Back to skill
Skillv1.0.0
ClawScan security
Pilot Financial Trading Desk Setup · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 23, 2026, 12:34 AM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's instructions, required binaries, and behavior are consistent with its stated purpose of deploying a four-agent trading desk; no disproportionate privileges or hidden installs were found, though you should review downstream skills (especially anything that interfaces with exchanges) and note the manifest path the skill writes to.
- Guidance
- This skill appears to do what it claims: it uses pilotctl and clawhub to install and configure four agents and writes a local manifest. Before installing, ensure pilotctl and clawhub are legitimate/trusted binaries on your system, and be aware that the executor role (pilot-webhook-bridge) will typically require exchange credentials and network access — review and restrict who/what can perform handshakes and accept trust to avoid exposing trading authority. Consider testing in an isolated environment, back up existing ~/.pilot configs, and review the downstream pilot-* skill packages (especially any that interact with external APIs) before providing any secrets or deploying to production.
Review Dimensions
- Purpose & Capability
- noteName/description align with the requested binaries (pilotctl, clawhub) and the actions in SKILL.md (installing pilot-* skills, setting hostnames, handshakes). Minor mismatch: the metadata declares no required config paths, but the instructions write a manifest to ~/.pilot/setups/financial-trading-desk.json — this is reasonable for a setup skill but is an undeclared filesystem write to the user's home.
- Instruction Scope
- noteSKILL.md stays within the expected scope: it installs role-specific skills via clawhub, sets hostnames with pilotctl, writes a manifest, and instructs peer handshakes. Caveats: the handshake flow relies on auto-approved trust when both sides exchange handshakes (a security consideration for production deployments) and the executor role implies later interaction with exchange APIs (not performed by this skill but enabled by installing pilot-webhook-bridge).
- Install Mechanism
- okInstruction-only skill with no install spec and no code files — lowest-risk install surface. It calls existing CLIs (pilotctl, clawhub) which is consistent with its purpose.
- Credentials
- noteThe skill itself requests no environment variables or credentials, which is proportional. However, it installs other pilot-* skills (not included here) that likely require exchange API keys or other secrets (e.g., pilot-webhook-bridge). You should review those downstream skills before supplying credentials.
- Persistence & Privilege
- okalways:false and disable-model-invocation:false (defaults) — no elevated persistent privilege requested. The only persistent action is writing a manifest to ~/.pilot/setups/, which is appropriate for a setup utility but should be acknowledged.
