Trust & containment
Containment is the product.
Oracle Bot is the only testing platform where misuse is prevented by network topology — not by policy or trust. Your code never leaves our sandbox. Our bots never leave it either.
Containment by network topology
Every run executes in an isolated sandbox we provision. The sandbox has no public IP, no internet egress, and no route to any system you don't own. Misuse is technically impossible — not just contractually prohibited.
Authorized targets only
You connect a target via GitHub OAuth, a verified Docker image, or a DNS-verified URL. Every run is bound to a commit hash, image digest, or domain you proved you control.
Air-gapped execution
Bots, application code, and dependencies all run inside the same isolated network namespace. The sandbox is destroyed when the run ends. No persistent state. No data leaves.
Anti-abuse controls
Hard caps on persona-minutes per run. Rate limits per organization. Manual review for runs above 30k personas. Any anomaly auto-pauses the run.
Signed audit artifacts
Every run produces a tamper-evident receipt: commit hash, run ID, persona mix, target fingerprint, timestamps. Compliance teams can verify after the fact.
Legal posture
Our terms forbid unauthorized testing. Identity is verified at signup. Runs are attributable to a real person on a real billing account. We cooperate with providers and law enforcement on misuse reports.