oracle
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/refresh_cookies.pyexecutes thesecuritycommand to retrieve the 'Chrome Safe Storage' password from the macOS Keychain. This password is used to decrypt sensitive local data stored by the Chrome browser.\n- [DATA_EXFILTRATION]: The skill accesses the local SQLite database for Google Chrome cookies, decrypts entries matching 'chatgpt', and saves the resulting session tokens to a local file (~/.oracle/cookies.json). This exposes sensitive authentication credentials to any process with read access to the user's home directory.\n- [EXTERNAL_DOWNLOADS]: Inscripts/run_oracle.py, the skill usesnpxto dynamically fetch and run the@steipete/oraclepackage from the npm registry at runtime without prior verification of the package content.\n- [COMMAND_EXECUTION]: The skill relies on spawning multiple subprocesses to perform its core functions, including interacting with the system keychain and running external command-line tools.
Recommendations
- AI detected serious security threats
Audit Metadata