Skip to content
Built 26/04/16 13:13commit cc1e88d

Codex Config Basics

中文 | English

Summary

This source defines the basic control plane for local Codex clients: which config layers exist, how precedence works, which keys most people actually change, and how feature flags fit into the operating model.

Source

Key Contributions

  • Separates user defaults, trusted project-scoped overrides, profiles, CLI overrides, and system defaults into an explicit precedence stack.
  • Identifies the most important operating knobs: model, approvals, sandbox, web search, reasoning effort, personality, shell environment policy, and log location.
  • Shows that feature flags are a first-class configuration surface with maturity levels rather than an opaque grab bag of hidden switches.

Strongest Claims

  • Trust gating on .codex/config.toml is part of the security model, not a footnote.
  • Approval and sandbox choices are primary behavioral controls and should be widened deliberately rather than by habit.
  • Configuration should be layered so repo-local behavior stays local and personal defaults stay personal.