Pilot Mcp Bridge

AdvisoryAudited by Static analysis on Apr 9, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could send messages, listen for traffic, publish to topics, or alter Pilot gateway mappings in ways the user did not specifically review.

Why it was flagged

The skill gives the agent Bash access to run Pilot commands with user- or peer-controlled parameters and includes gateway mutation commands, but does not define approval, validation, host/port/topic limits, or rollback behavior.

Skill content
allowed-tools:
  - Bash
...
- `pilot_connect`: Run `pilotctl --json connect <target> <port> --message "<msg>"`
...
- `pilot_gateway_start`: Run `pilotctl --json gateway start`
- `pilot_gateway_map`: Run `pilotctl --json gateway map <hostname> <local-ip>`
Recommendation

Require explicit user confirmation for send, publish, listen, subscribe, gateway start, and gateway map actions; restrict allowed hosts, ports, topics, and local IPs; and avoid passing untrusted text directly into shell commands.

What this means

Sensitive prompts or data could be sent to Pilot peers, and inbound Pilot messages could be mistaken for trustworthy context if the user or agent does not set boundaries.

Why it was flagged

The core capability is agent-to-agent or peer communication, but the artifact does not document peer identity checks, message trust handling, permitted data classes, topic scoping, or how incoming messages are isolated from agent instructions.

Skill content
You're building an AI agent that needs to communicate over Pilot
...
- `pilot_send_message`: Run `pilotctl --json send-message <target> --data "<msg>"`
- `pilot_recv`: Run `pilotctl --json recv <port>`
- `pilot_publish`: Run `pilotctl --json publish <target> <topic> --data "<msg>"`
- `pilot_subscribe`: Run `pilotctl --json subscribe <target> <topic>`
Recommendation

Use only trusted Pilot peers and topics, do not send secrets through this bridge unless the Pilot configuration is verified, and treat all received messages as untrusted data rather than instructions.

What this means

The actual safety of the bridge depends on the pilotctl binary, the referenced server wrapper, and Python MCP library that are obtained outside this reviewed skill.

Why it was flagged

The reviewed package is instruction-only and references external runtime code and dependencies whose versions and provenance are not included in the artifacts.

Skill content
python mcp_pilot_server.py
...
Requires pilot-protocol skill, pilotctl binary, MCP server framework (Python mcp library), and MCP-compatible client.
Recommendation

Install pilotctl and any MCP server wrapper only from trusted sources, pin dependency versions where possible, and review the server implementation before enabling it.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Network services may continue running after the immediate task if the user does not stop them.

Why it was flagged

The workflow starts long-running daemon and MCP server processes; this is expected for an MCP bridge, but the artifact does not include stop or cleanup guidance.

Skill content
# Start Pilot daemon
pilotctl --json daemon start --registry 34.71.57.205:9000 --beacon 34.71.57.205:9001

# Start MCP server wrapper
python mcp_pilot_server.py
Recommendation

Start the daemon, gateway, and MCP server only when needed, monitor active processes and ports, and document stop commands for cleanup.