core-agent-ide/codex-rs/windows-sandbox-rs
iceweasel-oai 14de492985
copy current exe to CODEX_HOME/.sandbox-bin for apply_patch (#13669)
We do this for codex-command-runner.exe as well for the same reason.
Windows sandbox users cannot execute binaries in the WindowsApp/
installed directory for the Codex App. This causes apply-patch to fail
because it tries to execute codex.exe as the sandbox user.
2026-03-05 22:15:10 -08:00
..
src copy current exe to CODEX_HOME/.sandbox-bin for apply_patch (#13669) 2026-03-05 22:15:10 -08:00
BUILD.bazel feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
build.rs Elevated Sandbox 2 (#7792) 2025-12-10 21:23:16 -08:00
Cargo.toml copy command-runner to CODEX_HOME so sandbox users can always execute it (#13413) 2026-03-04 01:31:37 +00:00
codex-windows-sandbox-setup.manifest Elevated Sandbox 2 (#7792) 2025-12-10 21:23:16 -08:00
sandbox_smoketests.py smoketest for browser vuln, rough draft of Windows security doc (#6822) 2025-11-18 16:43:34 -08:00