Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Pilot Blocklist
v1.0.0Maintain and share blocklists of untrusted agents in Pilot Protocol networks. Use this skill when: 1. You need to block malicious or compromised agents from...
⭐ 0· 16·0 current·0 all-time
byCalin Teodor@teoslayer
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's stated purpose is to maintain and share blocklists across Pilot Protocol networks — requiring pilotctl and a running daemon is coherent. However, the SKILL.md repeatedly claims support for 'sharing and synchronization across networks' but provides no instructions, commands, or configuration for sharing or synchronizing blocklists to other nodes or endpoints. That feature claim is not implemented in the instructions.
Instruction Scope
Runtime instructions are concrete and scoped to the user's Pilot installation: they create and modify ~/.pilot/blocklists/default.json, call pilotctl to find/untrust/reject node IDs, and use jq/grep/mv in shell scripts. The actions are limited to Pilot-related commands and local files. However, the SKILL.md uses jq in every example but the registry metadata/allowed-tools did not declare jq as a required binary — a mismatch that could lead to runtime failures or implicit installs. The skill writes into the user's home (~/.pilot) and /tmp which is expected but worth noting.
Install Mechanism
This is an instruction-only skill with no install spec and no code files. That reduces installation risk because nothing is downloaded or written by the skill package itself.
Credentials
The skill does not request environment variables or credentials, which is proportionate for a local blocklist manager. One small issue: the SKILL.md depends on the external tool jq (and implicitly on standard Unix utilities) but jq is not listed in the skill's declared required binaries; that inconsistency should be corrected. No secrets or unrelated credentials are requested.
Persistence & Privilege
always is false and the skill does not request persistent platform privileges. It does instruct the agent to modify local blocklist files and to call pilotctl to change trust state (untrust/reject), which are normal for the stated purpose. There's no instruction to alter other skills or system-wide agent settings.
What to consider before installing
This skill appears to implement a local blocklist workflow for Pilot Protocol using pilotctl and shell/jq commands, but it has a couple of issues you should consider before installing:
- Missing declared dependency: The examples use jq but the skill metadata does not declare jq as a required binary. Ensure jq is installed from a trusted package source before using the recipes.
- Unimplemented feature claim: The description promises 'sharing and synchronization across networks' but the SKILL.md contains no commands or instructions to share blocklists remotely. If you need sync, ask the author or implement a secure push/pull mechanism (e.g., signed manifests over authenticated channels).
- File writes and effect on network: The scripts write to ~/.pilot/blocklists/default.json and call pilotctl untrust/reject which will change agent connectivity. Backup your blocklist and test in a safe environment to avoid accidentally blocking legitimate nodes.
- Trust pilotctl provenance: Because the skill invokes pilotctl with node-management commands, make sure your pilotctl binary is from a trusted source and that the pilot daemon is properly secured.
Given these inconsistencies the skill is not clearly malicious, but it is incomplete/sloppy. Ask the maintainer to (1) declare jq in required binaries, (2) either remove the 'sharing' claim or add secure sharing instructions, and (3) provide a source repo for review. If you proceed, review the shell commands line-by-line and run them in a controlled environment first.Like a lobster shell, security has layers — review code before you run it.
latestvk97dw879n5psfn1c9xrysdyrjn84frsj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binspilotctl
