openai-codex-mcp

Provides an MCP server (JSON-RPC over HTTP) that exposes methods (e.g., codex_completion, write_code, explain_code, debug_code) to route requests to the OpenAI Codex CLI for code generation, explanation, and debugging. Designed for use with tools like Claude Code.

Evaluated Mar 30, 2026 (21d ago)
Repo ↗ DevTools mcp json-rpc code-generation developer-tools fastapi uvicorn cli-bridge
⚙ Agent Friendliness
40
/ 100
Can an agent use this?
🔒 Security
22
/ 100
Is it safe for agents?
⚡ Reliability
25
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
70
Error Messages
0
Auth Simplicity
20
Rate Limits
5

🔒 Security

TLS Enforcement
20
Auth Strength
20
Scope Granularity
0
Dep. Hygiene
50
Secret Handling
30

The README shows the server registered with no authentication and uses http://localhost:8000/ in examples, suggesting minimal transport/security guidance. The server depends on running an external Codex CLI configured with an OpenAI API key; secure handling of that key is not described here. No information is provided about TLS enforcement, request logging redaction, CSRF protection, or rate limiting.

⚡ Reliability

Uptime/SLA
0
Version Stability
35
Breaking Changes
40
Error Recovery
25
AF Security Reliability

Best When

You want a lightweight local (localhost) bridge between an MCP-capable client and the @openai/codex CLI for developer-assistant coding tasks.

Avoid When

You cannot restrict network access to the MCP server (e.g., leaving it exposed without authentication), or you need formal API contracts (OpenAPI) and explicit rate-limit/timeout/error semantics.

Use Cases

  • Integrate an OpenAI Codex CLI workflow into an MCP-capable agent/tool for code generation
  • Request structured code outputs for a specified language via a dedicated MCP method
  • Ask for explanations of provided code via MCP
  • Debug/fix code given an issue description via MCP

Not For

  • Production-grade deployments that require strong authentication/authorization controls at the MCP server boundary
  • Use cases needing stable OpenAPI/typed SDK contracts for programmatic integration beyond raw JSON-RPC
  • Environments where HTTP access to the server must be strictly controlled (since the README shows no MCP-side authentication)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: None (README instructs leaving Authentication blank for Claude Code tool registration)
OAuth: No Scopes: No

Authentication is not described for the MCP server; the manual Claude Code setup instructs leaving authentication blank. Any real auth would need to be verified from the implementation, which is not included here.

Pricing

Free tier: No
Requires CC: No

No pricing information for the MCP server is provided. Costs would come from using the Codex CLI / underlying OpenAI usage.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • The MCP server forwards to the Codex CLI; behavior/latency and error semantics may be inherited from the CLI invocation rather than clearly specified here.
  • Authentication is not described for the server; agents may assume the tool is safe to call only locally/within a trusted network.
  • Rate limits, timeouts, and structured error codes are not documented in the provided README; agent retry/backoff strategies may be guesswork.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for openai-codex-mcp.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered