Press Release Desk

Your Trusted Source For Verified Official News

AI
OPENAI
πŸ“… May 09, 2026

Codex Chrome Extension Brings Signed-In Browser Tasks to Chrome

Codex Chrome extension enables Codex to operate inside signed-in Chrome sessions, giving users browser-based task execution with website approvals, permission controls, and integrated workflow management.

The Codex Chrome extension allows Codex to complete browser tasks that require a signed-in Chrome session. OpenAI said the feature works with websites such as LinkedIn, Salesforce, Gmail, and internal tools that depend on existing browser authentication. The extension operates alongside other Codex tools, allowing tasks to move between plugins, Chrome, and the in-app browser depending on the workflow requirements. OpenAI advised users to review page content carefully before approving browser activity because websites are treated as untrusted context.

πŸ”‘ Key Highlights

  • Codex uses Chrome for signed-in browser workflows
  • Extension supports LinkedIn, Gmail, Salesforce, and internal tools
  • Website access requires approvals, allowlists, or blocklists
  • Browser tasks run inside grouped Chrome tabs
  • OpenAI limits stored browsing activity within Codex context

Setup begins through the Plugins section inside Codex. Users add the Chrome plugin, complete the installation flow, approve Chrome permission prompts, and confirm that the extension shows a connected status inside the browser. Once configured, Codex can recommend Chrome automatically for tasks requiring authenticated access or respond directly to prompts requesting browser actions. OpenAI also stated that Chrome tasks operate inside dedicated tab groups so work from individual threads remains organized during active sessions.

OpenAI built multiple layers of access management around the extension. By default, Codex asks before interacting with a new website and bases approvals on the domain host. Users can approve access for a single conversation, permanently allow a domain, or block it entirely. The settings menu also includes allowlists and blocklists that determine how future browser requests are handled. OpenAI added that browser history access receives separate approval requests and cannot be permanently enabled through an always-allow option.

The documentation outlines extensive Chrome permissions tied to browser workflows. These include access to debugging tools, browsing history, bookmarks, downloads, notifications, and tab groups. OpenAI said the extension still depends on Codex confirmation systems and user-defined controls before using websites or browser history within a task. The company also clarified that it does not keep a separate complete log of Chrome actions performed through the extension. Instead, only information incorporated into Codex context β€” including screenshots, summaries, messages, and extracted page text β€” becomes part of stored activity.

The release positions browser access as a central part of Codex task execution. The extension gives users a structured way to combine authenticated websites, workflow automation, and browser management within Chrome while maintaining approval-based controls over sensitive browsing activity. OpenAI’s design places security settings, permission visibility, and user review mechanisms directly inside the browser workflow instead of separating them from the task environment.

πŸ“Š What This Means (Our Analysis)

The Codex Chrome extension reflects how AI coding and automation tools are moving closer to live browser environments instead of remaining isolated development assistants. By operating inside authenticated Chrome sessions, Codex gains access to the same web-based systems where much of modern work already happens, from internal dashboards to communication platforms.

What stands out is the emphasis on layered permissions and user control. OpenAI structured the extension around approvals, domain management, and explicit history access requests rather than unrestricted automation. That approach makes browser-based AI workflows feel more operationally practical, especially for users balancing productivity gains with security concerns inside active browser sessions.

πŸ“Œ Our Take: Browser-native AI agents are steadily becoming part of everyday workflow infrastructure rather than standalone experimental tools.

πŸ“’ Read the Official Press Release

Read Official News β†’
Back to All News