codex-scionos
v1.0.1
Published
RouterLab launcher and secure token wrapper for OpenAI Codex CLI
Maintainers
Readme
Codex for RouterLab
codex-scionos is a RouterLab launcher for the official OpenAI Codex CLI. It keeps normal Codex usage intact while adding guided onboarding, RouterLab model selection, secure token storage, and a doctor command for support.
Highlights
- guided launch for new users
--strategyto choose a model without opening the menu--service llmfor invitation-only RouterLab LLM access--no-promptfor automation and CI--list-strategiesto inspect available routesdoctorfor quick local diagnosticsauth login|status|change|logout|testto manage the token- custom Codex provider
scionos, without editing~/.codex/config.toml
Requirements
- Node.js 22 or newer
- official Codex CLI (
npm install -g @openai/codex) - a RouterLab token from routerlab.ch/keys
- or an invitation token for
--service llm
Quick Start
npx codex-scionos
npx codex-scionos --list-strategies
npx codex-scionos --service llm --list-strategies
npx codex-scionos doctor
npx codex-scionos auth login
npx codex-scionos auth login --service llm
npx codex-scionos auth test
npx codex-scionos --strategy gpt-5.5
npx codex-scionos --strategy gpt-5.4
npx codex-scionos --strategy gpt-5.4-mini
npx codex-scionos --service llm --strategy gpt-5.4-special
npx codex-scionos --no-prompt --strategy gpt-5.5 exec "Summarize this repo"Services
routerlabuseshttps://routerlab.ch/v1llmuseshttps://llm.routerlab.ch/v1llmis intended for invitation-only accessrouterlabandllmtokens are stored separately
Strategies
default: keep the configured Codex model and route through RouterLabgpt-5.5: forcegpt-5.5gpt-5.4: forcegpt-5.4gpt-5.4-mini: forcegpt-5.4-minigpt-5.3-codex: forcegpt-5.3-codexgpt-5.4-special: forcegpt-5.4-spon--service llmdeepseek-v4-beta: forcedeepseek-v4-proon--service llm
Token Management
Token resolution order:
SCIONOS_ROUTERLAB_TOKEN- secure local storage via
codex-scionos auth login - manual prompt in guided mode
Secure storage backends:
- Windows: local DPAPI-encrypted file bound to the current user
- macOS: Keychain
- Linux: Secret Service via
secret-tool
Codex Compatibility
The wrapper forwards normal Codex arguments. On launch, it only adds -c overrides for the custom provider:
model_provider="scionos"model_providers.scionos.name="RouterLab"ormodel_providers.scionos.name="LLM (invitation only)"model_providers.scionos.base_url="https://routerlab.ch/v1"orhttps://llm.routerlab.ch/v1model_providers.scionos.env_key="SCIONOS_ROUTERLAB_TOKEN"model_providers.scionos.wire_api="responses"model="<strategy model>"when--strategyforces a specific model
Development
npm install
npm test
npm run lint
node index.jsLicense
MIT. See LICENSE.
