core-agent-ide/codex-rs
Owen Lin c3736cff0a
feat(otel): safe tracing (#13626)
### Motivation
Today config.toml has three different OTEL knobs under `[otel]`:
- `exporter` controls where OTEL logs go
- `trace_exporter` controls where OTEL traces go
- `metrics_exporter` controls where metrics go

Those often (pretty much always?) serve different purposes.

For example, for OpenAI internal usage, the **log exporter** is already
being used for IT/security telemetry, and that use case is intentionally
content-rich: tool calls, arguments, outputs, MCP payloads, and in some
cases user content are all useful there. `log_user_prompt` is a good
example of that distinction. When it’s enabled, we include raw prompt
text in OTEL logs, which is acceptable for the security use case.

The **trace exporter** is a different story. The goal there is to give
OpenAI engineers visibility into latency and request behavior when they
run Codex locally, without sending sensitive prompt or tool data as
trace event data. In other words, traces should help answer “what was
slow?” or “where did time go?”, not “what did the user say?” or “what
did the tool return?”

The complication is that Rust’s `tracing` crate does not make a hard
distinction between “logs” and “trace events.” It gives us one
instrumentation API for logs and trace events (via `tracing::event!`),
and subscribers decide what gets treated as logs, trace events, or both.

Before this change, our OTEL trace layer was effectively attached to the
general tracing stream, which meant turning on `trace_exporter` could
pick up content-rich events that were originally written with logging
(and the `log_exporter`) in mind. That made it too easy for sensitive
data to end up in exported traces by accident.

### Concrete example
In `otel_manager.rs`, this `tracing::event!` call would be exported in
both logs AND traces (as a trace event).
```
    pub fn user_prompt(&self, items: &[UserInput]) {
        let prompt = items
            .iter()
            .flat_map(|item| match item {
                UserInput::Text { text, .. } => Some(text.as_str()),
                _ => None,
            })
            .collect::<String>();

        let prompt_to_log = if self.metadata.log_user_prompts {
            prompt.as_str()
        } else {
            "[REDACTED]"
        };

        tracing::event!(
            tracing::Level::INFO,
            event.name = "codex.user_prompt",
            event.timestamp = %timestamp(),
            // ...
            prompt = %prompt_to_log,
        );
    }
```

Instead of `tracing::event!`, we should now be using `log_event!` and
`trace_event!` instead to more clearly indicate which sink (logs vs.
traces) that event should be exported to.

### What changed
This PR makes the log and trace export distinct instead of treating them
as two sinks for the same data.

On the provider side, OTEL logs and traces now have separate
routing/filtering policy. The log exporter keeps receiving the existing
`codex_otel` events, while trace export is limited to spans and trace
events.

On the event side, `OtelManager` now emits two flavors of telemetry
where needed:
- a log-only event with the current rich payloads
- a tracing-safe event with summaries only

It also has a convenience `log_and_trace_event!` macro for emitting to
both logs and traces when it's safe to do so, as well as log- and
trace-specific fields.

That means prompts, tool args, tool output, account email, MCP metadata,
and similar content stay in the log lane, while traces get the pieces
that are actually useful for performance work: durations, counts, sizes,
status, token counts, tool origin, and normalized error classes.

This preserves current IT/security logging behavior while making it safe
to turn on trace export for employees.

### Full list of things removed from trace export
- raw user prompt text from `codex.user_prompt`
- raw tool arguments and output from `codex.tool_result`
- MCP server metadata from `codex.tool_result` (mcp_server,
mcp_server_origin)
- account identity fields like `user.email` and `user.account_id` from
trace-safe OTEL events
- `host.name` from trace resources
- generic `codex.tool_decision` events from traces
- generic `codex.sse_event` events from traces
- the full ToolCall debug payload from the `handle_tool_call` span

What traces now keep instead is mostly:
- spans
- trace-safe OTEL events
- counts, lengths, durations, status, token counts, and tool origin
summaries
2026-03-05 16:30:53 -08:00
..
.cargo Fix release build take (#12865) 2026-02-25 20:59:07 -08:00
.config fix flaky test: approval_matrix_covers_all_modes (#7028) 2025-11-20 14:37:42 -08:00
.github/workflows chore(ci): add cargo audit workflow and policy (#7108) 2025-11-24 12:20:55 -08:00
ansi-escape feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
app-server add @plugin mentions (#13510) 2026-03-06 00:03:39 +00:00
app-server-protocol core/protocol: add structured macOS additional permissions and merge them into sandbox execution (#13499) 2026-03-05 16:21:45 -08:00
app-server-test-client feat(app-server-test-client): OTEL setup for tracing (#13493) 2026-03-04 13:30:09 -08:00
apply-patch fix: codex-arg0 no longer depends on codex-core (#12434) 2026-02-21 00:20:42 -08:00
arg0 feat: pass helper executable paths via Arg0DispatchPaths (#12719) 2026-02-24 17:44:38 -08:00
artifacts chore: ultra-clean artifacts (#13577) 2026-03-05 13:03:01 +00:00
async-utils feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
backend-client feat: support multiple rate limits (#11260) 2026-02-10 20:09:31 -08:00
chatgpt add @plugin mentions (#13510) 2026-03-06 00:03:39 +00:00
cli feat(app-server-test-client): OTEL setup for tracing (#13493) 2026-03-04 13:30:09 -08:00
cloud-requirements config: enforce enterprise feature requirements (#13388) 2026-03-04 04:40:22 +00:00
cloud-tasks feat: split codex-common into smaller utils crates (#11422) 2026-02-11 12:59:24 +00:00
cloud-tasks-client add codex cloud list (#9324) 2026-01-16 08:56:38 -08:00
codex-api chore: add web_search_tool_type for image support (#13538) 2026-03-05 07:02:27 +00:00
codex-backend-openapi-models feat: support multiple rate limits (#11260) 2026-02-10 20:09:31 -08:00
codex-client Log headers in trace mode (#9214) 2026-01-14 18:38:12 +00:00
codex-experimental-api-macros feat: experimental flags (#10231) 2026-02-02 11:06:50 +00:00
config config: enforce enterprise feature requirements (#13388) 2026-03-04 04:40:22 +00:00
core feat(otel): safe tracing (#13626) 2026-03-05 16:30:53 -08:00
debug-client feat: add search term to thread list (#12578) 2026-02-25 09:59:41 +00:00
docs chore(app-server): delete v1 RPC methods and notifications (#13375) 2026-03-03 13:18:25 -08:00
exec feat(app-server): support mcp elicitations in v2 api (#13425) 2026-03-05 07:20:20 -08:00
execpolicy execpolicy: add host_executable() path mappings (#12964) 2026-02-27 12:59:24 -08:00
execpolicy-legacy feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
feedback [diagnostics] show diagnostics earlier in workflow (#13604) 2026-03-05 11:23:47 -08:00
file-search fix(core): scope file search gitignore to repository context (#13250) 2026-03-02 21:52:20 -07:00
hooks notify: include client in legacy hook payload (#12968) 2026-02-26 22:27:34 -08:00
keyring-store feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
linux-sandbox fix(linux-sandbox): always unshare bwrap userns (#13624) 2026-03-05 21:57:40 +00:00
lmstudio chore(deps): bump tracing from 0.1.43 to 0.1.44 in /codex-rs (#9880) 2026-01-26 15:48:45 -08:00
login add new scopes to login (#12383) 2026-03-04 16:41:54 +00:00
mcp-server image-gen-event/client_processing (#13512) 2026-03-04 16:54:38 -08:00
network-proxy fix(network-proxy): reject mismatched host headers (#13275) 2026-03-03 15:12:06 -08:00
ollama chore: nuke chat/completions API (#10157) 2026-02-03 11:31:57 +00:00
otel feat(otel): safe tracing (#13626) 2026-03-05 16:30:53 -08:00
package-manager chore: ultra-clean artifacts (#13577) 2026-03-05 13:03:01 +00:00
process-hardening feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
protocol core/protocol: add structured macOS additional permissions and merge them into sandbox execution (#13499) 2026-03-05 16:21:45 -08:00
responses-api-proxy Update pnpm versions to fix cve-2026-24842 (#12009) 2026-02-19 14:27:55 -08:00
rmcp-client Add oauth_resource handling for MCP login flows (#12866) 2026-02-26 20:10:12 -08:00
scripts Upgrade to rust 1.93 (#10080) 2026-01-28 17:46:18 +00:00
secrets Move sanitizer into codex-secrets (#12306) 2026-02-20 22:47:54 +00:00
shell-command Collapse parsed command summaries when any stage is unknown (#13043) 2026-03-03 19:45:34 +00:00
shell-escalation refactor: prepare unified exec for zsh-fork backend (#13392) 2026-03-05 08:55:12 +00:00
skills feat: skills for artifacts (#13525) 2026-03-05 12:02:02 +00:00
state feat(core): persist trace_id for turns in RolloutItem::TurnContext (#13602) 2026-03-05 13:26:48 -08:00
stdio-to-uds feat: add support for building with Bazel (#8875) 2026-01-09 11:09:43 -08:00
test-macros feat: add large stack test macro (#12768) 2026-02-25 13:19:21 +00:00
tui Update models.json (#13617) 2026-03-05 16:22:39 -08:00
utils fix: pending messages in /agent (#13240) 2026-03-04 10:17:29 +00:00
vendor build(linux-sandbox): always compile vendored bubblewrap on Linux; remove CODEX_BWRAP_ENABLE_FFI (#11498) 2026-02-11 21:30:41 -08:00
windows-sandbox-rs copy command-runner to CODEX_HOME so sandbox users can always execute it (#13413) 2026-03-04 01:31:37 +00:00
.gitignore [MCP] Prefix MCP tools names with mcp__ (#5309) 2025-10-19 20:41:55 -04:00
BUILD.bazel Add feature-gated freeform js_repl core runtime (#10674) 2026-02-11 12:05:02 -08:00
Cargo.lock [diagnostics] show diagnostics earlier in workflow (#13604) 2026-03-05 11:23:47 -08:00
Cargo.toml feat: bind package manager (#13571) 2026-03-05 11:57:13 +00:00
clippy.toml fix: switch rate limit reset handling to timestamps (#5304) 2025-10-17 17:39:37 -07:00
config.md Fix link to MCP Servers config section (#5301) 2025-10-17 14:58:27 -07:00
default.nix fix(nix): include libcap dependency on linux builds (#12415) 2026-02-20 19:32:15 -08:00
deny.toml feat: external artifacts builder (#13485) 2026-03-04 20:22:34 +00:00
node-version.txt Reduce js_repl Node version requirement to 22.22.0 (#12857) 2026-02-26 04:09:30 +00:00
README.md feat: memories in workspace write (#13467) 2026-03-04 13:00:26 +00:00
rust-toolchain.toml Revert "chore(deps): bump rust-toolchain from 1.93.0 to 1.93.1 in /co…dex-rs (#11886)" (#12035) 2026-02-17 12:29:03 -08:00
rustfmt.toml Update cargo to 2024 edition (#842) 2025-05-07 08:37:48 -07:00

Codex CLI (Rust Implementation)

We provide Codex CLI as a standalone, native executable to ensure a zero-dependency install.

Installing Codex

Today, the easiest way to install Codex is via npm:

npm i -g @openai/codex
codex

You can also install via Homebrew (brew install --cask codex) or download a platform-specific release directly from our GitHub Releases.

Documentation quickstart

What's new in the Rust CLI

The Rust implementation is now the maintained Codex CLI and serves as the default experience. It includes a number of features that the legacy TypeScript CLI never supported.

Config

Codex supports a rich set of configuration options. Note that the Rust CLI uses config.toml instead of config.json. See docs/config.md for details.

Model Context Protocol Support

MCP client

Codex CLI functions as an MCP client that allows the Codex CLI and IDE extension to connect to MCP servers on startup. See the configuration documentation for details.

MCP server (experimental)

Codex can be launched as an MCP server by running codex mcp-server. This allows other MCP clients to use Codex as a tool for another agent.

Use the @modelcontextprotocol/inspector to try it out:

npx @modelcontextprotocol/inspector codex mcp-server

Use codex mcp to add/list/get/remove MCP server launchers defined in config.toml, and codex mcp-server to run the MCP server directly.

Notifications

You can enable notifications by configuring a script that is run whenever the agent finishes a turn. The notify documentation includes a detailed example that explains how to get desktop notifications via terminal-notifier on macOS. When Codex detects that it is running under WSL 2 inside Windows Terminal (WT_SESSION is set), the TUI automatically falls back to native Windows toast notifications so approval prompts and completed turns surface even though Windows Terminal does not implement OSC 9.

codex exec to run Codex programmatically/non-interactively

To run Codex non-interactively, run codex exec PROMPT (you can also pass the prompt via stdin) and Codex will work on your task until it decides that it is done and exits. Output is printed to the terminal directly. You can set the RUST_LOG environment variable to see more about what's going on. Use codex exec --ephemeral ... to run without persisting session rollout files to disk.

Experimenting with the Codex Sandbox

To test to see what happens when a command is run under the sandbox provided by Codex, we provide the following subcommands in Codex CLI:

# macOS
codex sandbox macos [--full-auto] [--log-denials] [COMMAND]...

# Linux
codex sandbox linux [--full-auto] [COMMAND]...

# Windows
codex sandbox windows [--full-auto] [COMMAND]...

# Legacy aliases
codex debug seatbelt [--full-auto] [--log-denials] [COMMAND]...
codex debug landlock [--full-auto] [COMMAND]...

Selecting a sandbox policy via --sandbox

The Rust CLI exposes a dedicated --sandbox (-s) flag that lets you pick the sandbox policy without having to reach for the generic -c/--config option:

# Run Codex with the default, read-only sandbox
codex --sandbox read-only

# Allow the agent to write within the current workspace while still blocking network access
codex --sandbox workspace-write

# Danger! Disable sandboxing entirely (only do this if you are already running in a container or other isolated env)
codex --sandbox danger-full-access

The same setting can be persisted in ~/.codex/config.toml via the top-level sandbox_mode = "MODE" key, e.g. sandbox_mode = "workspace-write". In workspace-write, Codex also includes ~/.codex/memories in its writable roots so memory maintenance does not require an extra approval.

Code Organization

This folder is the root of a Cargo workspace. It contains quite a bit of experimental code, but here are the key crates:

  • core/ contains the business logic for Codex. Ultimately, we hope this to be a library crate that is generally useful for building other Rust/native applications that use Codex.
  • exec/ "headless" CLI for use in automation.
  • tui/ CLI that launches a fullscreen TUI built with Ratatui.
  • cli/ CLI multitool that provides the aforementioned CLIs via subcommands.

If you want to contribute or inspect behavior in detail, start by reading the module-level README.md files under each crate and run the project workspace from the top-level codex-rs directory so shared config, features, and build scripts stay aligned.