Skip to content

GravityZenAI/oraculo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ORÁCULO — Enterprise Code Audit Prompt

The most comprehensive single-prompt security auditor that exists.

Paste it into any LLM. Get an enterprise-grade security audit. No installation. No configuration. No dependencies.


What is ORÁCULO?

ORÁCULO is a carefully engineered prompt that transforms any LLM (Claude, GPT, Gemini, Llama, or any other) into a full security auditor with:

  • 5 simultaneous identities — Red Team attacker, Blue Team defender, QA engineer, Software Architect, and Purple Team chain analyst
  • 8 sequential phases — Reconnaissance → Taint Analysis → State Machine → Cross-Dependencies → Crypto/Secrets/Timing → Triple OWASP → Tests → Attack Chains
  • Triple OWASP coverage — the only prompt that checks all three simultaneously:
    • OWASP Top 10 (web applications)
    • OWASP LLM Top 10 (AI/ML systems)
    • OWASP Agentic Top 10 ASI 2026 (autonomous AI agents)
  • 14 unbreakable rules — anti-hallucination, zero trust, auto-fix with diff, self-verification
  • Multi-language support — JavaScript/TypeScript, Python, Go, Rust
  • Self-audited — 11 passes, 40 vulnerabilities found and fixed in itself

Quick Start

  1. Open ORACULO-v2.1.md
  2. Copy everything between INICIO and FIN
  3. Paste it into any LLM chat
  4. The LLM audits whatever code it has access to

That's it. No setup. No API keys. No tools to install.

What It Finds

Category Examples
Injection SQL, NoSQL, XSS, SSTI, stored/second-order
Auth Broken auth, missing authz, privilege escalation
Crypto Weak algorithms, hardcoded secrets, timing attacks
Data Flow Unsanitized taint, encoding bypasses, deserialization
File Uploads Path traversal, MIME spoofing, zip bombs
Infrastructure Dockerfile root, CI/CD secrets, missing TLS, CORS
Dependencies Unpinned versions, CVEs, suspicious postinstall
Agent Security Goal hijack, tool misuse, memory poisoning, rogue agents
Missing Controls No rate limit, no CSRF, no headers, PII in logs
Logic Bugs Off-by-one, race conditions, type coercion, overflow
Architecture O(n²) complexity, ReDoS, shared mutable state
Attack Chains Purple Team: two minor bugs = one catastrophic exploit

How It Works

The model adopts 5 identities and executes 8 phases:

  1. F1 — Recon (short): Classify project, map data flow
  2. F2 — Taint (long): Trace inputs source→sink, second-order, encoding, deserialization, uploads, SSTI
  3. F3 — States (short): Illegal transitions, race conditions
  4. F4 — Cross-Deps (short): Module interactions, error handlers
  5. F5 — Crypto+Secrets+Timing (long): Algorithms, hardcoded secrets, constant-time
  6. F6 — Triple OWASP+Infra+Missing (long): All 3 OWASP lists, deps, infra, absent controls
  7. F7 — Tests (long): Security coverage, malicious input, real assertions
  8. F8 — Attack Chains (long): Purple Team exploitation chains

Each finding includes: Root Cause → Exploit → Impact → Original Code → Golden Patch → Regression → Verification.

ORÁCULO vs Automated Tools

Feature ORÁCULO Automated Scanners
Setup None (paste) Install + config
Any LLM Usually model-specific
Logic bugs Limited
Attack chains ✅ Purple Team Limited
CI/CD
Scale Manual per file
Triple OWASP Usually 1 list
Auto-fix ✅ (with filesystem) Varies

Best approach: ORÁCULO for deep reasoning + automated tools for CI/CD.

Built With

23 prompt engineering techniques from a library of 276, including: Multi-Agent Debate, Tree of Thoughts, Chain-of-Thought, OODA Loop, Constitutional AI, Adversarial Evaluation, Red Teaming, Verification Chain, and more.

Version History

Version Changes
v1.0–v1.5 Self-audit passes 1–5: core rules, anti-manipulation, auto-fix
v1.6 Passes 6–9: deserialization, SSTI, file uploads, CORS, compression
v2.0 Major compression, multi-language, self-verification
v2.1 Triple OWASP: added Agentic Top 10 (ASI) 2026

11 self-audit passes. 40 vulnerabilities fixed in itself.

License

Apache-2.0

Author

GravityZenAI

About

Enterprise Code Audit Prompt — Triple OWASP, 5 identities, 8 phases. Paste into any LLM.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors