Skip to content

Conversation

@pakrym-oai
Copy link
Collaborator

@pakrym-oai pakrym-oai commented Nov 11, 2025

Similar implementation to the shell tool

… to 2.10.0, and thiserror to 2.0.17

core/tests/suite/approvals.rs: workaround Linux sandbox arg0 test on ARM by using ReadOnly policy and cfg-gating test scenario
Copy link
Collaborator

@dylan-hurd-oai dylan-hurd-oai left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Going to defer to @jif-oai for better context on the new tool framework

"with_escalated_permissions".to_string(),
JsonSchema::Boolean {
description: Some(
"Whether to request escalated permissions. Set to true if command needs to be run without sandbox restrictions"
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did we eval the model with this parameter?

- Update error message to say "you cannot ask for escalated permissions" instead of "you should not ask"
- Change justification in ExecCommandRequest from Option<&str> to Option<String>
- Propagate String justification throughout unified_exec and session_manager
@pakrym-oai pakrym-oai merged commit 807e2c2 into main Nov 11, 2025
23 of 25 checks passed
@pakrym-oai pakrym-oai deleted the codex/implement-exec_command-with-escalated-permissions branch November 11, 2025 16:19
@github-actions github-actions bot locked and limited conversation to collaborators Nov 11, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants