windows.md +45 −24
1# Windows1# Windows
2 2
33The easiest way to use Codex on Windows is to [set up the IDE extension](https://developers.openai.com/codex/ide) or [install the CLI](https://developers.openai.com/codex/cli) and run it from PowerShell.The easiest way to use Codex on Windows is to use the [Codex app](https://developers.openai.com/codex/app/windows). You can also [set up the IDE extension](https://developers.openai.com/codex/ide) or [install the CLI](https://developers.openai.com/codex/cli) and run it from PowerShell.
4 4
55When you run Codex natively on Windows, the agent mode uses an experimental Windows sandbox to block filesystem writes outside the working folder and prevent network access without your explicit approval. [Learn more below](#windows-experimental-sandbox).[
6 6
77Instead, you can use [Windows Subsystem for Linux](https://learn.microsoft.com/en-us/windows/wsl/install) (WSL2). WSL2 gives you a Linux shell, Unix-style semantics, and tooling that match many tasks that models see in training.Use the Codex app on Windows
8
9Work across projects, run parallel agent threads, and review results in one place with the native Windows app.](https://developers.openai.com/codex/app/windows)
10
11When you run Codex natively on Windows, agent mode uses a [Windows sandbox](#windows-sandbox) to block filesystem writes outside the working folder and prevent network access without your explicit approval. [Learn more below](#windows-sandbox).
12
13If you prefer to have Codex use [Windows Subsystem for Linux](https://learn.microsoft.com/en-us/windows/wsl/install) (WSL2), [read the instructions](#windows-subsystem-for-linux) below.
14
15## Windows sandbox
16
17Native Windows sandbox support includes two modes that you can configure in `config.toml`:
18
19```
20[windows]
21sandbox = "unelevated" # or "elevated"
22```
23
24How `elevated` mode works:
25
26- Uses a Restricted Token approach with filesystem ACLs to limit which files the sandbox can write to.
27- Runs commands as a dedicated Windows Sandbox User.
28- Limits network access by installing Windows Firewall rules.
29
30### Sandbox permissions
31
32Running Codex in full access mode means Codex is not limited to your project
33 directory and might perform unintentional destructive actions that can lead to
34 data loss. For safer automation, keep sandbox boundaries in place and use
35 [rules](https://developers.openai.com/codex/rules) for specific exceptions, or set your [approval policy to
36 never](https://developers.openai.com/codex/agent-approvals-security#run-without-approval-prompts) to have
37 Codex attempt to solve problems without asking for escalated permissions,
38 based on your [approval and security setup](https://developers.openai.com/codex/agent-approvals-security).
39
40### Grant sandbox read access
41
42When a command fails because the Windows sandbox can't read a directory, use:
43
44```text
45/sandbox-add-read-dir C:\absolute\directory\path
46```
47
48The path must be an existing absolute directory. After the command succeeds, later commands that run in the sandbox can read that directory during the current session.
8 49
9## Windows Subsystem for Linux50## Windows Subsystem for Linux
10 51
81 ```122 ```
82- If you need Windows access to files, they’re under `\wsl$\Ubuntu\home<user>` in Explorer.123- If you need Windows access to files, they’re under `\wsl$\Ubuntu\home<user>` in Explorer.
83 124
84125## Windows experimental sandbox## Troubleshooting and FAQ
85
86The Windows sandbox support is experimental. How it works:
87
88- Launches commands inside a restricted token derived from an AppContainer profile.
89- Grants only specifically requested filesystem capabilities by attaching capability security identifiers to that profile.
90- Disables outbound network access by overriding proxy-related environment variables and inserting stub executables for common network tools.
91
92Its primary limitation is that it can’t prevent file writes, deletions, or creations in any directory where the Everyone SID already has write permissions (for example, world-writable folders). When using the Windows sandbox, Codex scans for folders where Everyone has write access and recommends that you remove that access.
93
94### Grant sandbox read access
95
96When a command fails because the Windows sandbox can't read a directory, use:
97
98```text
99/sandbox-add-read-dir C:\absolute\directory\path
100```
101
102The path must be an existing absolute directory. After the command succeeds, later commands that run in the sandbox can read that directory during the current session.
103
104### Troubleshooting and FAQ
105 126
106#### Installed extension, but it’s unresponsive127#### Installed extension, but it’s unresponsive
107 128