- Plugin details now show bundled hooks, and plugin sharing exposes link metadata plus discoverability controls. (#21447, #21495, #21637) - Added `codex remote-control` as a simpler entrypoint for starting a headless, remotely controllable app-server. (#21424) - App-server clients can page large threads with unloaded, summary, or full turn item views. (#21566) - Bedrock auth can now use AWS console-login credentials from `aws login` profiles. (#21623) - `view_image` can resolve files through the selected environment for multi-environment sessions. (#21143) ## Bug Fixes - Live app-server threads now pick up config changes without requiring a restart. (#21187) - Turn diffs stay accurate across apply-patch operations, including partial failures that still mutated files. (#21180, #21518) - Thread summaries, renames, resume, and fork paths work better through `ThreadStore`, including threads without local rollout paths. (#21264, #21265, #21266) - Remote compaction now emits `response.processed` for v2 streams and avoids sending `service_tier` on API-key compact requests. (#21642, #21676) - Windows sandbox setup now grants sandbox users access to the desktop runtime binary cache. (#21564) - Removed stale “research preview” wording from the `codex exec` startup banner. (#21683) ## Documentation - Fixed issue templates so CLI reports keep the intended guidance, labels apply correctly, and feature requests link to the right contributing docs. (#21685, #21686, #21688) - Updated install and tooling docs to consistently use `cargo install --locked`. (#21592) ## Chores - Added a faster Cargo profiling build profile and disabled empty doctest targets to speed up Rust development loops. (#21574, #21584) - Hardened dependency and CI hygiene with fully qualified GitHub Action pins, a Dependabot cooldown, and a `cargo-shear` upgrade. (#21436, #21547, #21599) - Simplified internal surfaces by removing unused device-key APIs, extra skills roots, the remote thread-store implementation, and string-keyed MCP tool maps. (#21487, #21485, #21596, #21454) - Added configurable OpenTelemetry trace metadata and richer review/feedback analytics for better debugging and triage. (#21556, #18747, #21434, #21498) ## Changelog Full Changelog: https://github.com/openai/codex/compare/rust-v0.129.0...rust-v0.130.0 - #21494 [codex] fix PluginListParams test initializer @xli-oai - #21447 Show plugin hooks in plugin details @abhinav-oai - #21356 feat: make built-in MCPs first-class runtime servers @jif-oai - #21180 Make turn diff tracking operation backed @jif-oai - #21498 [codex] add account id to feedback uploads @pakrym-oai - #21487 device-key: clean up unused crate @euroelessar - #21518 fix: preserve exact turn diffs after partial apply_patch failures @jif-oai - #18747 [codex-analytics] add tool review event schema @rhan-oai - #21495 feat: Expose plugin share metadata in shareContext @xl-openai - #21454 [codex] Remove string-keyed MCP tool maps @pakrym-oai - #21424 add top-level remote-control command @owenlin0 - #21187 app-server: refresh live threads from latest config snapshot @jif-oai - #21461 [codex] Move tool specs onto handlers @pakrym-oai - #21547 Upgrade `cargo-shear` to 1.11.2 @charliemarsh-oai - #21264 Move thread name edits to ThreadStore @wiltzius-openai - #21266 [codex] Fix pathless thread summaries @wiltzius-openai - #21265 Route ThreadManager rollout path reads through thread store @wiltzius-openai - #21564 Grant sandbox users access to desktop runtime bin @iceweasel-oai - #21582 Use descriptive names for Cargo profile options @zanie-oai - #21574 Add a Cargo build profile for benchmarking @zanie-oai - #21436 [codex] Fully qualify hash-pins in GitHub Actions @ww-oai - #21592 Ensure all mentions of cargo-install are --locked @gankra-oai - #21584 Disable empty Cargo test targets @charliemarsh-oai - #21566 feat(app-server, threadstore): Thread pagination APIs and ThreadStore contract @owenlin0 - #21556 codex-otel: add configurable trace metadata @bbrown-oai - #21599 [codex] Apply a Dependabot cooldown of 7 days @ww-oai - #21602 Use `--locked` in cargo build and lint invocations @zanie-oai - #20664 Add stdio exec-server client transport @starr-openai - #21596 [codex] Remove remote thread store implementation @wiltzius-openai - #20665 Make environment providers own default selection @starr-openai - #21143 Route view_image through selected environments @starr-openai - #20666 Add CODEX_HOME environments TOML provider @starr-openai - #21642 Send response.processed after remote compaction v2 @pakrym-oai - #21646 Revert "Use `--locked` in cargo build and lint invocations" @pakrym-oai - #21434 [codex-analytics] plumb protocol-native review timing @rhan-oai - #21485 Remove skills list extra roots @xli-oai - #21623 feat: enable AWS login credentials for Bedrock auth @celia-oai - #21637 feat: Update plugin share settings with discoverability @xl-openai - #21685 Fix duplicate CLI issue template description @etraut-openai - #21686 Fix issue template labels @etraut-openai - #21688 Fix feature request Contributing link @etraut-openai - #21683 Remove exec research preview banner wording @etraut-openai - #21676 Omit service_tier from remote /responses/compact requests under API auth @aibrahim-oai
Codex CLI (Rust Implementation)
We provide Codex CLI as a standalone executable to ensure a zero-dependency install.
Installing Codex
Today, the easiest way to install Codex is via npm:
npm i -g @openai/codex
codex
You can also install via Homebrew (brew install --cask codex) or download a platform-specific release directly from our GitHub Releases.
Documentation quickstart
- First run with Codex? Start with
docs/getting-started.md(links to the walkthrough for prompts, keyboard shortcuts, and session management). - Want deeper control? See
docs/config.mdanddocs/install.md.
What's new in the Rust CLI
The Rust implementation is now the maintained Codex CLI and serves as the default experience. It includes a number of features that the legacy TypeScript CLI never supported.
Config
Codex supports a rich set of configuration options. Note that the Rust CLI uses config.toml instead of config.json. See docs/config.md for details.
Model Context Protocol Support
MCP client
Codex CLI functions as an MCP client that allows the Codex CLI and IDE extension to connect to MCP servers on startup. See the configuration documentation for details.
MCP server (experimental)
Codex can be launched as an MCP server by running codex mcp-server. This allows other MCP clients to use Codex as a tool for another agent.
Use the @modelcontextprotocol/inspector to try it out:
npx @modelcontextprotocol/inspector codex mcp-server
Use codex mcp to add/list/get/remove MCP server launchers defined in config.toml, and codex mcp-server to run the MCP server directly.
Notifications
You can enable notifications by configuring a script that is run whenever the agent finishes a turn. The notify documentation includes a detailed example that explains how to get desktop notifications via terminal-notifier on macOS. When Codex detects that it is running under WSL 2 inside Windows Terminal (WT_SESSION is set), the TUI automatically falls back to native Windows toast notifications so approval prompts and completed turns surface even though Windows Terminal does not implement OSC 9.
codex exec to run Codex programmatically/non-interactively
To run Codex non-interactively, run codex exec PROMPT (you can also pass the prompt via stdin) and Codex will work on your task until it decides that it is done and exits. If you provide both a prompt argument and piped stdin, Codex appends stdin as a <stdin> block after the prompt so patterns like echo "my output" | codex exec "Summarize this concisely" work naturally. Output is printed to the terminal directly. You can set the RUST_LOG environment variable to see more about what's going on.
Use codex exec --ephemeral ... to run without persisting session rollout files to disk.
Experimenting with the Codex Sandbox
To test to see what happens when a command is run under the sandbox provided by Codex, we provide the following subcommands in Codex CLI:
# macOS
codex sandbox macos [--log-denials] [COMMAND]...
# Linux
codex sandbox linux [COMMAND]...
# Windows
codex sandbox windows [COMMAND]...
# Legacy aliases
codex debug seatbelt [--log-denials] [COMMAND]...
codex debug landlock [COMMAND]...
To try a writable legacy sandbox mode with these commands, pass an explicit config override such
as -c 'sandbox_mode="workspace-write"'.
Selecting a sandbox policy via --sandbox
The Rust CLI exposes a dedicated --sandbox (-s) flag that lets you pick the sandbox policy without having to reach for the generic -c/--config option:
# Run Codex with the default, read-only sandbox
codex --sandbox read-only
# Allow the agent to write within the current workspace while still blocking network access
codex --sandbox workspace-write
# Danger! Disable sandboxing entirely (only do this if you are already running in a container or other isolated env)
codex --sandbox danger-full-access
The same setting can be persisted in ~/.codex/config.toml via the top-level sandbox_mode = "MODE" key, e.g. sandbox_mode = "workspace-write".
In workspace-write, Codex also includes ~/.codex/memories in its writable roots so memory maintenance does not require an extra approval.
Code Organization
This folder is the root of a Cargo workspace. It contains quite a bit of experimental code, but here are the key crates:
core/contains the business logic for Codex. Ultimately, we hope this becomes a library crate that is generally useful for building other Rust/native applications that use Codex.exec/"headless" CLI for use in automation.tui/CLI that launches a fullscreen TUI built with Ratatui.cli/CLI multitool that provides the aforementioned CLIs via subcommands.
If you want to contribute or inspect behavior in detail, start by reading the module-level README.md files under each crate and run the project workspace from the top-level codex-rs directory so shared config, features, and build scripts stay aligned.