Pilot Quarantine

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill matches its quarantine purpose, but it can tell the agent to revoke trust and disconnect Pilot agents without explicit confirmation guardrails.

Install this only if you want the agent to help manage Pilot Protocol incident response. Before running quarantine or enforcement commands, manually confirm the target agent, node ID, and reason, and keep ~/.pilot/quarantine/ records accurate and protected.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Medium
What this means

If invoked on the wrong target, a legitimate Pilot agent could be isolated or disconnected.

Why it was flagged

These commands revoke trust and disconnect Pilot connections. The artifacts do not add an explicit user-confirmation or target-validation step before making those live network changes.

Skill content
pilotctl --json untrust "$NODE_ID"
pilotctl --json connections | jq -r '.connections[] | select(.remote_hostname == "'"$AGENT"'") | .id' | \
  xargs -I {} pilotctl --json disconnect {}
Recommendation

Require explicit user confirmation and verify the agent identity, node ID, and evidence of compromise before running untrust or disconnect commands.

#
ASI03: Identity and Privilege Abuse
Low
What this means

Installing or using the skill gives the agent a documented path to exercise Pilot network privileges available through pilotctl.

Why it was flagged

The skill relies on the user's existing Pilot Protocol daemon and pilotctl authority to change trust and connection state.

Skill content
Requires pilot-protocol skill and pilotctl binary on PATH.
The daemon must be running (pilotctl daemon start).
Recommendation

Use it only in environments where the agent is allowed to manage Pilot trust decisions, and prefer least-privileged pilotctl access if available.

#
ASI06: Memory and Context Poisoning
Low
What this means

Stale or incorrect quarantine records could cause repeated isolation of the wrong agent.

Why it was flagged

The enforcement workflow reads persistent local quarantine JSON files and uses their contents to decide which agents to disconnect.

Skill content
for QFILE in ~/.pilot/quarantine/active/*.json; do
  AGENT=$(jq -r '.agent' "$QFILE")
  NODE_ID=$(jq -r '.node_id' "$QFILE")
Recommendation

Review and protect ~/.pilot/quarantine/ records, and validate each stored agent before running enforcement.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

The skill may fail or use unexpected local binaries if jq or openssl are missing or shadowed on PATH.

Why it was flagged

SKILL.md documents dependencies beyond pilotctl, while the registry requirements declare only pilotctl. This is an under-declared but purpose-aligned dependency gap.

Skill content
Requires pilot-protocol, pilotctl, jq, openssl. Quarantine records stored in ~/.pilot/quarantine/.
Recommendation

Install jq and openssl from trusted sources and ensure the registry metadata accurately declares all required binaries.