Pilot Map Reduce
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This instruction-only skill is coherent for distributed map-reduce work, but users should notice that it sends and receives messages across an agent swarm using Bash commands.
This looks like a normal instruction-only skill for Pilot Protocol map-reduce workflows. Before installing or using it, make sure pilotctl points to your trusted Pilot environment, only use trusted mapper/reducer peers, and avoid distributing private data unless those peers are authorized to handle it.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If used with the wrong peer set or data, the agent could send work to unintended workers or produce incorrect distributed results.
The skill permits Bash and uses pilotctl commands to send tasks to workers. This is central to the map-reduce purpose, but it is still a broad orchestration capability users should understand.
allowed-tools: - Bash ... pilotctl --json send-message "$WORKER"
Use this only with trusted pilotctl peers and review the worker selection, job ID, and data being sent before running large jobs.
Sensitive input or intermediate results could be exposed to swarm workers, and untrusted or stale peer messages could affect results.
The workflow discovers peer agents by role, sends them map or reduce tasks, and consumes returned messages. This is expected for a swarm map-reduce skill, but the instructions do not describe peer identity checks or data-trust boundaries.
WORKER=$(pilotctl --json peers --search "role:mapper" | jq -r ".[${i}].address")
...
pilotctl --json receivedRun jobs only in trusted swarms, include job_id/source validation in result handling, and avoid sending sensitive data unless all workers are authorized to process it.
Using an unexpected pilotctl, pilot-protocol skill, or jq installation could change what commands do or where messages are sent.
The SKILL.md names additional external dependencies beyond the registry's required pilotctl binary. This is not suspicious by itself, but users need the correct trusted tools installed for the instructions to behave as intended.
Requires pilot-protocol skill, jq, and sort.
Install dependencies from trusted sources and confirm pilotctl is the expected binary on PATH before using the skill.
