Pilot Discover
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill's requirements and runtime instructions are coherent with a discovery/search utility for the Pilot Protocol; minor issues (missing jq in declared dependencies and implicit registry access) are worth noting but do not suggest malicious intent.
This skill appears to be what it claims: a helper for running pilotctl discovery commands. Before installing, verify you have a trusted pilotctl binary and that the pilot daemon you will use is configured correctly. Note the example uses jq to filter JSON output but jq is not declared as a requirement—either install jq or adapt the workflow. Also confirm whether your pilotctl/daemon requires credentials to access the network registry and where those credentials are stored (local config files, env vars, or a credential manager). Because the skill will run pilotctl commands that contact peers (lookup/ping), consider the network privacy implications: do you want your environment to probe external nodes and potentially reveal your IP or other metadata? Finally, obtain pilotctl from the official source (pilotprotocol.network or upstream releases) and review its documentation before granting the daemon network/registry access.
SkillSpector
SkillSpector findings are pending for this release.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
