Unofficial educational proof of concept for running the current macOS Codex desktop app payload on Windows using Electron.
- Goal: launch app, connect backend, run basic agent task on Windows.
- This is a reverse-engineering and compatibility exercise, not an official release.
- No OpenAI proprietary app payload or binaries are redistributed here.
- Checkpoint C0: app launches on Windows.
- Checkpoint C1: renderer UI loads.
- Checkpoint C2: backend connects and executes a basic task.
- Next: C3/C4 worktree and file operation validation.
- App version:
260205.1301 - Build number:
554 - Electron runtime:
40.0.0 - Backend source:
@openai/codexvendoredcodex.exe
- Sanitized setup and launch instructions.
- Reusable scripts (launch, compare, leakage scan).
- Technical notes and troubleshooting.
- Extracted Codex desktop application files.
app.asarcontents from OpenAI distribution.- Vendored backend binaries.
- Personal machine-specific logs or identity data.
- Windows 10/11 x64
- Node.js + npm
- 7-Zip
- Local Electron 40 runtime
- A legal local copy of the Codex macOS app payload (for your own extraction)
npm i -g @openai/codex
- Prepare your extracted app payload in your own workspace.
- Use
scripts/launch_codex_windows.ps1with your paths. - Confirm startup and run a smoke prompt:
List files in this directory.
See HOWTO.md for full steps.
- Unofficial and not affiliated with OpenAI.
- Respect OpenAI terms and local law.
- Publish only scripts/docs/patch notes, never proprietary payload files.
- MIT for original content in this repository (docs, scripts, and notes).
- This license does not apply to third-party or proprietary software referenced by this workflow (including OpenAI app payloads and binaries).