Back to skill
Skillv1.0.0

ClawScan security

Pilot Etl Data Pipeline Setup · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 22, 2026, 11:33 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill's instructions mostly match its stated purpose, but it omits and relies on other components that will need sensitive credentials and external installs (via clawhub) which are not declared — this gap and the transitive install/handshake behavior merit caution.
Guidance
This skill is coherent for setting up a Pilot ETL pipeline but take these precautions before installing: 1) Verify pilotctl and clawhub are obtained from trusted sources and understand how clawhub resolves packages (review its registry/sources). 2) Review each transitively installed skill (pilot-s3-bridge, pilot-database-bridge, pilot-webhook-bridge, pilot-slack-bridge, etc.) to see what credentials and network access they require and how they store/use secrets. 3) Be cautious with handshakes — only exchange trust with known hosts and test in a staging environment first. 4) Inspect the created manifest (~/.pilot/setups/etl-data-pipeline.json) before allowing it to operate. 5) Ensure egress/network policies and logging are in place so bridges that forward data or call external webhooks cannot exfiltrate sensitive data unnoticed.

Review Dimensions

Purpose & Capability
okThe name, description, and required binaries (pilotctl, clawhub) align with deploying Pilot protocol agents and installing agent skills. The listed roles, manifests, and commands are coherent for setting up a 5-stage ETL pipeline.
Instruction Scope
noteSKILL.md stays within ETL setup scope (install skills with clawhub, set hostnames with pilotctl, write a manifest to ~/.pilot/setups/etl-data-pipeline.json, and perform handshakes). It instructs sending files and publishing messages (pilotctl send-file/publish), which will move data — expected for this task. However, it does not mention how to provision required credentials (S3, DB, Slack, webhook endpoints) that many referenced bridges will need before they function.
Install Mechanism
noteThis is instruction-only (no install spec), which is lower direct risk. However it directs use of 'clawhub install' to fetch and install many transitively referenced skills (pilot-s3-bridge, pilot-slack-bridge, etc.). The SKILL.md does not document where clawhub pulls packages from or how to verify them, so the security of those transitive installs depends entirely on clawhub and the package sources.
Credentials
concernThe skill declares no required environment variables, yet the pipeline components it installs (S3 bridge, database bridge, webhook/slack bridges) will require secrets and network access (S3 keys, DB credentials, Slack tokens, webhook URLs). Not declaring or prompting for these credentials is an omission: the skill will cause you to install components that need sensitive credentials without explaining how they are handled.
Persistence & Privilege
noteThe skill writes a manifest to ~/.pilot/setups/etl-data-pipeline.json (normal for config). always:false and default autonomous invocation are set (no special permanent privilege). The handshake workflow auto-approves trust once both sides exchange handshakes — this is expected for the Pilot protocol but can unintentionally broaden trust if hostnames or peers are mis-specified.