Abhinav
392e94e9ea
add --dangerously-bypass-hook-trust CLI flag ( #21768 )
...
# Why
Hook trust happens through the TUI in `/hooks` so it can block
non-interactive use cases. This flag will allow users that are using
codex headlessly to bypass hooks when they want to.
# What
This adds one invocation-scoped escape hatch.
- the CLI flag sets a runtime-only `bypass_hook_trust` override; there
is no durable `config.toml` setting
- hook discovery still respects normal enablement, so explicitly
disabled hooks remain disabled
- we show a `--dangerously-bypass-hook-trust is enabled. Enabled hooks
may run without review for this invocation.` message on startup so
accidental use is visible in both interactive and exec flows
This keeps “enabled” and “trusted” as separate concepts in the normal
path, while giving CI/E2E callers a stable way to opt into the
exceptional path when they already control the hook set.
2026-05-13 07:13:57 +00:00
..
2026-05-13 07:13:57 +00:00
2026-05-12 10:43:17 -03:00
2026-05-12 21:17:35 -07:00
2026-05-05 11:17:47 -07:00
2026-05-06 18:08:31 -07:00
2026-05-01 09:39:48 -07:00
2026-05-09 16:10:56 -03:00
2026-04-21 17:10:36 +00:00
2026-05-04 16:11:15 -03:00
2026-05-12 10:43:17 -03:00
2026-04-30 22:42:48 -07:00
2026-05-11 21:08:40 -03:00
2026-05-13 07:13:57 +00:00
2026-05-05 11:17:47 -07:00
2026-05-10 20:42:11 +00:00
2026-05-10 11:45:49 -03:00
2026-04-30 11:34:34 -07:00
2026-05-12 10:43:17 -03:00
2026-05-06 08:35:42 -07:00
2026-04-30 11:34:34 -07:00
2026-05-12 10:43:17 -03:00
2026-04-30 11:34:34 -07:00
2026-05-11 21:08:40 -03:00
2026-05-12 21:17:20 -07:00
2026-04-30 10:52:19 -07:00
2026-05-07 20:31:41 -07:00
2026-05-04 16:11:15 -03:00
2026-05-12 21:17:35 -07:00
2026-04-20 16:12:17 -07:00
2026-05-05 16:18:02 +00:00
2026-04-29 17:22:41 -07:00
2026-05-02 01:20:57 +00:00
2026-04-25 22:00:32 -03:00
2026-05-12 19:05:25 -07:00
2026-04-30 10:52:19 -07:00
2026-04-30 11:34:34 -07:00
2026-04-17 17:58:32 -07:00
2026-05-09 16:10:56 -03:00
2026-05-05 17:09:25 -03:00
2026-05-11 21:08:40 -03:00
2026-04-30 22:42:07 -07:00
2026-05-10 20:42:11 +00:00
2026-05-09 21:17:30 +00:00
2026-05-01 09:39:48 -07:00
2026-05-09 13:58:10 -03:00
2026-05-04 19:18:56 +00:00
2026-05-04 19:18:56 +00:00
2026-05-05 11:17:47 -07:00
2026-05-13 07:13:57 +00:00
2026-04-21 22:33:24 -07:00
2026-05-12 21:17:20 -07:00
2026-05-10 20:42:11 +00:00
2026-05-10 20:42:11 +00:00
2026-05-10 20:42:11 +00:00
2026-05-10 20:42:11 +00:00
2026-04-19 22:39:53 -07:00
2026-04-29 17:22:41 -07:00
2026-04-25 22:00:32 -03:00
2026-05-01 09:07:56 -07:00
2026-04-30 11:34:34 -07:00
2026-04-25 17:09:29 -07:00
2026-05-05 11:17:47 -07:00
2026-04-30 11:34:34 -07:00
2026-04-25 22:00:32 -03:00
2026-05-12 10:43:17 -03:00
2026-05-12 10:43:17 -03:00
2026-05-04 11:46:03 -07:00
2026-05-06 08:35:42 -07:00
2026-04-20 20:46:55 -07:00
2026-05-12 10:43:17 -03:00
2026-05-09 21:17:30 +00:00
2026-05-01 09:07:56 -07:00
2026-05-09 16:10:56 -03:00
2026-05-10 20:42:11 +00:00
2026-05-02 01:20:57 +00:00
2026-05-02 01:20:57 +00:00
2026-04-17 08:39:37 -07:00
2026-04-30 11:34:34 -07:00
2026-04-30 22:42:48 -07:00
2026-05-08 07:56:13 -07:00
2026-04-20 00:37:40 +00:00
2026-04-25 22:00:32 -03:00
2026-05-12 10:43:17 -03:00
2026-04-27 23:33:59 -07:00
2026-04-25 22:00:32 -03:00
2026-04-25 17:09:29 -07:00
2026-04-25 17:09:29 -07:00
2026-04-30 11:34:34 -07:00
2026-04-25 22:00:32 -03:00
2026-05-05 17:09:25 -03:00
2026-05-09 13:58:10 -03:00