Codex Remote SSH is designed for authorized remote administration and development workflows. Treat any remote host exposed to Codex as a sensitive system.
- Use dedicated SSH users with least-privilege permissions.
- Prefer read-only host aliases for production.
- Keep
allowWrites=falseunless a specific host and path require write access. - Set
allowedPathsfor every host. - Use
allowedCommandsfor production or regulated environments. - Keep
strictHostKeyChecking=true. - Store private keys outside the plugin and protect them with OS-level permissions.
- Enable
REMOTE_SSH_AUDIT_LOGfor operational traceability. - Review Codex prompts before running commands against production systems.
The plugin never asks users to paste private keys, passwords, or passphrases into chat. It calls the system ssh binary and relies on normal SSH key files, ssh-agent, and ~/.ssh/config behavior.
Report security issues privately to:
hello@zain-technologies.com