Replies: 3 comments 2 replies
-
|
At least on macOS we could leverage the sanbox adding some filter up: this will totally hide files from the sandbox reaching the best level of security. https://github.com/openai/codex/blob/main/codex-rs/core/src/seatbelt.rs I don't know how claude code is operating on this but it seems that can give this sort of security: https://www.devproblems.com/securing-claude-code-protecting-your-sensitive-files-like-env/ IMHO having a protection at sandbox level gives the best guarantee. |
Beta Was this translation helpful? Give feedback.
-
🧱 macOS —
|
Beta Was this translation helpful? Give feedback.
-
|
Great thread, my guy! |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Summary
During testing with Codex CLI, I noticed an important nuance regarding how ignored files are handled:
@(e.g.@config/settings.py), files listed in.gitignoreare not included in the model context — which is great.rg,cat, or other workspace-wide searches, those same ignored files can still be read locally and their contents may appear in Codex responses.This raises some uncertainty about how to safely handle sensitive information (like
.envfiles, credentials, or local configs) that might be present in the workspace but should never be exposed to the model or remote context.Questions
rg,cat, search, or summarization commands)?.gitignoreor.envpatterns)?Why this matters
In practice, developers often have secrets or credentials stored in
.env,.json, or config files within the same repository.Even if those files are ignored by Git, it’s unclear whether Codex might still read them locally when using tools like
rgor global context searches.It would be extremely helpful to have:
Thanks for clarifying this — it’s key for safely using Codex in real development environments.
Beta Was this translation helpful? Give feedback.
All reactions