|
| 1 | +{ |
| 2 | + "name": "armorcodex", |
| 3 | + "version": "0.2.0", |
| 4 | + "description": "ArmorIQ intent-based security enforcement for Codex: Bash command guardrails with intent verification, optional CSRG cryptographic proofs, and audit logging. Codex hooks currently fire for Bash, apply_patch, and MCP tool calls; non-Bash file/web activity may need supplemental controls. See CODEX_HARNESS_LIMITATIONS.md.", |
| 5 | + "author": { |
| 6 | + "name": "ArmorIQ", |
| 7 | + "email": "license@armoriq.io", |
| 8 | + "url": "https://armoriq.ai" |
| 9 | + }, |
| 10 | + "homepage": "https://armoriq.ai", |
| 11 | + "repository": "https://github.com/armoriq/armorCodex", |
| 12 | + "license": "MIT", |
| 13 | + "keywords": [ |
| 14 | + "security", |
| 15 | + "policy", |
| 16 | + "audit", |
| 17 | + "intent", |
| 18 | + "armoriq", |
| 19 | + "mcp", |
| 20 | + "hooks" |
| 21 | + ], |
| 22 | + "hooks": "./.codex/hooks.json", |
| 23 | + "mcpServers": "./.mcp.json", |
| 24 | + "interface": { |
| 25 | + "displayName": "ArmorCodex", |
| 26 | + "shortDescription": "Intent-based security policy and audit for Codex.", |
| 27 | + "longDescription": "ArmorIQ intent-based security enforcement for OpenAI Codex. Treat as a strong Bash guardrail and audit layer, not a complete boundary for every Codex capability. Codex hooks currently emit Bash, apply_patch, and MCP tool calls. ArmorCodex provides plan registration through MCP, intent-plan matching, permission gating, and post-run audit on those tools. Non-Bash activity (file edits, web search, app connectors) is gated where Codex emits hook events.", |
| 28 | + "developerName": "ArmorIQ", |
| 29 | + "category": "Security", |
| 30 | + "capabilities": ["MCP", "Hooks"], |
| 31 | + "websiteURL": "https://armoriq.ai", |
| 32 | + "privacyPolicyURL": "https://armoriq.ai/privacy", |
| 33 | + "termsOfServiceURL": "https://armoriq.ai/terms", |
| 34 | + "brandColor": "#00E5CC", |
| 35 | + "composerIcon": "./assets/icon.png", |
| 36 | + "logo": "./assets/icon.png", |
| 37 | + "defaultPrompt": [ |
| 38 | + "Register an intent plan, then run my Bash commands.", |
| 39 | + "Show the current ArmorCodex security policies.", |
| 40 | + "Block Bash commands that contain curl or wget." |
| 41 | + ] |
| 42 | + }, |
| 43 | + "userConfig": { |
| 44 | + "api_key": { |
| 45 | + "type": "string", |
| 46 | + "title": "ArmorIQ API Key", |
| 47 | + "description": "Your ArmorIQ API key (get one at https://armoriq.ai). Leave blank to run in local-only mode without backend audit/intent.", |
| 48 | + "sensitive": true |
| 49 | + }, |
| 50 | + "mode": { |
| 51 | + "type": "string", |
| 52 | + "title": "Enforcement Mode", |
| 53 | + "description": "enforce = block on policy/intent failures (recommended). monitor = log only, never block.", |
| 54 | + "sensitive": false |
| 55 | + }, |
| 56 | + "intent_required": { |
| 57 | + "type": "boolean", |
| 58 | + "title": "Require Intent Plan", |
| 59 | + "description": "When true, every Bash command must be backed by a registered intent plan (Codex hooks currently only intercept Bash). Disable for advisory-only use.", |
| 60 | + "sensitive": false |
| 61 | + }, |
| 62 | + "crypto_policy_enabled": { |
| 63 | + "type": "boolean", |
| 64 | + "title": "Enable Crypto Policy Binding", |
| 65 | + "description": "Bind policy rules to a Merkle tree so post-issuance tampering is detected.", |
| 66 | + "sensitive": false |
| 67 | + }, |
| 68 | + "use_production": { |
| 69 | + "type": "boolean", |
| 70 | + "title": "Use Production Endpoints", |
| 71 | + "description": "When true, talks to ArmorIQ production. When false, expects a local backend on 127.0.0.1.", |
| 72 | + "sensitive": false |
| 73 | + } |
| 74 | + } |
| 75 | +} |
0 commit comments