Introduction

Oracle is the enterprise-grade tool for Verifying, Auditing, and Securing API infrastructure. We solve the critical problem of credential opacity—instantly determining if a key is active, what permissions it holds, and if it belongs to the service you think it does.

Designed for DevOps, Security Engineers, and Developers, Oracle parses complex environment files (`.env`), logs, and configs to provide a unified health report of your entire credential stack.

Key Features

  • Multi-Provider Support: Native validation for over 30+ services (AI, Cloud, Database, Infra).
  • Context-Aware Analysis: Detects mismatches between variable names (e.g., `OPENAI_KEY`) and legitimate key types (e.g., Google keys), preventing configuration drift.
  • Granular Error Reporting: Distinguishes between Invalid (401), Leaked/Inactive (403), and Quota Exceeded (429).
  • Smart Fallbacks: Automatically identifying cross-provider formats (e.g., Stripe/Clerk collisions, Google/Firebase/Gemini shared prefixes).

Supported Providers (28+)

Oracle supports a massive ecosystem of APIs, constantly updated.

AI & LLM Services

OpenAI
Anthropic
Google Gemini
Cohere
Mistral
Groq
HuggingFace

Infrastructure & Cloud

AWS
Google Cloud
Firebase
Supabase
Heroku
Cloudinary
Upstash
Neon/Postgres

DevOps & Tools

GitHub
GitLab
NPM
Docker
Pusher
Shodan

Communication & Marketing

Slack
SendGrid
Resend
Mailgun
MailChimp
Twilio
Telegram

Context-Aware Validation

Environment variables are often copy-pasted incorrectly. Oracle reads the context around your key.

# Bad Configuration Example GROQ_API_KEY="AIzaSyB..." <-- This is actually a Google Key! # Oracle Result: [WARNING] Google (Labeled Groq) "This key matches Google format, not Groq (gsk_...)."

Security Architecture

We employ a Zero-Trust, Zero-Retention architecture designed for maximum security.

  • Client-Side Encryption: Keys are encrypted with AES-256 GCM before leaving your browser. The plain-text key is never visible to the network.
  • Ephemeral Processing: Keys are decrypted in volatile memory (RAM) only for the microseconds required to validate them against the provider.
  • Immediate Sanitization: Variables holding credentials are strictly nullified and garbage-collected immediately after use.
  • No Persistence: We do not use a database for credentials. There are no logs, no caches, and no backups of your keys.