-
Notifications
You must be signed in to change notification settings - Fork 6.9k
Set exclude to true by default in app server #8281
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
All contributors have signed the CLA ✍️ ✅ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
💡 Codex Review
Here are some automated review suggestions for this pull request.
ℹ️ About Codex in GitHub
Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".
codex-rs/app-server/src/lib.rs
Outdated
| // Allow app-server clients to inherit KEY/SECRET/TOKEN env vars. | ||
| cli_kv_overrides.push(( | ||
| "shell_environment_policy.ignore_default_excludes".to_string(), | ||
| TomlValue::Boolean(true), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Honor default env excludes instead of forcing ignore
This override unconditionally sets shell_environment_policy.ignore_default_excludes=true, so even if a user config (or -c override) keeps it false, the app-server will skip the default KEY/SECRET/TOKEN filter. In core/src/exec_env.rs, this flag controls removal of *KEY*/*SECRET*/*TOKEN* variables before spawning shell/local_shell commands; with the new behavior, app-server always passes those secrets into subprocess environments, which can leak API keys when app-server is used with untrusted commands or relaxed approvals. Consider honoring the configured value or gating this override behind an explicit opt-in.
Useful? React with 👍 / 👎.
|
I have read the CLA Document and I hereby sign the CLA |
No description provided.