Codex Chrome Extension Bridges Code to Real Browser Workflows
AICodeKinggo watch the original →
the gist
Codex's new Chrome extension lets AI agents access signed-in browser sessions for tasks in Gmail, Salesforce, or dashboards, with host-based permissions to control risks—paired with CLI upgrades in v0.128/0.129 for resumable, team-friendly agent workflows.
Secure Real-World Browser Access via Chrome Extension
Use Codex's Chrome extension to run browser tasks in your actual signed-in sessions, ideal for authenticated sites like Salesforce, LinkedIn, Gmail, or internal dashboards where re-logging in an in-app browser fails. Install via Codex plugins: add Chrome plugin, connect extension, approve permissions. Codex opens Chrome tabs in groups for parallel tasks without hijacking your session—read pages, click forms, compare content in background. Reserve in-app browser for local dev (e.g., localhost React testing). Invoke directly: "@chrome open Salesforce and update account from notes." Permissions prevent risks: host-based prompts (allow current chat, always allow host, or decline), plus global allow/block lists in settings. Browser history access is task-scoped with no 'always allow,' and OpenAI stores only task-relevant context (text, screenshots), not full recordings. Start with low-risk sites, review actions, block sensitive ones—enables loops like reproduce staging bug in dashboard, fix code, verify locally.
CLI Upgrades for Resumable, Vim-Friendly Terminal Workflows
Versions 0.128 and 0.129 add terminal polish for heavy users: enable Vim-style editing in composer (/vim, custom keymaps), redesigned resume/fork picker with raw scrollback, IDE context injection, workspace-aware diffs. Status line shows theme colors, PR/branch summaries; debug keymaps with keymap debug. Persisted goals (v0.128) support long-running intents: create/pause/resume/clear via TUI or APIs, with validation/duration output—opt-in on resume. Update via 'codex update'; configurable keymaps, plan mode nudges, live titles. These make Codex handle interruptions reliably, turning isolated prompts into deliberate, multi-session pursuits without losing state.
Team-Ready Plugins, Hooks, and Permission Profiles
Plugins gain workspace sharing, access controls, source filtering, marketplace sync, admin disables—standardize across teams (e.g., approved plugins per project). Hooks (/hooks) run pre/post-compaction or pre-tool for injecting rules/checks/context, enforcing consistency. Permissions expand: sandbox profiles, working directory controls, metadata for clients—crucial as agents edit files, run shell, invoke plugins. Defaults cover production needs; always confirm for browsers/files. Fixes improve Windows/Linux sandboxing, network, MCP cleanup. Result: Codex evolves from solo coder to controllable agent workspace linking repo, terminal, browser, plugins—superior for hybrid code/browser dev ops, outpacing model-only rivals.