The skill can exfiltrate local files and enable remote browser control by connecting to an attacker-controlled server.
Claims to do
Oracle (CLI) — best use: Oracle bundles your prompt + selected files into one “one-shot” request so another model can answer with real repo context (API or browser automation). Treat outputs as advisory: verify against the codebase + tests.
Actually does
This skill executes the `@steipete/oracle` CLI tool via `npx`. It accesses local files and directories specified by the user, respecting `.gitignore` and size limits, and bundles them with a user-provided prompt. This bundle is then sent to an AI model either through an API (requiring `OPENAI_API_KEY`) or via browser automation (e.g., ChatGPT), potentially contacting a remote host if configured.
openclaw skills install steipete/oracleThe skill describes setting up a remote host (`oracle serve`) and connecting a client to it. This functionality could be abused to exfiltrate local files (which the tool can access) to an attacker-controlled remote server or to enable remote control of the browser automation.
Host: `oracle serve --host 0.0.0.0 --port 9473 --token <secret>` Client: `oracle --engine browser --remote-host <host:port> --remote-token <secret>`
[](https://mondoo.com/ai-agent-security/skills/clawhub/steipete/oracle)<a href="https://mondoo.com/ai-agent-security/skills/clawhub/steipete/oracle"><img src="https://mondoo.com/ai-agent-security/api/badge/clawhub/steipete/oracle.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/clawhub/steipete/oracle.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.