Skip to content

add a slash command to grant sandbox read access to inaccessible directories#11512

Merged
iceweasel-oai merged 3 commits intomainfrom
dev/iceweasel/add-read-root-slash-command
Feb 12, 2026
Merged

add a slash command to grant sandbox read access to inaccessible directories#11512
iceweasel-oai merged 3 commits intomainfrom
dev/iceweasel/add-read-root-slash-command

Conversation

@iceweasel-oai
Copy link
Collaborator

There is an edge case where a directory is not readable by the sandbox. In practice, we've seen very little of it, but it can happen so this slash command unlocks users when it does.

Future idea is to make this a tool that the agent knows about so it can be more integrated.

@iceweasel-oai iceweasel-oai changed the title add a slash command to grant sandbox read access to missing directories add a slash command to grant sandbox read access to inaccessible directories Feb 12, 2026
@iceweasel-oai iceweasel-oai force-pushed the dev/iceweasel/add-read-root-slash-command branch from 8f1d649 to e51eb54 Compare February 12, 2026 00:33
@iceweasel-oai
Copy link
Collaborator Author

@codex review

Copy link
Contributor

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: e51eb549af

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +1882 to +1885
self.chat_widget
.add_to_history(history_cell::new_info_event(
format!("Sandbox read access granted for {}", path.display()),
None,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Avoid reporting grant success when no ACL refresh ran

This branch always emits a success event on Ok, but grant_read_root_non_elevated can return Ok even when no read grant is applied because run_setup_refresh_inner is a no-op for DangerFullAccess/ExternalSandbox policies (windows-sandbox-rs/src/setup_orchestrator.rs, run_setup_refresh_inner). In that scenario /sandbox-read-root tells the user the directory was granted even though nothing changed, which can mislead them into thinking future sandboxed runs will have access.

Useful? React with 👍 / 👎.

@iceweasel-oai iceweasel-oai merged commit 5c3ca73 into main Feb 12, 2026
33 checks passed
@iceweasel-oai iceweasel-oai deleted the dev/iceweasel/add-read-root-slash-command branch February 12, 2026 20:48
@github-actions github-actions bot locked and limited conversation to collaborators Feb 12, 2026
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants