Claude-skill-registry codex-container-sandbox
Run Codex CLI inside a Podman container with full internet access but filesystem exposure limited to the repo root + explicit bind mounts; use when you want yolo/web-search without giving the agent access to your whole host filesystem.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/codex-container-sandbox" ~/.claude/skills/majiayu000-claude-skill-registry-codex-container-sandbox && rm -rf "$T"
manifest:
skills/data/codex-container-sandbox/SKILL.mdsource content
codex-container-sandbox
Use this when you want:
- Full egress/network for
(web search, fetching, etc.)codex - Tight filesystem boundaries via container bind mounts (repo root + explicit allowlist)
This repo contains a wrapper script intended to be installed as
codex-container-sandbox.
Workflow
-
Build the image
From the repo root (this repository):
podman build -t localhost/codex-container-sandbox:latest -f Containerfile . -
Install the wrapper
install -m 0755 codex-container-sandbox ~/.local/bin/codex-container-sandbox -
(Optional) Configure extra mounts
Create
:~/.config/codex-container-sandbox/config.shCODEX_CONTAINER_SANDBOX_IMAGE="localhost/codex-container-sandbox:latest" # Extra read-only mounts (mapped under /home/codex/... if under $HOME) CODEX_CONTAINER_SANDBOX_RO_MOUNTS=( "$HOME/.local/bin" ) # Extra read-write mounts CODEX_CONTAINER_SANDBOX_RW_MOUNTS=( "$HOME/.cache/uv" "$HOME/tmp" ) -
Login once inside the container
codex-container-sandbox --shell codex login -
Run the self-test (recommended)
./selftest.shIf this repo is vendored as a git submodule at
(for example in a dotfiles repo), either:./codex-container-sandbox/
, orcd codex-container-sandbox && ./selftest.sh- run
from the parent repo root../codex-container-sandbox/selftest.sh
-
Run Codex
codex-container-sandbox exec "Summarize this repo"
Safety notes
- This wrapper runs Codex in full-yolo mode (
) with full networking. Anything mounted into the container can be exfiltrated.--dangerously-bypass-approvals-and-sandbox - Keep mounts minimal; do not mount secrets, password stores, SSH keys, or large chunks of
unless you intend to expose them.$HOME