Skip to content

Clarify approval limits for finish automation#543

Merged
NagyVikt merged 1 commit intomainfrom
agent/codex/codex-approval-policy-guidance-2026-05-10-01-30
May 9, 2026
Merged

Clarify approval limits for finish automation#543
NagyVikt merged 1 commit intomainfrom
agent/codex/codex-approval-policy-guidance-2026-05-10-01-30

Conversation

@NagyVikt
Copy link
Copy Markdown
Collaborator

@NagyVikt NagyVikt commented May 9, 2026

Automated by gx branch finish (PR flow).

Guardex owns the repo-side finish flow, but Codex host policy still controls external remote side effects. The managed AGENTS block now tells agents to request one narrow finish-flow approval instead of retrying raw push or PR commands.

Constraint: Codex host approval policy cannot be bypassed from repo code

Rejected: Add a push bypass in gx | host-side policy intercepts commands before repo code can run

Confidence: high

Scope-risk: narrow

Directive: Keep publish guidance routed through gx branch finish; do not teach raw git push retries as the workaround

Tested: node --test test/setup.test.js

Tested: openspec validate --specs

Co-authored-by: OmX <omx@oh-my-codex.dev>
@NagyVikt NagyVikt merged commit 246da12 into main May 9, 2026
@NagyVikt NagyVikt deleted the agent/codex/codex-approval-policy-guidance-2026-05-10-01-30 branch May 9, 2026 23:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant