To bring Codex to Windows, we had to answer a hard question: how do you let coding agents stay useful without forcing developers to choose between constant approval prompts and full machine access? Here’s how we built the Windows sandbox for Codex: https://t.co/U8JfOe3WIG
OpenAI Builds Custom Windows Sandbox to Secure Codex Agentic Workflows
- Network security
- Windows Firewall (requires admin elevation)
- File access control
- Write-restricted tokens and synthetic SIDs
- Sandbox identities
- CodexSandboxOffline and CodexSandboxOnline
- Supported interfaces
- CLI, IDE extensions, and Desktop app
- Setup requirement
- One-time administrator elevation
Windows lacks native sandboxing utilities found in macOS or Linux, forcing users to choose between approving every command or granting full system access. This solution bridges that gap, allowing agents to perform complex tasks like running tests without constant oversight. It provides the security foundation for Codex's multi-day autonomous engineering sessions.
To use the sandbox, you must perform a one-time setup requiring administrator privileges to create dedicated local users and configure Windows Firewall rules. These rules block outbound network traffic for the agent, preventing data exfiltration. The sandbox is available for testing across the Codex CLI, IDE extensions, and desktop application.
Still wondering? A few quick answers below.



