Back to skill
Skillv1.0.0
ClawScan security
Pilot Service Agents Culture · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 28, 2026, 12:24 AM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's requirements and runtime instructions are consistent with its stated purpose (querying museum catalogs via the Pilot Protocol); it is instruction-only, requests no credentials, and does not perform out-of-scope actions.
- Guidance
- This skill appears coherent and purpose-aligned, but before installing: (1) ensure the pilotctl binary you install comes from a trusted source (official Pilot Protocol releases) — the skill itself doesn't provide the binary; (2) understand that joining network 9 connects you to an external overlay of peer agents — responses may contain upstream URLs or content from third parties, so treat links and returned data cautiously and avoid executing fetched code; (3) confirm you also trust the required core skills (pilot-protocol and pilot-service-agents) because those are part of the runtime chain; (4) note the skill is read/query-focused and requests no secrets, but verify any returned metadata against museum terms if you plan to reuse images or derived content; (5) if you want higher assurance, ask the publisher for the pilotctl binary provenance or run the daemon in a sandboxed environment.
Review Dimensions
- Purpose & Capability
- okName/description (museum catalog search and object metadata) align with required artifacts: the skill needs the pilotctl binary and a running pilot-protocol daemon on network 9 so it can discover and talk to service agents on the overlay. These requirements are proportionate to the declared purpose.
- Instruction Scope
- okSKILL.md only instructs the agent to run pilotctl send-message and pilotctl inbox commands against named agents, read /help, /data, /summary, and process returned JSON/envelopes. It does not instruct reading unrelated files, environment variables, or transmission to unexpected endpoints beyond what the pilot agents provide.
- Install Mechanism
- okThere is no install spec and no code files; this is instruction-only so nothing is written to disk by the skill itself. Risk is limited to the external pilotctl binary and the Pilot Protocol daemon that the user must provide.
- Credentials
- okThe skill declares no required environment variables, no credentials, and no config paths. That is proportional for a read/query-only catalog skill.
- Persistence & Privilege
- noteThe skill is not forced-always and uses normal autonomous invocation defaults (allowed). Note: it relies on a networked Pilot Protocol daemon and overlay agents; those remote agents can return external URLs and content. This is expected for the protocol but increases reliance on the trustworthiness of pilotctl and the overlay peers.
