Codexmonitor
List/inspect/watch local OpenAI Codex sessions (CLI + VS Code) using the CodexMonitor Homebrew formula. Reads sessions from ~/.codex/sessions by default (or...
MIT-0 · Free to use, modify, and redistribute. No attribution required.
⭐ 6 · 3.3k · 9 current installs · 9 all-time installs
byOliver Drobnik@odrobnik
MIT-0
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (list/inspect/watch local Codex sessions) match the declared requirements: a codexmonitor binary installed via the cocoanetics/tap Homebrew formula. No unrelated binaries or credentials are requested.
Instruction Scope
SKILL.md instructs the agent to run the codexmonitor binary and to read session files under ~/.codex/sessions (or CODEX_SESSIONS_DIR / CODEX_HOME). Accessing these local session files is sensitive but is directly relevant to the tool's purpose.
Install Mechanism
Installation uses a Homebrew formula from a third-party tap (cocoanetics/tap). Homebrew installs a binary to disk which will be executed; this is expected but higher-risk than an official/mainstream tap — verify the tap/formula before installing.
Credentials
No required environment variables or credentials are declared. Optional env vars mentioned (CODEX_SESSIONS_DIR, CODEX_HOME) are appropriate for overriding the sessions path.
Persistence & Privilege
Skill is not always-enabled and does not request elevated platform privileges. It does not declare modifications to other skills or global agent configs.
Assessment
This skill appears coherent with its purpose, but take these precautions before installing: (1) Verify the Homebrew tap and formula (cocoanetics/tap) and review the GitHub repo to ensure the binary is trustworthy. Third‑party taps can install arbitrary code. (2) Be aware codexmonitor reads your local Codex session files (~/.codex/sessions), which may contain sensitive prompts or data — only install if you trust the binary. (3) Consider inspecting the installed binary or running it in a restricted environment (sandbox, VM) and monitor network activity the first time you run it. (4) If you need stronger assurance, ask for the formula/source of the codexmonitor binary and have it reviewed before installing.Like a lobster shell, security has layers — review code before you run it.
Current versionv0.2.2
Download ziplatest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binscodexmonitor
Install
Install codexmonitor via Homebrew
Bins: codexmonitor
brew install cocoanetics/tap/codexmonitorSKILL.md
codexmonitor
Use codexmonitor to browse local OpenAI Codex sessions.
Setup
See SETUP.md for prerequisites and setup instructions.
Common commands
- List sessions (day):
codexmonitor list 2026/01/08 - List sessions (day, JSON):
codexmonitor list --json 2026/01/08 - Show a session:
codexmonitor show <session-id> - Show with ranges:
codexmonitor show <session-id> --ranges 1...3,26...28 - Show JSON:
codexmonitor show <session-id> --json - Watch all:
codexmonitor watch - Watch specific:
codexmonitor watch --session <session-id>
Notes
- Sessions live under
~/.codex/sessions/YYYY/MM/DD/by default. - If your sessions live somewhere else, set
CODEX_SESSIONS_DIR(preferred) orCODEX_HOME. - Sessions can be resumed/appended by id via Codex:
codex exec resume <SESSION_ID> "message".
Files
2 totalSelect a file
Select a file to preview.
Comments
Loading comments…
