core-agent-ide/codex-rs
gt-oai 2651980bdf
Restrict MCP servers from requirements.toml (#9101)
Enterprises want to restrict the MCP servers their users can use.

Admins can now specify an allowlist of MCPs in `requirements.toml`. The
MCP servers are matched on both Name and Transport (local path or HTTP
URL) -- both must match to allow the MCP server. This prevents
circumventing the allowlist by renaming MCP servers in user config. (It
is still possible to replace the local path e.g. rewrite say
`/usr/local/github-mcp` with a nefarious MCP. We could allow hash
pinning in the future, but that would break updates. I also think this
represents a broader, out-of-scope problem.)

We introduce a new field to Constrained: "normalizer". In general, it is
a fn(T) -> T and applies when `Constrained<T>.set()` is called. In this
particular case, it disables MCP servers which do not match the
allowlist. An alternative solution would remove this and instead throw a
ConstraintError. That would stop Codex launching if any MCP server was
configured which didn't match. I think this is bad.

We currently reuse the enabled flag on MCP servers to disable them, but
don't propagate any information about why they are disabled. I'd like to
add that in a follow up PR, possibly by switching out enabled with an
enum.

In action:

```
# MCP server config has two MCPs. We are going to allowlist one of them.
➜  codex git:(gt/restrict-mcps) ✗ cat ~/.codex/config.toml | grep mcp_servers -A1
[mcp_servers.hello_world]
command = "hello-world-mcp"
--
[mcp_servers.docs]
command = "docs-mcp"

# Restrict the MCPs to the hello_world MCP.
➜  codex git:(gt/restrict-mcps) ✗ defaults read com.openai.codex requirements_toml_base64 | base64 -d
[mcp_server_allowlist.hello_world]
command = "hello-world-mcp"

# List the MCPs, observe hello_world is enabled and docs is disabled.
➜  codex git:(gt/restrict-mcps) ✗ just codex mcp list
cargo run --bin codex -- "$@"
    Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.25s
     Running `target/debug/codex mcp list`
Name         Command          Args  Env  Cwd  Status    Auth
docs         docs-mcp         -     -    -    disabled  Unsupported
hello_world  hello-world-mcp  -     -    -    enabled   Unsupported

# Remove the restrictions.
➜  codex git:(gt/restrict-mcps) ✗ defaults delete com.openai.codex requirements_toml_base64

# Observe both MCPs are enabled.
➜  codex git:(gt/restrict-mcps) ✗ just codex mcp list
cargo run --bin codex -- "$@"
    Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.25s
     Running `target/debug/codex mcp list`
Name         Command          Args  Env  Cwd  Status   Auth
docs         docs-mcp         -     -    -    enabled  Unsupported
hello_world  hello-world-mcp  -     -    -    enabled  Unsupported

# A new requirements that updates the command to one that does not match.
➜  codex git:(gt/restrict-mcps) ✗ cat ~/requirements.toml
[mcp_server_allowlist.hello_world]
command = "hello-world-mcp-v2"

# Use those requirements.
➜  codex git:(gt/restrict-mcps) ✗ defaults write com.openai.codex requirements_toml_base64 "$(base64 -i /Users/gt/requirements.toml)"

# Observe both MCPs are disabled.
➜  codex git:(gt/restrict-mcps) ✗ just codex mcp list
cargo run --bin codex -- "$@"
    Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.75s
     Running `target/debug/codex mcp list`
Name         Command          Args  Env  Cwd  Status    Auth
docs         docs-mcp         -     -    -    disabled  Unsupported
hello_world  hello-world-mcp  -     -    -    disabled  Unsupported
```
2026-01-13 19:45:00 +00:00
..
.cargo chore(ci): add cargo audit workflow and policy (#7108) 2025-11-24 12:20:55 -08:00
.config fix flaky test: approval_matrix_covers_all_modes (#7028) 2025-11-20 14:37:42 -08:00
.github/workflows chore(ci): add cargo audit workflow and policy (#7108) 2025-11-24 12:20:55 -08:00
ansi-escape feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
app-server Restrict MCP servers from requirements.toml (#9101) 2026-01-13 19:45:00 +00:00
app-server-protocol feat: hot reload mcp servers (#8957) 2026-01-12 11:17:50 -08:00
app-server-test-client feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
apply-patch feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
arg0 fix: harden arg0 helper PATH handling (#8766) 2026-01-09 12:35:54 -08:00
async-utils feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
backend-client feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
chatgpt feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
cli Restrict MCP servers from requirements.toml (#9101) 2026-01-13 19:45:00 +00:00
cloud-tasks feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
cloud-tasks-client feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
codex-api Support response.done and add integration tests (#9129) 2026-01-13 16:12:30 +00:00
codex-backend-openapi-models feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
codex-client Add URL to responses error messages (#8984) 2026-01-10 00:53:47 +00:00
common ollama: default to Responses API for built-ins (#8798) 2026-01-13 09:51:41 -08:00
core Restrict MCP servers from requirements.toml (#9101) 2026-01-13 19:45:00 +00:00
debug-client chore: add small debug client (#8894) 2026-01-08 13:40:14 +00:00
docs feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
exec ollama: default to Responses API for built-ins (#8798) 2026-01-13 09:51:41 -08:00
exec-server feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
execpolicy fix: prompt for unsafe commands on Windows (#9117) 2026-01-12 21:30:09 -08:00
execpolicy-legacy feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
feedback feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
file-search feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
keyring-store feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
linux-sandbox feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
lmstudio chore(deps): bump which from 6.0.3 to 8.0.0 in /codex-rs (#9074) 2026-01-12 10:14:00 -08:00
login feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
mcp-server Assemble sandbox/approval/network prompts dynamically (#8961) 2026-01-12 23:12:59 +00:00
mcp-types feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
ollama ollama: default to Responses API for built-ins (#8798) 2026-01-13 09:51:41 -08:00
otel fix: drop session span at end of the session (#9126) 2026-01-13 11:36:00 -08:00
process-hardening feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
protocol Use markdown for migration screen (#8952) 2026-01-13 07:41:42 +00:00
responses-api-proxy feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
rmcp-client add generated jsonschema for config.toml (#8956) 2026-01-13 10:22:51 -08:00
scripts remove release script (#7885) 2025-12-11 13:40:48 -08:00
stdio-to-uds feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
tui Restrict MCP servers from requirements.toml (#9101) 2026-01-13 19:45:00 +00:00
tui2 Restrict MCP servers from requirements.toml (#9101) 2026-01-13 19:45:00 +00:00
utils feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
windows-sandbox-rs feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
.gitignore [MCP] Prefix MCP tools names with mcp__ (#5309) 2025-10-19 20:41:55 -04:00
BUILD.bazel feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
Cargo.lock add generated jsonschema for config.toml (#8956) 2026-01-13 10:22:51 -08:00
Cargo.toml ollama: default to Responses API for built-ins (#8798) 2026-01-13 09:51:41 -08:00
clippy.toml fix: switch rate limit reset handling to timestamps (#5304) 2025-10-17 17:39:37 -07:00
code Send text parameter for non-gpt-5 models (#4195) 2025-09-24 22:00:06 +00:00
config.md Fix link to MCP Servers config section (#5301) 2025-10-17 14:58:27 -07:00
default.nix fix: drop stale filedescriptor output hash for nix (#7865) 2025-12-11 10:43:50 -08:00
deny.toml fix: upgrade lru crate to 0.16.3 (#8845) 2026-01-07 10:11:27 -08:00
README.md chore: update outdated docs (#8701) 2026-01-03 02:19:52 -08:00
rust-toolchain.toml chore: upgrade to Rust 1.90 (#4124) 2025-09-24 08:32:00 -07:00
rustfmt.toml Update cargo to 2024 edition (#842) 2025-05-07 08:37:48 -07:00

Codex CLI (Rust Implementation)

We provide Codex CLI as a standalone, native executable to ensure a zero-dependency install.

Installing Codex

Today, the easiest way to install Codex is via npm:

npm i -g @openai/codex
codex

You can also install via Homebrew (brew install --cask codex) or download a platform-specific release directly from our GitHub Releases.

Documentation quickstart

What's new in the Rust CLI

The Rust implementation is now the maintained Codex CLI and serves as the default experience. It includes a number of features that the legacy TypeScript CLI never supported.

Config

Codex supports a rich set of configuration options. Note that the Rust CLI uses config.toml instead of config.json. See docs/config.md for details.

Model Context Protocol Support

MCP client

Codex CLI functions as an MCP client that allows the Codex CLI and IDE extension to connect to MCP servers on startup. See the configuration documentation for details.

MCP server (experimental)

Codex can be launched as an MCP server by running codex mcp-server. This allows other MCP clients to use Codex as a tool for another agent.

Use the @modelcontextprotocol/inspector to try it out:

npx @modelcontextprotocol/inspector codex mcp-server

Use codex mcp to add/list/get/remove MCP server launchers defined in config.toml, and codex mcp-server to run the MCP server directly.

Notifications

You can enable notifications by configuring a script that is run whenever the agent finishes a turn. The notify documentation includes a detailed example that explains how to get desktop notifications via terminal-notifier on macOS. When Codex detects that it is running under WSL 2 inside Windows Terminal (WT_SESSION is set), the TUI automatically falls back to native Windows toast notifications so approval prompts and completed turns surface even though Windows Terminal does not implement OSC 9.

codex exec to run Codex programmatically/non-interactively

To run Codex non-interactively, run codex exec PROMPT (you can also pass the prompt via stdin) and Codex will work on your task until it decides that it is done and exits. Output is printed to the terminal directly. You can set the RUST_LOG environment variable to see more about what's going on.

Experimenting with the Codex Sandbox

To test to see what happens when a command is run under the sandbox provided by Codex, we provide the following subcommands in Codex CLI:

# macOS
codex sandbox macos [--full-auto] [--log-denials] [COMMAND]...

# Linux
codex sandbox linux [--full-auto] [COMMAND]...

# Windows
codex sandbox windows [--full-auto] [COMMAND]...

# Legacy aliases
codex debug seatbelt [--full-auto] [--log-denials] [COMMAND]...
codex debug landlock [--full-auto] [COMMAND]...

Selecting a sandbox policy via --sandbox

The Rust CLI exposes a dedicated --sandbox (-s) flag that lets you pick the sandbox policy without having to reach for the generic -c/--config option:

# Run Codex with the default, read-only sandbox
codex --sandbox read-only

# Allow the agent to write within the current workspace while still blocking network access
codex --sandbox workspace-write

# Danger! Disable sandboxing entirely (only do this if you are already running in a container or other isolated env)
codex --sandbox danger-full-access

The same setting can be persisted in ~/.codex/config.toml via the top-level sandbox_mode = "MODE" key, e.g. sandbox_mode = "workspace-write".

Code Organization

This folder is the root of a Cargo workspace. It contains quite a bit of experimental code, but here are the key crates:

  • core/ contains the business logic for Codex. Ultimately, we hope this to be a library crate that is generally useful for building other Rust/native applications that use Codex.
  • exec/ "headless" CLI for use in automation.
  • tui/ CLI that launches a fullscreen TUI built with Ratatui.
  • cli/ CLI multitool that provides the aforementioned CLIs via subcommands.