Conversation
💡 Codex Reviewcodex/codex-rs/core/src/sandboxed_fs.rs Lines 87 to 89 in 294e1da When the selected image is larger than 1 MiB, this path now breaks codex/codex-rs/fs-ops/src/runner.rs Lines 39 to 40 in 294e1da On Unix, if ℹ️ About Codex in GitHubYour team has set up Codex to review pull requests in this repo. Reviews are triggered when you
If Codex has suggestions, it will comment; otherwise it will react with 👍. Codex can also answer questions or update the PR. Try commenting "@codex address that feedback". |
7bda055 to
9e9ec89
Compare
81ed2df to
923f673
Compare
98ea221 to
c3f1765
Compare
76ecd98 to
b6af173
Compare
512f7ed to
7aca0d8
Compare
Why
#14989 adds the sandbox-backed filesystem helper, but
view_imagestill read local files through the host-side filesystem path. That meant the tool was not yet benefiting from the new boundary, even though reading the image bytes is the security-sensitive part of the operation.This PR makes
view_imagethe first consumer of that helper so image reads honor the same filesystem sandbox rules as other sandboxed child processes.What changed
metadata/read_filecalls withsandboxed_fs::read_file()view_image, but moved the actual file read behind the sandbox-backed helperview_imageerror pathcore/tests/suite/view_image.rsthat aview_imagecall outside the allowed filesystem sandbox does not attach an image and instead returns a read errorTesting
view_image_tool_respects_filesystem_sandboxincore/tests/suite/view_image.rsStack created with Sapling. Best reviewed with ReviewStack.