openclaw/extensions/codex
Sanjay Santhanam 081da17090
fix(codex): exclude codex-app-server synthetic apiKey from secrets audit (#69581)
* fix(codex): exclude codex-app-server synthetic apiKey from secrets audit

The Codex extension uses the literal string "codex-app-server" as a
hardcoded placeholder apiKey in provider.ts, since the real
authentication is managed by the app-server transport itself.

The secrets audit currently reports this as a real plaintext leak
(PLAINTEXT_FOUND), producing a false positive for any user who has
configured the Codex harness.

Declare it as a plugin-owned non-secret marker in the Codex plugin
manifest, so it flows through the standard
`listKnownNonSecretApiKeyMarkers()` path alongside `ollama-local`,
`lmstudio-local`, `gcp-vertex-credentials`, and `minimax-oauth`.

Also extends the existing `model auth markers` unit tests to lock
in the behavior.

Fixes #69511

* ci: retrigger checks (no-op)
2026-04-21 21:38:26 +10:00
..
src fix: stage ACP and Codex runtime deps 2026-04-21 08:47:24 +01:00
harness.ts refactor: narrow codex harness selection 2026-04-11 00:13:08 +01:00
index.test.ts refactor: narrow codex harness selection 2026-04-11 00:13:08 +01:00
index.ts feat: add Codex app-server controls 2026-04-10 22:19:00 +01:00
openclaw.plugin.json fix(codex): exclude codex-app-server synthetic apiKey from secrets audit (#69581) 2026-04-21 21:38:26 +10:00
package.json fix: stage ACP and Codex runtime deps 2026-04-21 08:47:24 +01:00
provider.test.ts fix: centralize provider thinking profiles 2026-04-21 09:13:35 +01:00
provider.ts fix: centralize provider thinking profiles 2026-04-21 09:13:35 +01:00
tsconfig.json fix(codex): keep app-server inside extension src 2026-04-10 21:22:16 +01:00