `boolean` | Set to `false` in `requirements.toml` to disable the in-app browser pane. | type: "array<string>",
29721364| `guardian_policy_config` | `string` | Managed Markdown policy instructions for automatic review. This takes precedence over local `[auto_review].policy`. Blank values are ignored. | description:
29731365| `hooks` | `table` | Admin-enforced managed lifecycle hooks. Requires a managed hook directory and uses the same event schema as inline `[hooks]` in `config.toml`. | "Allowed values for `approvals_reviewer`, such as `user` and `auto_review`.",
29741366| `hooks.<Event>` | `array<table>` | Matcher groups for a hook event such as `PreToolUse`, `PostToolUse`, `PermissionRequest`, `SessionStart`, `UserPromptSubmit`, or `Stop`. | },
29751367| `hooks.<Event>[].hooks` | `array<table>` | Hook handlers for a matcher group. Command hooks are currently supported; prompt and agent hook handlers are parsed but skipped. | {
29761368| `hooks.managed_dir` | `string (absolute path)` | Directory containing managed hook scripts on macOS and Linux. Codex validates that it is absolute and exists before loading managed hooks. | key: "guardian_policy_config",
29771369| `hooks.windows_managed_dir` | `string (absolute path)` | Directory containing managed hook scripts on Windows. Codex validates that it is absolute and exists before loading managed hooks. | type: "string",
29781370| `mcp_servers` | `table` | Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled. | description:
29791371| `mcp_servers.<id>.identity` | `table` | Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP). | "Managed Markdown policy instructions for automatic review. This takes precedence over local `[auto_review].policy`. Blank values are ignored.",
29801372| `mcp_servers.<id>.identity.command` | `string` | Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command. | },
29811373| `mcp_servers.<id>.identity.url` | `string` | Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL. | {
29821374| `permissions.filesystem.deny_read` | `array<string>` | Admin-enforced filesystem read denials. Entries can be paths or glob patterns, and users cannot weaken them with local config. | key: "allowed_sandbox_modes",
29831375| `remote_sandbox_config` | `array<table>` | Host-specific sandbox requirements. The first entry whose `hostname_patterns` match the resolved host name overrides top-level `allowed_sandbox_modes` for that requirements source. Host-specific entries currently override sandbox modes only. | type: "array<string>",
29841376| `remote_sandbox_config[].allowed_sandbox_modes` | `array<string>` | Allowed sandbox modes to apply when this host-specific entry matches. | description: "Allowed values for `sandbox_mode`.",
29851377| `remote_sandbox_config[].hostname_patterns` | `array<string>` | Case-insensitive host name patterns. Supports `*` for any sequence of characters and `?` for one character. | },
29861378| `rules` | `table` | Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive. | {
29871379| `rules.prefix_rules` | `array<table>` | List of enforced prefix rules. Each rule must include `pattern` and `decision`. | key: "remote_sandbox_config",
29881380| `rules.prefix_rules[].decision` | `prompt | forbidden` | Required. Requirements rules can only prompt or forbid (not allow). | type: "array<table>",
29891381| `rules.prefix_rules[].justification` | `string` | Optional non-empty rationale surfaced in approval prompts or rejection messages. | description:
29901382| `rules.prefix_rules[].pattern` | `array<table>` | Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`. | "Host-specific sandbox requirements. The first entry whose `hostname_patterns` match the resolved host name overrides top-level `allowed_sandbox_modes` for that requirements source. Host-specific entries currently override sandbox modes only.",
29911383| `rules.prefix_rules[].pattern[].any_of` | `array<string>` | A list of allowed alternative tokens at this position. | },
29921384| `rules.prefix_rules[].pattern[].token` | `string` | A single literal token at this position. | {
29931385 key: "remote_sandbox_config[].hostname_patterns",
29941386Key type: "array<string>",
29951387 description:
29961388`allowed_approval_policies` "Case-insensitive host name patterns. Supports `*` for any sequence of characters and `?` for one character.",
29971389 },
29981390Type / Values {
29991391 key: "remote_sandbox_config[].allowed_sandbox_modes",
30001392`array<string>` type: "array<string>",
30011393 description:
30021394Details "Allowed sandbox modes to apply when this host-specific entry matches.",
30031395 },
30041396Allowed values for `approval_policy` (for example `untrusted`, `on-request`, `never`, and `granular`). {
30051397 key: "allowed_web_search_modes",
30061398Key type: "array<string>",
30071399 description:
30081400`allowed_approvals_reviewers` "Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`.",
30091401 },
30101402Type / Values {
30111403 key: "features",
30121404`array<string>` type: "table",
30131405 description:
30141406Details "Pinned feature values keyed by the canonical names from `config.toml`'s `[features]` table.",
30151407 },
30161408Allowed values for `approvals_reviewer`, such as `user` and `auto_review`. {
30171409 key: "features.<name>",
30181410Key type: "boolean",
30191411 description:
30201412`allowed_sandbox_modes` "Require a specific canonical feature key to stay enabled or disabled.",
30211413 },
30221414Type / Values {
30231415 key: "features.in_app_browser",
30241416`array<string>` type: "boolean",
30251417 description:
30261418Details "Set to `false` in `requirements.toml` to disable the in-app browser pane.",
30271419 },
30281420Allowed values for `sandbox_mode`. {
30291421 key: "features.browser_use",
30301422Key type: "boolean",
30311423 description:
30321424`allowed_web_search_modes` "Set to `false` in `requirements.toml` to disable Browser Use and Browser Agent availability.",
30331425 },
30341426Type / Values {
30351427 key: "features.computer_use",
30361428`array<string>` type: "boolean",
30371429 description:
30381430Details "Set to `false` in `requirements.toml` to disable Computer Use availability and related install or enablement flows.",
30391431 },
30401432Allowed values for `web_search` (`disabled`, `cached`, `live`). `disabled` is always allowed; an empty list effectively allows only `disabled`. {
30411433 key: "hooks",
30421434Key type: "table",
30431435 description:
30441436`features` "Admin-enforced managed lifecycle hooks. Requires a managed hook directory and uses the same event schema as inline `[hooks]` in `config.toml`.",
30451437 },
30461438Type / Values {
30471439 key: "hooks.managed_dir",
30481440`table` type: "string (absolute path)",
30491441 description:
30501442Details "Directory containing managed hook scripts on macOS and Linux. Codex validates that it is absolute and exists before loading managed hooks.",
30511443 },
30521444Pinned feature values keyed by the canonical names from `config.toml`'s `[features]` table. {
30531445 key: "hooks.windows_managed_dir",
30541446Key type: "string (absolute path)",
30551447 description:
30561448`features.<name>` "Directory containing managed hook scripts on Windows. Codex validates that it is absolute and exists before loading managed hooks.",
30571449 },
30581450Type / Values {
30591451 key: "hooks.<Event>",
30601452`boolean` type: "array<table>",
30611453 description:
30621454Details "Matcher groups for a hook event such as `PreToolUse`, `PostToolUse`, `PermissionRequest`, `SessionStart`, `UserPromptSubmit`, or `Stop`.",
30631455 },
30641456Require a specific canonical feature key to stay enabled or disabled. {
30651457 key: "hooks.<Event>[].hooks",
30661458Key type: "array<table>",
30671459 description:
30681460`features.browser_use` "Hook handlers for a matcher group. Command hooks are currently supported; prompt and agent hook handlers are parsed but skipped.",
30691461 },
30701462Type / Values {
30711463 key: "permissions.filesystem.deny_read",
30721464`boolean` type: "array<string>",
30731465 description:
30741466Details "Admin-enforced filesystem read denials. Entries can be paths or glob patterns, and users cannot weaken them with local config.",
30751467 },
30761468Set to `false` in `requirements.toml` to disable Browser Use and Browser Agent availability. {
30771469 key: "mcp_servers",
30781470Key type: "table",
30791471 description:
30801472`features.computer_use` "Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled.",
30811473 },
30821474Type / Values {
30831475 key: "mcp_servers.<id>.identity",
30841476`boolean` type: "table",
30851477 description:
30861478Details "Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP).",
30871479 },
30881480Set to `false` in `requirements.toml` to disable Computer Use availability and related install or enablement flows. {
30891481 key: "mcp_servers.<id>.identity.command",
30901482Key type: "string",
30911483 description:
30921484`features.in_app_browser` "Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command.",
30931485 },
30941486Type / Values {
30951487 key: "mcp_servers.<id>.identity.url",
30961488`boolean` type: "string",
30971489 description:
30981490Details "Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL.",
30991491 },
31001492Set to `false` in `requirements.toml` to disable the in-app browser pane. {
31011493 key: "rules",
31021494Key type: "table",
31031495 description:
31041496`guardian_policy_config` "Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive.",
31051497 },
31061498Type / Values {
31071499 key: "rules.prefix_rules",
31081500`string` type: "array<table>",
31091501 description:
31101502Details "List of enforced prefix rules. Each rule must include `pattern` and `decision`.",
31111503 },
31121504Managed Markdown policy instructions for automatic review. This takes precedence over local `[auto_review].policy`. Blank values are ignored. {
31131505 key: "rules.prefix_rules[].pattern",
31141506Key type: "array<table>",
31151507 description:
31161508`hooks` "Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`.",
31171509 },
31181510Type / Values {
31191511 key: "rules.prefix_rules[].pattern[].token",
31201512`table` type: "string",
31211513 description: "A single literal token at this position.",
31221514Details },
31231515 {
31241516Admin-enforced managed lifecycle hooks. Requires a managed hook directory and uses the same event schema as inline `[hooks]` in `config.toml`. key: "rules.prefix_rules[].pattern[].any_of",
31251517 type: "array<string>",
31261518Key description: "A list of allowed alternative tokens at this position.",
31271519 },
31281520`hooks.<Event>` {
31291521 key: "rules.prefix_rules[].decision",
31301522Type / Values type: "prompt | forbidden",
31311523 description:
31321524`array<table>` "Required. Requirements rules can only prompt or forbid (not allow).",
31331525 },
31341526Details {
31351527 key: "rules.prefix_rules[].justification",
31361528Matcher groups for a hook event such as `PreToolUse`, `PostToolUse`, `PermissionRequest`, `SessionStart`, `UserPromptSubmit`, or `Stop`. type: "string",
31371529 description:
31381530Key "Optional non-empty rationale surfaced in approval prompts or rejection messages.",
31391531 },
31401532`hooks.<Event>[].hooks` ]}
31411533 client:load
31421534Type / Values/>
3143
3144`array<table>`
3145
3146Details
3147
3148Hook handlers for a matcher group. Command hooks are currently supported; prompt and agent hook handlers are parsed but skipped.
3149
3150Key
3151
3152`hooks.managed_dir`
3153
3154Type / Values
3155
3156`string (absolute path)`
3157
3158Details
3159
3160Directory containing managed hook scripts on macOS and Linux. Codex validates that it is absolute and exists before loading managed hooks.
3161
3162Key
3163
3164`hooks.windows_managed_dir`
3165
3166Type / Values
3167
3168`string (absolute path)`
3169
3170Details
3171
3172Directory containing managed hook scripts on Windows. Codex validates that it is absolute and exists before loading managed hooks.
3173
3174Key
3175
3176`mcp_servers`
3177
3178Type / Values
3179
3180`table`
3181
3182Details
3183
3184Allowlist of MCP servers that may be enabled. Both the server name (`<id>`) and its identity must match for the MCP server to be enabled. Any configured MCP server not in the allowlist (or with a mismatched identity) is disabled.
3185
3186Key
3187
3188`mcp_servers.<id>.identity`
3189
3190Type / Values
3191
3192`table`
3193
3194Details
3195
3196Identity rule for a single MCP server. Set either `command` (stdio) or `url` (streamable HTTP).
3197
3198Key
3199
3200`mcp_servers.<id>.identity.command`
3201
3202Type / Values
3203
3204`string`
3205
3206Details
3207
3208Allow an MCP stdio server when its `mcp_servers.<id>.command` matches this command.
3209
3210Key
3211
3212`mcp_servers.<id>.identity.url`
3213
3214Type / Values
3215
3216`string`
3217
3218Details
3219
3220Allow an MCP streamable HTTP server when its `mcp_servers.<id>.url` matches this URL.
3221
3222Key
3223
3224`permissions.filesystem.deny_read`
3225
3226Type / Values
3227
3228`array<string>`
3229
3230Details
3231
3232Admin-enforced filesystem read denials. Entries can be paths or glob patterns, and users cannot weaken them with local config.
3233
3234Key
3235
3236`remote_sandbox_config`
3237
3238Type / Values
3239
3240`array<table>`
3241
3242Details
3243
3244Host-specific sandbox requirements. The first entry whose `hostname_patterns` match the resolved host name overrides top-level `allowed_sandbox_modes` for that requirements source. Host-specific entries currently override sandbox modes only.
3245
3246Key
3247
3248`remote_sandbox_config[].allowed_sandbox_modes`
3249
3250Type / Values
3251
3252`array<string>`
3253
3254Details
3255
3256Allowed sandbox modes to apply when this host-specific entry matches.
3257
3258Key
3259
3260`remote_sandbox_config[].hostname_patterns`
3261
3262Type / Values
3263
3264`array<string>`
3265
3266Details
3267
3268Case-insensitive host name patterns. Supports `*` for any sequence of characters and `?` for one character.
3269
3270Key
3271
3272`rules`
3273
3274Type / Values
3275
3276`table`
3277
3278Details
3279
3280Admin-enforced command rules merged with `.rules` files. Requirements rules must be restrictive.
3281
3282Key
3283
3284`rules.prefix_rules`
3285
3286Type / Values
3287
3288`array<table>`
3289
3290Details
3291
3292List of enforced prefix rules. Each rule must include `pattern` and `decision`.
3293
3294Key
3295
3296`rules.prefix_rules[].decision`
3297
3298Type / Values
3299
3300`prompt | forbidden`
3301
3302Details
3303
3304Required. Requirements rules can only prompt or forbid (not allow).
3305
3306Key
3307
3308`rules.prefix_rules[].justification`
3309
3310Type / Values
3311
3312`string`
3313
3314Details
3315
3316Optional non-empty rationale surfaced in approval prompts or rejection messages.
3317
3318Key
3319
3320`rules.prefix_rules[].pattern`
3321
3322Type / Values
3323
3324`array<table>`
3325
3326Details
3327
3328Command prefix expressed as pattern tokens. Each token sets either `token` or `any_of`.
3329
3330Key
3331
3332`rules.prefix_rules[].pattern[].any_of`
3333
3334Type / Values
3335
3336`array<string>`
3337
3338Details
3339
3340A list of allowed alternative tokens at this position.
3341
3342Key
3343
3344`rules.prefix_rules[].pattern[].token`
3345
3346Type / Values
3347
3348`string`
3349
3350Details
3351
3352A single literal token at this position.
3353
3354Expand to view all