consult-oracle
Fail
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/refresh_cookies.pyretrieves the 'Chrome Safe Storage' encryption key from the macOS Keychain usingsubprocess.check_output(['security', 'find-generic-password', ...]). This bypasses standard browser isolation and triggers a system password prompt.\n- [CREDENTIALS_UNSAFE]: The skill reads the Chrome Cookies SQLite database directly from the user's filesystem at~/Library/Application Support/Google/Chrome/, exposing all stored browser session tokens.\n- [DATA_EXFILTRATION]: Extracted session cookies are decrypted and saved to a local file (~/.oracle/cookies.json) and transmitted tohttps://chatgpt.com/api/auth/sessionfor session validation.\n- [EXTERNAL_DOWNLOADS]: Inscripts/run_oracle.py, the skill usesnpx -y @steipete/oracleto download and execute code from a third-party registry at runtime without version pinning or source verification.\n- [COMMAND_EXECUTION]: The skill makes extensive use of thesubprocessmodule to execute system security tools and external package runners, providing a path for command injection or unauthorized system interaction.
Recommendations
- AI detected serious security threats
Audit Metadata