Codexmonitor

List/inspect/watch local OpenAI Codex sessions (CLI + VS Code) using the CodexMonitor Homebrew formula. Reads sessions from ~/.codex/sessions by default (or...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
6 · 3.3k · 9 current installs · 9 all-time installs
byOliver Drobnik@odrobnik
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (list/inspect/watch local Codex sessions) match the declared requirements: a codexmonitor binary installed via the cocoanetics/tap Homebrew formula. No unrelated binaries or credentials are requested.
Instruction Scope
SKILL.md instructs the agent to run the codexmonitor binary and to read session files under ~/.codex/sessions (or CODEX_SESSIONS_DIR / CODEX_HOME). Accessing these local session files is sensitive but is directly relevant to the tool's purpose.
Install Mechanism
Installation uses a Homebrew formula from a third-party tap (cocoanetics/tap). Homebrew installs a binary to disk which will be executed; this is expected but higher-risk than an official/mainstream tap — verify the tap/formula before installing.
Credentials
No required environment variables or credentials are declared. Optional env vars mentioned (CODEX_SESSIONS_DIR, CODEX_HOME) are appropriate for overriding the sessions path.
Persistence & Privilege
Skill is not always-enabled and does not request elevated platform privileges. It does not declare modifications to other skills or global agent configs.
Assessment
This skill appears coherent with its purpose, but take these precautions before installing: (1) Verify the Homebrew tap and formula (cocoanetics/tap) and review the GitHub repo to ensure the binary is trustworthy. Third‑party taps can install arbitrary code. (2) Be aware codexmonitor reads your local Codex session files (~/.codex/sessions), which may contain sensitive prompts or data — only install if you trust the binary. (3) Consider inspecting the installed binary or running it in a restricted environment (sandbox, VM) and monitor network activity the first time you run it. (4) If you need stronger assurance, ask for the formula/source of the codexmonitor binary and have it reviewed before installing.

Like a lobster shell, security has layers — review code before you run it.

Current versionv0.2.2
Download zip
latestvk977kn9xe1xyfxr68x1aph4j01827fr7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binscodexmonitor

Install

Install codexmonitor via Homebrew
Bins: codexmonitor
brew install cocoanetics/tap/codexmonitor

SKILL.md

codexmonitor

Use codexmonitor to browse local OpenAI Codex sessions.

Setup

See SETUP.md for prerequisites and setup instructions.

Common commands

  • List sessions (day): codexmonitor list 2026/01/08
  • List sessions (day, JSON): codexmonitor list --json 2026/01/08
  • Show a session: codexmonitor show <session-id>
  • Show with ranges: codexmonitor show <session-id> --ranges 1...3,26...28
  • Show JSON: codexmonitor show <session-id> --json
  • Watch all: codexmonitor watch
  • Watch specific: codexmonitor watch --session <session-id>

Notes

  • Sessions live under ~/.codex/sessions/YYYY/MM/DD/ by default.
  • If your sessions live somewhere else, set CODEX_SESSIONS_DIR (preferred) or CODEX_HOME.
  • Sessions can be resumed/appended by id via Codex: codex exec resume <SESSION_ID> "message".

Files

2 total
Select a file
Select a file to preview.

Comments

Loading comments…