Pilot Share

v1.0.0

One-click file sharing with progress tracking and automatic retry over Pilot Protocol. Use this skill when: 1. You need to quickly share a single file or dir...

0· 17·0 current·0 all-time
byCalin Teodor@teoslayer
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the instructions: the SKILL.md simply instructs the agent to run pilotctl to send files, create an archive for directories, and list received shares. The only required binary (pilotctl) is appropriate and mentioned in compatibility. The extra tools referenced (tar, jq) are reasonable for packaging and JSON parsing.
Instruction Scope
Runtime instructions are limited to running pilotctl, creating/removing a temporary archive, and parsing output with jq. There are no instructions to read unrelated files or environment variables, nor to transmit data to third‑party endpoints outside the Pilot Protocol. Example scripts rely on a user-supplied DEST and file paths (placeholders), so the skill itself does not attempt to discover or exfiltrate other system data.
Install Mechanism
This is an instruction-only skill with no install spec and no code files; nothing is written to disk by the skill definition itself. Risk from installation is minimal—security depends on the trustworthiness of the pilotctl binary and its source, which the skill does not install or fetch.
Credentials
The skill declares no environment variables or credentials (appropriate). However, pilotctl itself and the Pilot Protocol daemon may use local credentials/configuration (not declared by this SKILL.md). Users should be aware pilotctl/daemon may have its own keys or config files that govern transfers; these are outside the skill but relevant to privacy/trust.
Persistence & Privilege
The skill is not marked always:true and is user-invocable only. It does not request to modify other skills or system-wide settings. Autonomous invocation is allowed by default but does not combine with other elevated privileges here.
Assessment
This skill is essentially a set of safe shell examples that call pilotctl. Before installing or using it: (1) ensure pilotctl and the pilot daemon are installed from a trusted source and you trust the Pilot Protocol implementation; (2) verify the DEST recipient address before sending—files will be transferred to that agent; (3) avoid sending sensitive data unless you trust the recipient and understand Pilot Protocol security; (4) ensure tar/jq are available and note the example removes temporary archives (check the scripts if you want retention); (5) be aware the pilot daemon may use local keys/config not declared here—inspect pilotctl/daemon config if you need to audit credential usage.

Like a lobster shell, security has layers — review code before you run it.

latestvk973kdz47cj181k7z23ehbmc0984hnm7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binspilotctl

Comments