<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🧭 AI Security]]></title><description><![CDATA[<p>----------------</p><p>🧭 AI Security</p><p>This report documents a critical command injection vulnerability in OpenAI Codex that enabled theft of GitHub User Access Tokens via the ChatGPT Codex Connector. The discovery was credited to BeyondTrust Phantom Labs and disclosed to OpenAI on December 16, 2025. OpenAI issued a hotfix on December 23, 2025, followed by additional fixes for branch shell escape (January 22, 2026) and further shell-escape hardening and reduced GitHub token access (January 30, 2026). The vulnerability was classified as Critical (Priority 1) on February 5, 2026, with permission granted for public disclosure.</p><p>Technical narrative<br />• The ChatGPT Codex Connector uses short-lived, scoped OAuth 2.0 access tokens to act on behalf of consenting users. With broad default scopes, the application can access repositories, workflows, actions, branches, and private organizational resources when authorized inside an organization.<br />• In the Codex Web portal, user prompts that target repositories and branches create “cloud task” POST requests carrying environment identifiers, branch, and prompt text. On backend execution, Codex spins up containerized environments that run setup scripts, install dependencies, and may execute code derived from prompts.<br />• Environments support custom setup scripts, environment variables, and secrets, and by default allow outbound internet access during setup via an HTTP/HTTPS proxy. The command injection allowed an attacker to achieve shell escape within these containers, access environment-scoped secrets, and exfiltrate GitHub tokens.</p><p>Attack chain (reported)</p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f3a3.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--fishing_pole_and_fish" style="height:23px;width:auto;vertical-align:middle" title="🎣" alt="🎣" /> Initial Access — crafted prompts or repository inputs processed by Codex allowed injection into backend task handling.<br />===================</p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/2699.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--gear" style="height:23px;width:auto;vertical-align:middle" title="⚙" alt="⚙" />️ Execution — containerized environment executed injected commands during setup or runtime.<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4e4.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--outbox_tray" style="height:23px;width:auto;vertical-align:middle" title="📤" alt="📤" /> Exfiltration — obtained short-lived OAuth tokens were transmitted out via network proxy pathways.</p><p>Observed fixes and timeline<br />• 2025-12-23: Hotfix for command injection.<br />• 2026-01-22: Fix for GitHub branch shell escape.<br />• 2026-01-30: Additional shell escape hardening and limits on GitHub token access.</p><p>This account focuses on the concrete findings: vulnerable task handling in Codex, container shell escape leading to token theft, the privileged default scopes of the GitHub integration, and the sequence of fixes applied by OpenAI. <a href="https://infosec.exchange/tags/OpenAI" rel="tag">#<span>OpenAI</span></a> <a href="https://infosec.exchange/tags/Codex" rel="tag">#<span>Codex</span></a> <a href="https://infosec.exchange/tags/GitHub" rel="tag">#<span>GitHub</span></a> <a href="https://infosec.exchange/tags/OAuth" rel="tag">#<span>OAuth</span></a> <a href="https://infosec.exchange/tags/Security" rel="tag">#<span>Security</span></a></p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f517.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--link" style="height:23px;width:auto;vertical-align:middle" title="🔗" alt="🔗" /> Source: <a href="https://www.beyondtrust.com/blog/entry/openai-codex-command-injection-vulnerability-github-token" rel="nofollow noopener"><span>https://www.</span><span>beyondtrust.com/blog/entry/ope</span><span>nai-codex-command-injection-vulnerability-github-token</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/de664453-9412-4542-8be9-831c98f920c2/ai-security</link><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 05:20:17 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/de664453-9412-4542-8be9-831c98f920c2.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 30 Mar 2026 18:59:07 GMT</pubDate><ttl>60</ttl></channel></rss>