Introduction

Oracle is the enterprise-grade tool for Verifying, Auditing, and Securing API infrastructure. We solve the critical problem of credential opacity—instantly determining if a key is active, what permissions it holds, and if it belongs to the service you think it does.

Designed for DevOps, Security Engineers, and Developers, Oracle parses complex environment files (`.env`), logs, and configs to provide a unified health report of your entire credential stack.

Key Features

  • Multi-Provider Support: Native validation for over 30+ services (AI, Cloud, Database, Infra).
  • Context-Aware Analysis: Detects mismatches between variable names (e.g., `OPENAI_KEY`) and legitimate key types (e.g., Google keys), preventing configuration drift.
  • Granular Error Reporting: Distinguishes between Invalid (401), Leaked/Inactive (403), and Quota Exceeded (429).
  • Smart Fallbacks: Automatically identifying cross-provider formats (e.g., Stripe/Clerk collisions, Google/Firebase/Gemini shared prefixes).

Supported Providers (28+)

Oracle supports a massive ecosystem of APIs, constantly updated.

AI & LLM Services

OpenAI
Anthropic
Google Gemini
Cohere
Mistral
Groq
HuggingFace

Infrastructure & Cloud

AWS
Google Cloud
Firebase
Supabase
Heroku
Cloudinary
Upstash
Neon/Postgres

DevOps & Tools

GitHub
GitLab
NPM
Docker
Pusher
Shodan

Communication & Marketing

Slack
SendGrid
Resend
Mailgun
MailChimp
Twilio
Telegram

Context-Aware Validation

Environment variables are often copy-pasted incorrectly. Oracle reads the context around your key.

# Bad Configuration Example GROQ_API_KEY="AIzaSyB..." <-- This is actually a Google Key! # Oracle Result: [WARNING] Google (Labeled Groq) "This key matches Google format, not Groq (gsk_...)."

Security Architecture

Oracle uses a defense-in-depth model with strict verification semantics and production-safe defaults.

  • Strict Verification Levels: Every result includes verificationLevel (verified, format_only, unknown). Format-only matches are treated as unverified, not working.
  • Transport Security: API requests are expected over HTTPS. Optional payload encryption is available when NEXT_PUBLIC_ENCRYPTION_KEY is configured.
  • Privacy-Safe Leak Handling: Oracle does not send raw keys to third-party code-search providers for leak checks.
  • Safe Local History Defaults: Postman-style request history is disabled by default. If enabled, sensitive headers/auth fields are redacted before localStorage persistence.
  • No Credential Database: Oracle does not persist credentials server-side in an application database.