This is a starter skeleton for a marketplace plugin repo ubiquity-os-marketplace/command-codex.
It is intended to be run as a GitHub Actions plugin (via workflow_dispatch) and invoked from the kernel via:
/codex <task>@ubiquityos codex <task>
manifest.json: declares a singlecodexcommand (no tool parameters; task is extracted from the comment body)..github/workflows/compute.yml: a first-pass workflow that:- decompresses the kernel event payload
- validates explicit invocation + basic authorization
- checks out the target repo using the kernel-provided
authToken - runs Codex via
openai/codex-action@v1(codex exec) - commits & pushes changes to a branch
- creates a draft PR and comments back with the PR link
This mirrors the patterns used by:
lib/command-ask/.github/workflows/compute.yml(decompress + checkout target repo)lib/hello-world-plugin/manifest.json(simple command declaration)
openai/codex-action is API-key based, so you need:
OPENAI_API_KEY
Set secrets in GitHub Actions Environments (development and main) or repo secrets.
In the target repo’s .github/.ubiquity-os.config.yml (or dev variant), enable the plugin:
plugins:
ubiquity-os-marketplace/command-codex@development:
with:
allowedAuthorAssociations:
- OWNER
- MEMBER
- COLLABORATOR
denyForkPRs: true
requireExplicitInvocation: true
sandbox: workspace-write # set to danger-full-access for full runner + network access
safetyStrategy: drop-sudo
codexArgs: "" # extra `codex exec` flags (optional)
passAuthTokenToCodex: false # set true to expose GH_TOKEN to Codex (dangerous)
draftPr: true- This skeleton is intentionally conservative: it does not pass GitHub tokens to Codex.
- For fork PRs and other edge cases, refine policies in
compute.yml. openai/codex-actionhas its own workflow-actor permission gate; the workflow setsallow-bots: truebecause kernel-triggeredworkflow_dispatchruns are typically started by a bot/App actor.