Skip to content

Commit 4ec1161

Browse files
add ArmorCodex (security plugin for Codex) (#140)
- README entry under Community Plugins → Tools & Integrations - Plugin bundle at plugins/armoriq/armorCodex/ with .codex-plugin/plugin.json + assets/icon.png ArmorCodex provides intent-based security enforcement for OpenAI Codex: MCP-based plan registration, policy-based tool gating, CSRG cryptographic proofs, and audit logging on Bash and apply_patch. Repo: https://github.com/armoriq/armorCodex Closes armoriq/armorCodex#1.
1 parent d8bae0e commit 4ec1161

3 files changed

Lines changed: 76 additions & 0 deletions

File tree

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,7 @@ Third-party plugins built by the community. [PRs welcome](#contributing)!
174174
- [Agent Message Queue](https://github.com/avivsinai/agent-message-queue) - File-based inter-agent messaging with co-op mode, cross-project federation, and orchestrator integrations.
175175
- [Agent Vision](https://github.com/zfifteen/agent-vision) - macOS-only local camera plugin for explicit snapshots, streaming controls, and file-backed image input.
176176
- [Apple Productivity](https://github.com/matk0shub/apple-productivity-mcp) - Local Apple Calendar and Reminders tooling for macOS with Codex plugin adapters.
177+
- [ArmorCodex](https://github.com/armoriq/armorCodex) - Intent-based security for Codex with MCP plan registration, policy gating, CSRG cryptographic proofs, and audit logging on Bash and apply_patch.
177178
- [AxonFlow](https://github.com/getaxonflow/axonflow-codex-plugin) - Runtime governance for Codex with policy enforcement on terminal commands, advisory checks for non-terminal tools via skills, PII/secret detection, and compliance-grade audit trails. Self-hosted via Docker.
178179
- [Bitbucket CLI](https://github.com/avivsinai/bitbucket-cli) - Manage Bitbucket repos, PRs, branches, issues, webhooks, and pipelines for Data Center and Cloud.
179180
- [Call-E](https://github.com/CALLE-AI/call-e-integrations) - Plan, run, and inspect Call-E phone call workflows from Codex through the calle CLI.
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
{
2+
"name": "armorcodex",
3+
"version": "0.2.0",
4+
"description": "ArmorIQ intent-based security enforcement for Codex: Bash command guardrails with intent verification, optional CSRG cryptographic proofs, and audit logging. Codex hooks currently fire for Bash, apply_patch, and MCP tool calls; non-Bash file/web activity may need supplemental controls. See CODEX_HARNESS_LIMITATIONS.md.",
5+
"author": {
6+
"name": "ArmorIQ",
7+
"email": "license@armoriq.io",
8+
"url": "https://armoriq.ai"
9+
},
10+
"homepage": "https://armoriq.ai",
11+
"repository": "https://github.com/armoriq/armorCodex",
12+
"license": "MIT",
13+
"keywords": [
14+
"security",
15+
"policy",
16+
"audit",
17+
"intent",
18+
"armoriq",
19+
"mcp",
20+
"hooks"
21+
],
22+
"hooks": "./.codex/hooks.json",
23+
"mcpServers": "./.mcp.json",
24+
"interface": {
25+
"displayName": "ArmorCodex",
26+
"shortDescription": "Intent-based security policy and audit for Codex.",
27+
"longDescription": "ArmorIQ intent-based security enforcement for OpenAI Codex. Treat as a strong Bash guardrail and audit layer, not a complete boundary for every Codex capability. Codex hooks currently emit Bash, apply_patch, and MCP tool calls. ArmorCodex provides plan registration through MCP, intent-plan matching, permission gating, and post-run audit on those tools. Non-Bash activity (file edits, web search, app connectors) is gated where Codex emits hook events.",
28+
"developerName": "ArmorIQ",
29+
"category": "Security",
30+
"capabilities": ["MCP", "Hooks"],
31+
"websiteURL": "https://armoriq.ai",
32+
"privacyPolicyURL": "https://armoriq.ai/privacy",
33+
"termsOfServiceURL": "https://armoriq.ai/terms",
34+
"brandColor": "#00E5CC",
35+
"composerIcon": "./assets/icon.png",
36+
"logo": "./assets/icon.png",
37+
"defaultPrompt": [
38+
"Register an intent plan, then run my Bash commands.",
39+
"Show the current ArmorCodex security policies.",
40+
"Block Bash commands that contain curl or wget."
41+
]
42+
},
43+
"userConfig": {
44+
"api_key": {
45+
"type": "string",
46+
"title": "ArmorIQ API Key",
47+
"description": "Your ArmorIQ API key (get one at https://armoriq.ai). Leave blank to run in local-only mode without backend audit/intent.",
48+
"sensitive": true
49+
},
50+
"mode": {
51+
"type": "string",
52+
"title": "Enforcement Mode",
53+
"description": "enforce = block on policy/intent failures (recommended). monitor = log only, never block.",
54+
"sensitive": false
55+
},
56+
"intent_required": {
57+
"type": "boolean",
58+
"title": "Require Intent Plan",
59+
"description": "When true, every Bash command must be backed by a registered intent plan (Codex hooks currently only intercept Bash). Disable for advisory-only use.",
60+
"sensitive": false
61+
},
62+
"crypto_policy_enabled": {
63+
"type": "boolean",
64+
"title": "Enable Crypto Policy Binding",
65+
"description": "Bind policy rules to a Merkle tree so post-issuance tampering is detected.",
66+
"sensitive": false
67+
},
68+
"use_production": {
69+
"type": "boolean",
70+
"title": "Use Production Endpoints",
71+
"description": "When true, talks to ArmorIQ production. When false, expects a local backend on 127.0.0.1.",
72+
"sensitive": false
73+
}
74+
}
75+
}
36.1 KB
Loading

0 commit comments

Comments
 (0)