2026-01-23 20:47:09 -05:00
|
|
|
# codex-network-proxy
|
|
|
|
|
|
|
|
|
|
`codex-network-proxy` is Codex's local network policy enforcement proxy. It runs:
|
|
|
|
|
|
|
|
|
|
- an HTTP proxy (default `127.0.0.1:3128`)
|
2026-02-10 15:13:52 -08:00
|
|
|
- a SOCKS5 proxy (default `127.0.0.1:8081`, enabled by default)
|
2026-01-23 20:47:09 -05:00
|
|
|
- an admin HTTP API (default `127.0.0.1:8080`)
|
|
|
|
|
|
|
|
|
|
It enforces an allow/deny policy and a "limited" mode intended for read-only network access.
|
|
|
|
|
|
|
|
|
|
## Quickstart
|
|
|
|
|
|
|
|
|
|
### 1) Configure
|
|
|
|
|
|
|
|
|
|
`codex-network-proxy` reads from Codex's merged `config.toml` (via `codex-core` config loading).
|
|
|
|
|
|
|
|
|
|
Example config:
|
|
|
|
|
|
|
|
|
|
```toml
|
2026-02-06 21:22:44 -08:00
|
|
|
[network]
|
2026-01-23 20:47:09 -05:00
|
|
|
enabled = true
|
|
|
|
|
proxy_url = "http://127.0.0.1:3128"
|
|
|
|
|
admin_url = "http://127.0.0.1:8080"
|
2026-02-10 15:13:52 -08:00
|
|
|
# SOCKS5 listener (enabled by default).
|
|
|
|
|
enable_socks5 = true
|
2026-01-27 10:09:39 -08:00
|
|
|
socks_url = "http://127.0.0.1:8081"
|
2026-02-10 15:13:52 -08:00
|
|
|
enable_socks5_udp = true
|
2026-01-23 20:47:09 -05:00
|
|
|
# When `enabled` is false, the proxy no-ops and does not bind listeners.
|
|
|
|
|
# When true, respect HTTP(S)_PROXY/ALL_PROXY for upstream requests (HTTP(S) proxies only),
|
|
|
|
|
# including CONNECT tunnels in full mode.
|
2026-02-10 15:13:52 -08:00
|
|
|
allow_upstream_proxy = true
|
2026-01-23 20:47:09 -05:00
|
|
|
# By default, non-loopback binds are clamped to loopback for safety.
|
|
|
|
|
# If you want to expose these listeners beyond localhost, you must opt in explicitly.
|
|
|
|
|
dangerously_allow_non_loopback_proxy = false
|
|
|
|
|
dangerously_allow_non_loopback_admin = false
|
2026-01-27 10:09:39 -08:00
|
|
|
mode = "full" # default when unset; use "limited" for read-only mode
|
2026-02-24 10:15:15 -08:00
|
|
|
# When true, HTTPS CONNECT can be terminated so limited-mode method policy still applies.
|
|
|
|
|
mitm = false
|
|
|
|
|
# CA cert/key are managed internally under $CODEX_HOME/proxy/ (ca.pem + ca.key).
|
2026-01-23 20:47:09 -05:00
|
|
|
|
|
|
|
|
# Hosts must match the allowlist (unless denied).
|
|
|
|
|
# If `allowed_domains` is empty, the proxy blocks requests until an allowlist is configured.
|
2026-02-10 15:13:52 -08:00
|
|
|
allowed_domains = ["*.openai.com", "localhost", "127.0.0.1", "::1"]
|
2026-01-23 20:47:09 -05:00
|
|
|
denied_domains = ["evil.example"]
|
|
|
|
|
|
|
|
|
|
# If false, local/private networking is rejected. Explicit allowlisting of local IP literals
|
|
|
|
|
# (or `localhost`) is required to permit them.
|
|
|
|
|
# Hostnames that resolve to local/private IPs are still blocked even if allowlisted.
|
2026-02-10 15:13:52 -08:00
|
|
|
allow_local_binding = true
|
2026-01-23 20:47:09 -05:00
|
|
|
|
|
|
|
|
# macOS-only: allows proxying to a unix socket when request includes `x-unix-socket: /path`.
|
|
|
|
|
allow_unix_sockets = ["/tmp/example.sock"]
|
2026-02-20 10:56:57 -08:00
|
|
|
# DANGEROUS (macOS-only): bypasses unix socket allowlisting and permits any
|
|
|
|
|
# absolute socket path from `x-unix-socket`.
|
|
|
|
|
dangerously_allow_all_unix_sockets = false
|
2026-01-23 20:47:09 -05:00
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### 2) Run the proxy
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
|
cargo run -p codex-network-proxy --
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### 3) Point a client at it
|
|
|
|
|
|
|
|
|
|
For HTTP(S) traffic:
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
|
export HTTP_PROXY="http://127.0.0.1:3128"
|
|
|
|
|
export HTTPS_PROXY="http://127.0.0.1:3128"
|
2026-02-17 13:49:43 -08:00
|
|
|
export WS_PROXY="http://127.0.0.1:3128"
|
|
|
|
|
export WSS_PROXY="http://127.0.0.1:3128"
|
2026-01-23 20:47:09 -05:00
|
|
|
```
|
|
|
|
|
|
2026-01-27 10:09:39 -08:00
|
|
|
For SOCKS5 traffic (when `enable_socks5 = true`):
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
|
export ALL_PROXY="socks5h://127.0.0.1:8081"
|
|
|
|
|
```
|
|
|
|
|
|
2026-01-23 20:47:09 -05:00
|
|
|
### 4) Understand blocks / debugging
|
|
|
|
|
|
|
|
|
|
When a request is blocked, the proxy responds with `403` and includes:
|
|
|
|
|
|
|
|
|
|
- `x-proxy-error`: one of:
|
|
|
|
|
- `blocked-by-allowlist`
|
|
|
|
|
- `blocked-by-denylist`
|
|
|
|
|
- `blocked-by-method-policy`
|
|
|
|
|
- `blocked-by-policy`
|
|
|
|
|
|
2026-02-24 10:15:15 -08:00
|
|
|
In "limited" mode, only `GET`, `HEAD`, and `OPTIONS` are allowed. HTTPS `CONNECT` requests require
|
|
|
|
|
MITM to enforce limited-mode method policy; otherwise they are blocked. SOCKS5 remains blocked in
|
|
|
|
|
limited mode.
|
2026-01-23 20:47:09 -05:00
|
|
|
|
2026-02-17 13:49:43 -08:00
|
|
|
Websocket clients typically tunnel `wss://` through HTTPS `CONNECT`; those CONNECT targets still go
|
|
|
|
|
through the same host allowlist/denylist checks.
|
|
|
|
|
|
2026-01-23 20:47:09 -05:00
|
|
|
## Library API
|
|
|
|
|
|
|
|
|
|
`codex-network-proxy` can be embedded as a library with a thin API:
|
|
|
|
|
|
|
|
|
|
```rust
|
|
|
|
|
use codex_network_proxy::{NetworkProxy, NetworkDecision, NetworkPolicyRequest};
|
|
|
|
|
|
|
|
|
|
let proxy = NetworkProxy::builder()
|
|
|
|
|
.http_addr("127.0.0.1:8080".parse()?)
|
|
|
|
|
.admin_addr("127.0.0.1:9000".parse()?)
|
|
|
|
|
.policy_decider(|request: NetworkPolicyRequest| async move {
|
|
|
|
|
// Example: auto-allow when exec policy already approved a command prefix.
|
|
|
|
|
if let Some(command) = request.command.as_deref() {
|
|
|
|
|
if command.starts_with("curl ") {
|
|
|
|
|
return NetworkDecision::Allow;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
NetworkDecision::Deny {
|
|
|
|
|
reason: "policy_denied".to_string(),
|
|
|
|
|
}
|
|
|
|
|
})
|
|
|
|
|
.build()
|
|
|
|
|
.await?;
|
|
|
|
|
|
|
|
|
|
let handle = proxy.run().await?;
|
|
|
|
|
handle.shutdown().await?;
|
|
|
|
|
```
|
|
|
|
|
|
2026-02-20 10:56:57 -08:00
|
|
|
When unix socket proxying is enabled (`allow_unix_sockets` or
|
|
|
|
|
`dangerously_allow_all_unix_sockets`), HTTP/admin bind overrides are still clamped to loopback to
|
|
|
|
|
avoid turning the proxy into a remote bridge to local daemons.
|
2026-01-23 20:47:09 -05:00
|
|
|
|
|
|
|
|
### Policy hook (exec-policy mapping)
|
|
|
|
|
|
|
|
|
|
The proxy exposes a policy hook (`NetworkPolicyDecider`) that can override allowlist-only blocks.
|
|
|
|
|
It receives `command` and `exec_policy_hint` fields when supplied by the embedding app. This lets
|
|
|
|
|
core map exec approvals to network access, e.g. if a user already approved `curl *` for a session,
|
|
|
|
|
the decider can auto-allow network requests originating from that command.
|
|
|
|
|
|
|
|
|
|
**Important:** Explicit deny rules still win. The decider only gets a chance to override
|
|
|
|
|
`not_allowed` (allowlist misses), not `denied` or `not_allowed_local`.
|
|
|
|
|
|
feat(network-proxy): add embedded OTEL policy audit logging (#12046)
**PR Summary**
This PR adds embedded-only OTEL policy audit logging for
`codex-network-proxy` and threads audit metadata from `codex-core` into
managed proxy startup.
### What changed
- Added structured audit event emission in `network_policy.rs` with
target `codex_otel.network_proxy`.
- Emitted:
- `codex.network_proxy.domain_policy_decision` once per domain-policy
evaluation.
- `codex.network_proxy.block_decision` for non-domain denies.
- Added required policy/network fields, RFC3339 UTC millisecond
`event.timestamp`, and fallback defaults (`http.request.method="none"`,
`client.address="unknown"`).
- Added non-domain deny audit emission in HTTP/SOCKS handlers for
mode-guard and proxy-state denies, including unix-socket deny paths.
- Added `REASON_UNIX_SOCKET_UNSUPPORTED` and used it for unsupported
unix-socket auditing.
- Added `NetworkProxyAuditMetadata` to runtime/state, re-exported from
`lib.rs` and `state.rs`.
- Added `start_proxy_with_audit_metadata(...)` in core config, with
`start_proxy()` delegating to default metadata.
- Wired metadata construction in `codex.rs` from session/auth context,
including originator sanitization for OTEL-safe tagging.
- Updated `network-proxy/README.md` with embedded-mode audit schema and
behavior notes.
- Refactored HTTP block-audit emission to a small local helper to reduce
duplication.
- Preserved existing unix-socket proxy-disabled host/path behavior for
responses and blocked history while using an audit-only endpoint
override (`server.address="unix-socket"`, `server.port=0`).
### Explicit exclusions
- No standalone proxy OTEL startup work.
- No `main.rs` binary wiring.
- No `standalone_otel.rs`.
- No standalone docs/tests.
### Tests
- Extended `network_policy.rs` tests for event mapping, metadata
propagation, fallbacks, timestamp format, and target prefix.
- Extended HTTP tests to assert unix-socket deny block audit events.
- Extended SOCKS tests to cover deny emission from handler deny
branches.
- Added/updated core tests to verify audit metadata threading into
managed proxy state.
### Validation run
- `just fmt`
- `cargo test -p codex-network-proxy` ✅
- `cargo test -p codex-core` ran with one unrelated flaky timeout
(`shell_snapshot::tests::snapshot_shell_does_not_inherit_stdin`), and
the test passed when rerun directly ✅
---------
Co-authored-by: viyatb-oai <viyatb@openai.com>
2026-02-25 11:46:37 -05:00
|
|
|
## OTEL Audit Events (embedded/managed)
|
|
|
|
|
|
|
|
|
|
When `codex-network-proxy` is embedded in managed Codex runtime, policy decisions emit structured
|
|
|
|
|
OTEL-compatible events with `target=codex_otel.network_proxy`.
|
|
|
|
|
|
|
|
|
|
Event name:
|
|
|
|
|
|
|
|
|
|
- `codex.network_proxy.policy_decision`
|
|
|
|
|
- emitted for each policy decision (`domain` and `non_domain`).
|
|
|
|
|
- `network.policy.scope = "domain"` for host-policy evaluations (`evaluate_host_policy`).
|
|
|
|
|
- `network.policy.scope = "non_domain"` for mode-guard/proxy-state checks (including unix-socket guard paths and unix-socket allow decisions).
|
|
|
|
|
|
|
|
|
|
Common fields:
|
|
|
|
|
|
|
|
|
|
- `event.name`
|
|
|
|
|
- `event.timestamp` (RFC3339 UTC, millisecond precision)
|
|
|
|
|
- optional metadata:
|
|
|
|
|
- `conversation.id`
|
|
|
|
|
- `app.version`
|
|
|
|
|
- `user.account_id`
|
|
|
|
|
- policy/network:
|
|
|
|
|
- `network.policy.scope` (`domain` or `non_domain`)
|
|
|
|
|
- `network.policy.decision` (`allow`, `deny`, or `ask`)
|
|
|
|
|
- `network.policy.source` (`baseline_policy`, `mode_guard`, `proxy_state`, `decider`)
|
|
|
|
|
- `network.policy.reason`
|
|
|
|
|
- `network.transport.protocol`
|
|
|
|
|
- `server.address`
|
|
|
|
|
- `server.port`
|
|
|
|
|
- `http.request.method` (defaults to `"none"` when absent)
|
|
|
|
|
- `client.address` (defaults to `"unknown"` when absent)
|
|
|
|
|
- `network.policy.override` (`true` only when decider-allow overrides baseline `not_allowed`)
|
|
|
|
|
|
|
|
|
|
Unix-socket block-path audits use sentinel endpoint values:
|
|
|
|
|
|
|
|
|
|
- `server.address = "unix-socket"`
|
|
|
|
|
- `server.port = 0`
|
|
|
|
|
|
|
|
|
|
Audit events intentionally avoid logging full URL/path/query data.
|
|
|
|
|
|
2026-01-23 20:47:09 -05:00
|
|
|
## Admin API
|
|
|
|
|
|
|
|
|
|
The admin API is a small HTTP server intended for debugging and runtime adjustments.
|
|
|
|
|
|
|
|
|
|
Endpoints:
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
|
curl -sS http://127.0.0.1:8080/health
|
|
|
|
|
curl -sS http://127.0.0.1:8080/config
|
|
|
|
|
curl -sS http://127.0.0.1:8080/patterns
|
|
|
|
|
curl -sS http://127.0.0.1:8080/blocked
|
|
|
|
|
|
|
|
|
|
# Switch modes without restarting:
|
|
|
|
|
curl -sS -X POST http://127.0.0.1:8080/mode -d '{"mode":"full"}'
|
|
|
|
|
|
|
|
|
|
# Force a config reload:
|
|
|
|
|
curl -sS -X POST http://127.0.0.1:8080/reload
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
## Platform notes
|
|
|
|
|
|
|
|
|
|
- Unix socket proxying via the `x-unix-socket` header is **macOS-only**; other platforms will
|
|
|
|
|
reject unix socket requests.
|
feat: enable premessage-deflate for websockets (#10966)
note:
unfortunately, tokio-tungstenite / tungstenite upgrade triggers some
problems with linker of rama-tls-boring with openssl:
```
error: linking with `/Users/apanasenko/Library/Caches/cargo-zigbuild/0.20.1/zigcc-x86_64-unknown-linux-musl-ff6a.sh` failed: exit status: 1
|
= note: "/Users/apanasenko/Library/Caches/cargo-zigbuild/0.20.1/zigcc-x86_64-unknown-linux-musl-ff6a.sh" "-m64" "<sysroot>/lib/rustlib/x86_64-unknown-linux-musl/lib/self-contained/rcrt1.o" "<sysroot>/lib/rustlib/x86_64-unknown-linux-musl/lib/self-contained/crti.o" "<sysroot>/lib/rustlib/x86_64-unknown-linux-musl/lib/self-contained/crtbeginS.o" "<1 object files omitted>" "-Wl,--as-needed" "-Wl,-Bstatic" "/var/folders/kt/52y_g75x3ng8ktvk3rfwm6400000gp/T/rustcyGQdYm/{liblzma_sys-662a82316f96ec30,libbzip2_sys-bf78a2d58d5cbce6,liblibsqlite3_sys-6c004987fd67a36a,libtree_sitter_bash-220b99a97d331ab7,libtree_sitter-858f0a1dbfea58bd,libzstd_sys-6eb237deec748c5b,libring-2a87376483bf916f,libopenssl_sys-7c189e68b37fe2bb,liblibz_sys-4344eef4345520b1,librama_boring_sys-0414e98115015ee0}.rlib" "-lc++" "-lc++abi" "-lunwind" "-lc" "<sysroot>/lib/rustlib/x86_64-unknown-linux-musl/lib/libcompiler_builtins-*.rlib" "-L" "/var/folders/kt/52y_g75x3ng8ktvk3rfwm6400000gp/T/rustcyGQdYm/raw-dylibs" "-Wl,-Bdynamic" "-Wl,--eh-frame-hdr" "-Wl,-z,noexecstack" "-nostartfiles" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/libz-sys-ff5ea50d88c28ffb/out/lib" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/ring-bdec3dddc19f5a5e/out" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/openssl-sys-96e0870de3ca22bc/out/openssl-build/install/lib" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/zstd-sys-0cc37a5da1481740/out" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/tree-sitter-72d2418073317c0f/out" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/tree-sitter-bash-bfd293a9f333ce6a/out" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/libsqlite3-sys-b78b2cfb81a330fc/out" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/bzip2-sys-69a145cc859ef275/out/lib" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/lzma-sys-07e92d0b6baa6fd4/out" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/rama-boring-sys-0bc2dfbf669addc4/out/build/crypto/" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/rama-boring-sys-0bc2dfbf669addc4/out/build/ssl/" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/rama-boring-sys-0bc2dfbf669addc4/out/build/" "-L" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/rama-boring-sys-0bc2dfbf669addc4/out/build" "-L" "<sysroot>/lib/rustlib/x86_64-unknown-linux-musl/lib/self-contained" "-L" "<sysroot>/lib/rustlib/x86_64-unknown-linux-musl/lib" "-o" "/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/deps/codex_network_proxy-d08268b863517761" "-Wl,--gc-sections" "-static-pie" "-Wl,-z,relro,-z,now" "-Wl,-O1" "-Wl,--strip-all" "-nodefaultlibs" "<sysroot>/lib/rustlib/x86_64-unknown-linux-musl/lib/self-contained/crtendS.o" "<sysroot>/lib/rustlib/x86_64-unknown-linux-musl/lib/self-contained/crtn.o"
= note: some arguments are omitted. use `--verbose` to show all linker arguments
= note: warning: ignoring deprecated linker optimization setting '1'
warning: unable to open library directory '/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/rama-boring-sys-0bc2dfbf669addc4/out/build/crypto/': FileNotFound
ld.lld: error: duplicate symbol: SSL_export_keying_material
>>> defined at ssl_lib.c:3816 (ssl/ssl_lib.c:3816)
>>> libssl-lib-ssl_lib.o:(SSL_export_keying_material) in archive /var/folders/kt/52y_g75x3ng8ktvk3rfwm6400000gp/T/rustcyGQdYm/libopenssl_sys-7c189e68b37fe2bb.rlib
>>> defined at t1_enc.cc:205 (/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/rama-boring-sys-0bc2dfbf669addc4/out/boringssl/ssl/t1_enc.cc:205)
>>> t1_enc.cc.o:(.text.SSL_export_keying_material+0x0) in archive /var/folders/kt/52y_g75x3ng8ktvk3rfwm6400000gp/T/rustcyGQdYm/librama_boring_sys-0414e98115015ee0.rlib
ld.lld: error: duplicate symbol: d2i_ASN1_TIME
>>> defined at a_time.c:27 (crypto/asn1/a_time.c:27)
>>> libcrypto-lib-a_time.o:(d2i_ASN1_TIME) in archive /var/folders/kt/52y_g75x3ng8ktvk3rfwm6400000gp/T/rustcyGQdYm/libopenssl_sys-7c189e68b37fe2bb.rlib
>>> defined at a_time.cc:34 (/Users/apanasenko/code/codex/codex-rs/target/x86_64-unknown-linux-musl/release/build/rama-boring-sys-0bc2dfbf669addc4/out/boringssl/crypto/asn1/a_time.cc:34)
>>> a_time.cc.o:(.text.d2i_ASN1_TIME+0x0) in archive /var/folders/kt/52y_g75x3ng8ktvk3rfwm6400000gp/T/rustcyGQdYm/librama_boring_sys-0414e98115015ee0.rlib
```
that force me to migrate away from rama-tls-boring to rama-tls-rustls
and pin `ring` for rustls.
2026-02-07 17:59:34 -08:00
|
|
|
- HTTPS tunneling uses rustls via Rama's `rama-tls-rustls`; this avoids BoringSSL/OpenSSL symbol
|
|
|
|
|
collisions in mixed TLS dependency graphs.
|
2026-01-23 20:47:09 -05:00
|
|
|
|
|
|
|
|
## Security notes (important)
|
|
|
|
|
|
|
|
|
|
This section documents the protections implemented by `codex-network-proxy`, and the boundaries of
|
|
|
|
|
what it can reasonably guarantee.
|
|
|
|
|
|
|
|
|
|
- Allowlist-first policy: if `allowed_domains` is empty, requests are blocked until an allowlist is configured.
|
|
|
|
|
- Deny wins: entries in `denied_domains` always override the allowlist.
|
|
|
|
|
- Local/private network protection: when `allow_local_binding = false`, the proxy blocks loopback
|
|
|
|
|
and common private/link-local ranges. Explicit allowlisting of local IP literals (or `localhost`)
|
|
|
|
|
is required to permit them; hostnames that resolve to local/private IPs are still blocked even if
|
|
|
|
|
allowlisted (best-effort DNS lookup).
|
|
|
|
|
- Limited mode enforcement:
|
|
|
|
|
- only `GET`, `HEAD`, and `OPTIONS` are allowed
|
|
|
|
|
- HTTPS `CONNECT` remains a tunnel; limited-mode method enforcement does not apply to HTTPS
|
|
|
|
|
- Listener safety defaults:
|
|
|
|
|
- the admin API is unauthenticated; non-loopback binds are clamped unless explicitly enabled via
|
|
|
|
|
`dangerously_allow_non_loopback_admin`
|
|
|
|
|
- the HTTP proxy listener similarly clamps non-loopback binds unless explicitly enabled via
|
|
|
|
|
`dangerously_allow_non_loopback_proxy`
|
|
|
|
|
- when unix socket proxying is enabled, both listeners are forced to loopback to avoid turning the
|
|
|
|
|
proxy into a remote bridge into local daemons.
|
2026-02-20 10:56:57 -08:00
|
|
|
- `dangerously_allow_all_unix_sockets = true` bypasses the unix socket allowlist entirely (still
|
|
|
|
|
macOS-only and absolute-path-only). Use only in tightly controlled environments.
|
2026-01-23 20:47:09 -05:00
|
|
|
- `enabled` is enforced at runtime; when false the proxy no-ops and does not bind listeners.
|
|
|
|
|
Limitations:
|
|
|
|
|
|
|
|
|
|
- DNS rebinding is hard to fully prevent without pinning the resolved IP(s) all the way down to the
|
|
|
|
|
transport layer. If your threat model includes hostile DNS, enforce network egress at a lower
|
|
|
|
|
layer too (e.g., firewall / VPC / corporate proxy policies).
|