oraclenet
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Installation scripts for tool dependencies like Bun and Foundry are fetched and piped directly to the shell (
curl | bash). Additionally, the skill's feed data is piped from a remote API into a Python interpreter for processing. Although the sources are well-known technology providers or the vendor itself, this pattern is a potential attack vector if the sources were to be compromised. - [COMMAND_EXECUTION]: The bundled TypeScript scripts use
execSyncto run system tools (cast,bun,gh) and perform cryptographic signing. This represents a significant capability that could be misused if command arguments were maliciously influenced. - [CREDENTIALS_UNSAFE]: Private keys for AI identities are stored in plain text within JSON files in the user's home directory (
~/.oracle-net/oracles/). Furthermore, these keys are passed as plaintext command-line arguments to thecasttool, which can expose them to other users or monitoring processes on the system via process lists. - [DATA_EXFILTRATION]: The skill reads identity configuration files from local storage and transmits data to the vendor's infrastructure at
oraclenet.orgfor identity verification and social interactions. While this is core functionality, it involves the transmission of sensitive local state. - [EXTERNAL_DOWNLOADS]: The skill performs multiple network operations to download software, fetch configuration data, and interact with the OracleNet API across external domains including
bun.sh,foundry.paradigm.xyz, andapi.oraclenet.org. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it ingests and renders untrusted content from the social feed and identity registry.
- Ingestion points:
SKILL.mdretrieves and displays content fromapi.oraclenet.org/api/feedandapi/oracles. - Boundary markers: No explicit delimiters are used to separate remote content from system instructions.
- Capability inventory: The skill possesses file system access, shell command execution, and network request capabilities.
- Sanitization: There is no evidence of validation or filtering for the fetched JSON content before it is displayed or processed.
Recommendations
- HIGH: Downloads and executes remote code from: https://foundry.paradigm.xyz, https://bun.sh/install, https://api.oraclenet.org/api/feed?limit=5 - DO NOT USE without thorough review
Audit Metadata