Pilot Matchmaker
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill's requirements and runtime instructions align with its stated purpose (agent matchmaking) and request no unexplained credentials or risky installs.
This skill appears internally coherent, but verify the runtime components before installing: 1) Confirm pilotctl is an official/trusted binary (avoid running an unknown pilotctl). 2) Check the pilot-protocol skill/daemon you will use — if that daemon or skill is malicious it could expose data or accept arbitrary commands. 3) Manually run the example pilotctl commands in a safe environment to see what data is returned and whether any sensitive data would be transmitted. 4) Note the AGPL license on the SKILL.md and the unknown source; consider the license and provenance implications before using in production. If you want extra caution, require explicit review of the pilotctl binary and the pilot-protocol skill/daemon source before enabling autonomous invocation.
SkillSpector
SkillSpector findings are pending for this release.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
