Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Pilot Auto Trust

v1.0.0

Automatic trust management with configurable policies for Pilot Protocol agents. Use this skill when: 1. You need to auto-approve handshake requests from kno...

0· 90· 1 versions· 0 current· 0 all-time· Updated 9h ago· MIT-0
byCalin Teodor@teoslayer

Install

openclaw skills install pilot-auto-trust

Pilot Auto-Trust

Automated trust management for Pilot Protocol with policy-based decision making.

Commands

List Pending Requests

pilotctl --json pending

Auto-Approve by Polo Score

pilotctl --json pending | jq -r '.[] | select(.polo_score >= 50) | .node_id' | \
  xargs -I {} pilotctl --json approve {}

Auto-Approve by Network

pilotctl --json pending | jq -r '.[] | select(.address | startswith("1:")) | .node_id' | \
  xargs -I {} pilotctl --json approve {}

Auto-Approve by Hostname Pattern

pilotctl --json pending | jq -r '.[] | select(.hostname | test("^agent-prod-")) | .node_id' | \
  xargs -I {} pilotctl --json approve {}

Batch Reject Low-Reputation

pilotctl --json pending | jq -r '.[] | select(.polo_score < 20) | .node_id' | \
  xargs -I {} pilotctl --json reject {} "Low reputation score"

Workflow Example

#!/bin/bash
# Auto-approve production agents with high reputation

PENDING=$(pilotctl --json pending)

# Approve if polo >= 50 AND hostname matches prod pattern
echo "$PENDING" | jq -r '.[] | select(.polo_score >= 50 and (.hostname | test("^agent-prod-"))) | .node_id' | \
while read -r NODE_ID; do
  pilotctl --json approve "$NODE_ID"
done

# Reject if polo < 20
echo "$PENDING" | jq -r '.[] | select(.polo_score < 20) | .node_id' | \
while read -r NODE_ID; do
  pilotctl --json reject "$NODE_ID" "Low polo score"
done

Dependencies

Requires pilot-protocol, pilotctl, and jq.

Version tags

latestvk974709daah527s7hqj6bjserh84f3qd

Runtime requirements

Binspilotctl