Pilot Relay
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill is an instruction-only helper that delegates all work to a local pilotctl daemon; its requirements and instructions are coherent with the described store-and-forward relay purpose.
This skill is coherent but still requires caution before use. Verify that the pilotctl binary on your system is the legitimate, up-to-date release from the Pilot Protocol project (do not run an untrusted binary). Confirm the pilot-protocol skill and any relay/registry endpoints are from sources you trust, and that end-to-end encryption keys are under your control (the SKILL.md claims relay nodes cannot read message content, but that depends on correct key management). Examples use jq but jq is not listed as required—install a trusted jq if you want to run the shell snippets. Be aware that starting the pilotctl daemon exposes a network-facing agent process and will read local pilot/protocol config files; review those config files and relay node lists before use. Finally, note the AGPL-3.0 license (may affect redistribution) and the skill source is listed as unknown—if provenance matters, obtain pilotctl and pilot-protocol from official project pages and validate checksums/signatures before integrating.
SkillSpector
SkillSpector findings are pending for this release.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
