skills/tobihagemann/turbo/oracle/Gen Agent Trust Hub

oracle

Fail

Audited by Gen Agent Trust Hub on Mar 12, 2026

Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The script scripts/refresh_cookies.py executes the security command to retrieve the 'Chrome Safe Storage' password from the macOS Keychain. This password is used to decrypt sensitive local data stored by the Chrome browser.\n- [DATA_EXFILTRATION]: The skill accesses the local SQLite database for Google Chrome cookies, decrypts entries matching 'chatgpt', and saves the resulting session tokens to a local file (~/.oracle/cookies.json). This exposes sensitive authentication credentials to any process with read access to the user's home directory.\n- [EXTERNAL_DOWNLOADS]: In scripts/run_oracle.py, the skill uses npx to dynamically fetch and run the @steipete/oracle package from the npm registry at runtime without prior verification of the package content.\n- [COMMAND_EXECUTION]: The skill relies on spawning multiple subprocesses to perform its core functions, including interacting with the system keychain and running external command-line tools.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 12, 2026, 10:37 AM