GitHub Copilot CLI suggested unverified third-party URL instead of official domain (security issue) #189859
Replies: 1 comment
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Copilot Feature Area
General
Body
Summary
In terminal environments, URLs rendered by GitHub Copilot CLI appear as underlined, clickable hyperlinks. Users naturally trust and click these links. When Copilot guesses an incorrect or unverified URL, it creates a direct security risk — users may be sent to phishing sites, malware, or domains that impersonate legitimate services.
Copilot CLI suggested codex.com — a domain not owned by OpenAI — as the place to manage OpenAI Codex cloud environments.
Steps to Reproduce
Expected Behavior
Copilot should never guess URLs. If the correct domain is not known with certainty, Copilot should say so explicitly (e.g., 'I don't know the exact URL — please check the official OpenAI documentation'). The only acceptable alternative is linking to a known-legitimate domain such as platform.openai.com.
Actual Behavior
Copilot confidently rendered codex.com as a clickable terminal hyperlink. This domain is not affiliated with OpenAI. A user clicking it in-terminal could be directed to a malicious site.
Why This Is a Serious Security Issue
Terminal UIs render URLs as underlined, one-click hyperlinks. Unlike a chat interface where users might scrutinize a URL before typing it, terminal users click first. Copilot's confident, formatted output creates a false sense of legitimacy.
Guessing URLs — even with good intent — is never acceptable in a terminal context. The entire trust model of terminal hyperlinks depends on the rendering application presenting only verified, legitimate sources. Copilot violates this trust when it invents or guesses domain names.
Impact
Any URL Copilot CLI renders as a clickable link must be verified against known legitimate sources. A wrong guess is a security vulnerability, not just a UX bug. Users should be able to trust that every link Copilot produces in a terminal is accurate.
Environment
Beta Was this translation helpful? Give feedback.
All reactions