Why it matters
This is aimed at org-managed Codex deployments that want a less restrictive yolo mode without dropping network policy entirely. It gives administrators a middle ground between full allowlist enforcement and completely unmanaged network access.
Try path
In a Codex build that includes PR #16946, add danger_full_access_denylist_only = true under [experimental_network] together with one or more denied domains, start a danger-full-access session, and verify allowed outbound access still works while the denied domains are blocked by policy.
Expected effect Danger-full-access sessions should retain broad network reach, but requests to managed denied domains should still be refused by the proxy policy surface.
experimental_network.danger_full_access_denylist_only = true
Evidence 4 proof points
- The PR summary explicitly introduces
experimental_network.danger_full_access_denylist_only and says it applies only to SandboxPolicy::DangerFullAccess sessions. - The bundle shows the new field wired through config requirements parsing, app-server protocol/schema output, config API mapping, and the TUI debug config surface, which confirms this is a real operator-facing config addition rather than an internal constant.
- The core network proxy spec changes add a wildcard allowlist path plus dedicated tests for enforcing managed denied domains in danger-full-access mode.
- The PR body includes a concrete TOML example under
[experimental_network] and repeatedly warns that the denylist remains best effort only, which is the key behavioral caveat for anyone enabling it.
Caveats
- The PR is explicit that this is not a hard security boundary: a danger-full-access session may still bypass the proxy denylist through allowed sockets or other local/private paths.
- Read-only and workspace-write sandbox modes keep their existing network behavior; this flag is intentionally scoped to danger-full-access only.
Watch state Watch for follow-up hardening around bypass paths and non-loopback proxy listener behavior, since this mode deliberately trades strict isolation for broader connectivity.
- PR [codex] Add danger-full-access denylist-only network mode #16946
- Commit feat(network): add danger-full-access denylist-only mode 9d93253
- Commit fix(network): broaden danger-full-access denylist-only mode 4df276f