Skip to content

Conversation

@zhao-oai
Copy link
Contributor

@zhao-oai zhao-oai commented Dec 8, 2025

helpful in the future if we want more granularity for requesting escalated permissions:
e.g when running in readonly sandbox, model can request to escalate to a sandbox that allows writes

Copy link
Contributor

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

@zhao-oai zhao-oai force-pushed the dev/zhao/with-escalated-perms-refactor branch 5 times, most recently from e93a646 to 6066388 Compare December 10, 2025 00:42
@zhao-oai
Copy link
Contributor Author

@codex review

@zhao-oai zhao-oai requested a review from bolinfest December 10, 2025 00:52
Copy link
Contributor

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines 344 to +351
#[serde(alias = "timeout")]
pub timeout_ms: Option<u64>,
#[serde(skip_serializing_if = "Option::is_none")]
pub with_escalated_permissions: Option<bool>,
#[serde(default, skip_serializing_if = "Option::is_none")]
#[ts(optional)]
pub sandbox_permissions: Option<SandboxPermissions>,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Preserve legacy escalation parameter

The new sandbox_permissions field (lines 344-348) replaces the previous with_escalated_permissions flag but the struct no longer accepts the legacy key. Serde ignores unknown fields by default, so any existing client payloads that still send with_escalated_permissions: true will silently deserialize to the default UseDefault permissions and never request escalation/approval, leaving commands sandboxed and likely failing. Consider adding a serde alias or backward-compatibility handling so older requests keep working.

Useful? React with 👍 / 👎.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

not an issue here since this is an interface b/w model and codex harness

@zhao-oai
Copy link
Contributor Author

@codex review

Copy link
Contributor

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +346 to +351
#[serde(default, skip_serializing_if = "Option::is_none")]
#[ts(optional)]
pub sandbox_permissions: Option<SandboxPermissions>,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Preserve legacy escalation flag

Tool call params now only accept the new sandbox_permissions enum, with no serde alias for the previous with_escalated_permissions flag. Any client or cached response still emitting the old boolean will be silently ignored and default to UseDefault, meaning escalation requests that previously ran unsandboxed will now execute in the restricted sandbox and can fail (or be denied) despite the caller asking for elevation. Consider adding an alias/translation so legacy payloads continue to request escalation.

Useful? React with 👍 / 👎.

@zhao-oai zhao-oai enabled auto-merge (squash) December 10, 2025 03:38
@zhao-oai zhao-oai force-pushed the dev/zhao/with-escalated-perms-refactor branch from 0a16ca4 to 5c3aaf9 Compare December 10, 2025 17:03
@zhao-oai zhao-oai merged commit e0fb3ca into main Dec 10, 2025
26 checks passed
@zhao-oai zhao-oai deleted the dev/zhao/with-escalated-perms-refactor branch December 10, 2025 17:18
@github-actions github-actions bot locked and limited conversation to collaborators Dec 10, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants