Pilot Map Reduce

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only skill is coherent for distributed map-reduce work, but users should notice that it sends and receives messages across an agent swarm using Bash commands.

This looks like a normal instruction-only skill for Pilot Protocol map-reduce workflows. Before installing or using it, make sure pilotctl points to your trusted Pilot environment, only use trusted mapper/reducer peers, and avoid distributing private data unless those peers are authorized to handle it.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

If used with the wrong peer set or data, the agent could send work to unintended workers or produce incorrect distributed results.

Why it was flagged

The skill permits Bash and uses pilotctl commands to send tasks to workers. This is central to the map-reduce purpose, but it is still a broad orchestration capability users should understand.

Skill content
allowed-tools:
  - Bash
...
pilotctl --json send-message "$WORKER"
Recommendation

Use this only with trusted pilotctl peers and review the worker selection, job ID, and data being sent before running large jobs.

#
ASI07: Insecure Inter-Agent Communication
Medium
What this means

Sensitive input or intermediate results could be exposed to swarm workers, and untrusted or stale peer messages could affect results.

Why it was flagged

The workflow discovers peer agents by role, sends them map or reduce tasks, and consumes returned messages. This is expected for a swarm map-reduce skill, but the instructions do not describe peer identity checks or data-trust boundaries.

Skill content
WORKER=$(pilotctl --json peers --search "role:mapper" | jq -r ".[${i}].address")
...
pilotctl --json received
Recommendation

Run jobs only in trusted swarms, include job_id/source validation in result handling, and avoid sending sensitive data unless all workers are authorized to process it.

#
ASI04: Agentic Supply Chain Vulnerabilities
Info
What this means

Using an unexpected pilotctl, pilot-protocol skill, or jq installation could change what commands do or where messages are sent.

Why it was flagged

The SKILL.md names additional external dependencies beyond the registry's required pilotctl binary. This is not suspicious by itself, but users need the correct trusted tools installed for the instructions to behave as intended.

Skill content
Requires pilot-protocol skill, jq, and sort.
Recommendation

Install dependencies from trusted sources and confirm pilotctl is the expected binary on PATH before using the skill.