Pilot Clipboard

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only skill is coherent for sharing small clipboard snippets, but users should verify recipients and avoid sending sensitive command output.

Use this skill only for short, non-sensitive snippets or reviewed command output, and only with Pilot destinations you trust. Treat anything pasted from a remote inbox as untrusted text until you inspect it.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

A user or agent could accidentally send local command output, such as directory listings or other sensitive text, to another Pilot destination.

Why it was flagged

The skill relies on Bash examples to collect and transmit command output. This is disclosed and purpose-aligned, but arbitrary command output could include more information than intended.

Skill content
allowed-tools:\n  - Bash ... OUTPUT=$(ls -lh)\npilotctl --json send "1:0001.AAAA.BBBB" 1001 --data "$OUTPUT"
Recommendation

Use narrowly scoped commands, review output before sending, and avoid sending secrets or private data through the clipboard.

#
ASI04: Agentic Supply Chain Vulnerabilities
Info
What this means

The skill may fail or behave differently if required local tools are missing or installed from an untrusted source.

Why it was flagged

SKILL.md lists jq and optional clipboard utilities in addition to pilotctl; the provided registry requirements only declare pilotctl, so dependency expectations are not fully captured in metadata.

Skill content
Requires pilot-protocol, pilotctl, and jq. Clipboard tools: pbcopy/pbpaste (macOS) or xclip/xsel (Linux).
Recommendation

Install pilotctl, jq, and any clipboard tools from trusted sources, and verify the Pilot Protocol setup before use.

#
ASI07: Insecure Inter-Agent Communication
Low
What this means

Clipboard text or command output may be visible to remote agents, and received clipboard content could be stale or untrusted.

Why it was flagged

The skill sends clipboard content to a Pilot destination and reads clipboard messages from the inbox. This is the intended function, but it depends on trusting the recipient and treating received content carefully.

Skill content
pilotctl --json send-message "$dest" --data "$clip_msg" ... pilotctl --json inbox | jq -r '.messages[] | select(.type == "clipboard") | .content' | head -1
Recommendation

Send only to known Pilot addresses, keep shared content short and non-sensitive, and inspect pasted content before using it as instructions or commands.