Pilot Auction
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill's requirements and runtime instructions align with its auction purpose; it's an instruction-only wrapper around the pilotctl CLI and a running pilot daemon, with no unexpected credential requests or install steps.
This skill is an instruction-only wrapper around the pilotctl CLI and a running pilot daemon — it appears coherent for running auctions. Before installing: 1) Ensure you have a trusted pilotctl binary and a legitimate pilot-protocol deployment (the skill will call your local daemon and may use stored keys/config). 2) Install jq (used by the examples) if you plan to run the scripts — the registry metadata omitted jq. 3) Avoid publishing sensitive task payloads to the auction or network unless you understand how pilot-protocol handles confidentiality. 4) If you don't want autonomous agent invocation, note the platform default allows skills to be invoked by agents; this skill is user-invocable and does not require extra credentials, but any automated run will still be able to call your local pilotctl. 5) If you need higher assurance, inspect your pilotctl configuration and run the example scripts in a sandboxed environment first.
SkillSpector
SkillSpector findings are pending for this release.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
