II.
Claim JSON
Structured · liveclaim:codex-research-approval-and-sandbox-controls
claim:codex-research-approval-and-sandbox-controls json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "claim:codex-research-approval-and-sandbox-controls",
"_kind": "Claim",
"_file": "catalog-meta/claims/codex-research-claims-2026-05.yaml",
"_cluster": "catalog-meta",
"attributes": {
"subjectId": "agent-runtime-impl:codex.runtime@1.x",
"subjectKind": "AgentRuntimeImpl",
"attribute": "approvalAndSandboxControls",
"value": "approval-policy plus sandbox-mode",
"statement": "Codex runtime controls combine approval policy and sandbox mode: the approval policy determines when Codex must ask before crossing boundaries, and the sandbox defines file and network boundaries for local commands.",
"evidenceSourceIds": [
"evidence:codex-research-openai-approvals-security-doc",
"evidence:codex-research-openai-sandbox-doc"
],
"confidence": "high",
"provenanceKind": "observation",
"evidenceStrength": "strong",
"status": "accepted",
"claimedAt": "2026-05-04T00:00:00Z",
"claimedBy": "a5c-ai-catalog",
"claimKind": "provenance",
"note": "Supports approvalGatingPrimitive and subprocessSandboxStrategy attributes on the Codex runtime model."
},
"outgoingEdges": [
{
"from": "claim:codex-research-approval-and-sandbox-controls",
"to": "agent-runtime-impl:codex.runtime@1.x",
"kind": "about_subject"
},
{
"from": "claim:codex-research-approval-and-sandbox-controls",
"to": "evidence:codex-research-openai-approvals-security-doc",
"kind": "backed_by_evidence"
},
{
"from": "claim:codex-research-approval-and-sandbox-controls",
"to": "evidence:codex-research-openai-sandbox-doc",
"kind": "backed_by_evidence"
}
],
"incomingEdges": []
}