OpenAI Codex CLI vrust-v0.107.0

Summary

New Features - You can now fork a thread into sub-agents, making it easier to branch work without leaving the current conversation. (12499) - Realtime voice sessions now let you pick microphone and...

Release Notes

New Features - You can now fork a thread into sub-agents, making it easier to branch work without leaving the current conversation. (12499) - Realtime voice sessions now let you pick microphone and speaker devices, persist those choices, and send audio in a format better aligned with transcription. (12849, 12850, 13030) - Custom tools can now return multimodal output, including structured content like images, instead of being limited to plain text. (12948) - The app server now exposes richer model availability and upgrade metadata, and the TUI uses it to explain plan-gated models with limited-run tooltips. (12958, 12972, 13021) - Memories are now configurable, and there is a new codex debug clear-memories command to fully reset saved memory state when needed. (12997, 12999, 13002, 13085) Bug Fixes - Reconnecting with thread/resume now restores pending approval and input requests instead of leaving clients out of sync. (12560) - thread/start no longer blocks unrelated app-server requests, reducing stalls during slow startup paths such as MCP auth checks. (13033) - Interactive terminal sessions no longer print the final assistant response twice. (13082) - Large pasted-content placeholders now survive file completion correctly, fixing a regression from 0.106.0. (13070) - ChatGPT accounts that arrive without plan info now handle account reads correctly instead of triggering repeated login issues. (13072) - Diff rendering in the TUI now respects theme colors better and displays more cleanly in Windows Terminal and other low-color environments. (13016, 13037) - MCP OAuth login flows now forward configured oauthresource values correctly for servers that require a resource parameter. (12866) Documentation - Updated sandbox escalation guidance so dependency-install failures caused by sandboxed network access are more clearly treated as escalation candidates. (13051) Chores - Tightened sandbox filesystem behavior by improving restricted read-only handling on Linux and avoidin

View original release

View all AI coding tool releases on Havoptic