Skip to content

chAng-L19/codex-redteam-mode

Repository files navigation

Codex Red Team Opt-In Mode

English|中文

Defaults to normal; only enters red-team mode when explicitly enabled.

This is a lightweight, pack-first red team runtime/configuration layer for Codex.

Its goal is not to turn Codex into an automated attack platform.

Why Do This Project?

Many "persistent red team hints" ultimately lead to two bad outcomes:

  1. Pollution of normal operations

  2. Overly heavy injection, leading to context bloat

This project does the opposite:

  • Normal mode remains normal

Red team mode must be explicitly enabled

Hooks remain lightweight

Routes remain layered and restrained

Core Features

  • opt-in Red Team Mode

  • normal / redteam-light / redteam-full

  • Structured JSON runtime state

  • Rule-first + semantic fallback phase detection

  • Session isolated state file

  • Lightweight prompt overlay

  • Pack-first Main Routing Line:

phase -> router -> pack -> leaf

Coverage Scenarios

Core Phase:

  • web

  • ad

  • postex

  • reverse

  • code-audit

  • payload

  • evasion

Extended Router/Pack Family:

  • recon

  • api

  • auth

  • injection

  • file

  • business logic

  • cloud

  • container/kubernetes

  • network/protocol

  • crypto

  • mobile

Installation

The installer uses managed incremental installation:

  • Preserves the user's original AGENTS.md

  • Preserves the user's original hooks.json

  • Injects only managed blocks from this repository

  • Deletes old version runtime remnants from this repository

  • Cleanly installs the current version

  • Writes to the install manifest

  • Automatically executes validate after installation

Python

python scripts/install.py

Windows

powershell -ExecutionPolicy Bypass -File .\scripts\install.ps1

macOS / Linux

python3 scripts/install.py

Quick Start

Enable Red Team Mode

Enable Red Team Mode

/redteam on

/redteam light

/redteam full
enable red team mode

Disable Red Team Mode

Disable Red Team Mode

/redteam off
disable red team mode

Verify Installation

python scripts/validate.py

Working Flow

Runtime Mainline

The current actual routing mainline is:

phase -> router -> pack -> leaf

method It still exists, but is only used as a soft tip when it is genuinely helpful; it is no longer the main routing axis.

Mode Description

| Mode | Default | Typical Use |

|---|---:|---|

| normal | Yes | Coding, documentation, general research |

| redteam-light | No | Targeted security analysis, planning, review |

| redteam-full | No | More constrained red team workflow |

Validation

The repository includes:

  • Installer check

  • Routing test

  • Mode switching test

  • Orchestration gate check

  • Prompt-chain check

Executable:

python -m unittest discover -s tests -p "test_*.py"

python scripts/validate.py

Known Limitations

  • This is the control/configuration layer, not a complete attack platform

  • The actual effect of the prompt overlay still depends on the target Codex environment

  • The user's local private prompt system may differ from the repository version

  • The actual execution depth still depends on your MCP/ Tools

⚠️ Disclaimer

This project is intended solely for authorized penetration testing, red team research, and defensive security experiments.

Use only on systems or environments where you have explicit authorization.

Unauthorized use on third-party or production systems is prohibited.

The authors and contributors assume no responsibility for misuse, legal consequences, service interruption, or data loss.

By using this project, you agree to assume all risks and ensure that your actions comply with applicable laws and regulations.

Contributions and Acknowledgements

Thanks to Mingxi from the Mister Security Team for the suggested modifications: adding semantic judgment, removing methodology, and subdividing skills to make the AI ​​more intelligent during the work phase.

Mingxi X: @xishan12509850

Thanks to Nirvana for the suggested modifications: optimizing the workflow and enabling overlay installation. Nirvana X: @Nirvana_543

Thanks to PINGS for the suggestions: enhancing the jailbreak text.

Thanks to qiushi-skill, hack-skills, and Anthropic-Cybersecurity-Skills for providing the method layer, technology routing layer, and skill pack structure reference.

Reference project: qiushi-skill / yaklang/hack-skills / mukul975/Anthropic-Cybersecurity-Skills

Contributions

See CONTRIBUTING.md.

License

MIT, see LICENSE.

About

针对于红队攻击思维做出的red team模式(让你的codex像红队一样思考!),可在单对话使用(目前只支持5.4,5.5需要过cyber认证,可自行适配其他AI)

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages