Pilot Sla

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a disclosed Bash/pilotctl SLA-monitoring workflow with no artifact-backed malicious behavior, but users should review task submission, external dependencies, and the unproven automatic-penalty claim.

Before installing or using it, make sure pilotctl and the Pilot daemon are trusted, set $AGENT explicitly, review any Bash workflow before execution, and do not assume automatic financial or operational penalties are enforced unless that mechanism is documented elsewhere.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

If run with the wrong $AGENT or task string, the workflow could submit unintended Pilot tasks.

Why it was flagged

The skill explicitly enables Bash and documents a workflow that can submit tasks through pilotctl. This is expected for SLA testing, but it is still action-taking authority that should be user-reviewed.

Skill content
allowed-tools:\n  - Bash ... TASK_ID=$(pilotctl --json task submit "$AGENT" --task "api-call: task_id=$i" | jq -r '.task_id')
Recommendation

Confirm the target agent and task text before running examples, and avoid unattended loops unless the target and permissions are clear.

#
ASI04: Agentic Supply Chain Vulnerabilities
Info
What this means

Security depends partly on the separately installed pilotctl, Pilot daemon, jq, and bc components.

Why it was flagged

The skill relies on external binaries, another skill, and a daemon whose code and installation path are not included in the reviewed artifact.

Skill content
Requires pilot-protocol skill and pilotctl binary on PATH. The daemon must be running (pilotctl daemon start). ... Requires pilot-protocol, pilotctl, jq, and bc.
Recommendation

Install these tools only from trusted sources, verify versions, and ensure the registry metadata declares all required binaries.

#
ASI09: Human-Agent Trust Exploitation
Low
What this means

Users could over-rely on the skill for guaranteed penalty enforcement when the provided instructions only demonstrate monitoring/reporting.

Why it was flagged

The description suggests automatic penalty assessment/enforcement, while the shown workflow only reports a violation and does not show applying penalties.

Skill content
Service-level agreement enforcement with automatic penalty assessment. ... [ $RESPONSE_TIME -gt $SLA_MAX ] && echo "SLA violation"
Recommendation

Treat this as an SLA monitoring example unless a separate, reviewed Pilot Protocol component clearly documents how penalties are applied, audited, and reversed.