Pilot Task Chain

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only skill is coherent for building Pilot multi-agent task pipelines, but users should be careful because it forwards task results between agents through shell commands.

This skill appears benign and purpose-aligned, but use it only with trusted Pilot tooling and trusted target agents. Treat fetched or generated results as untrusted data before passing them to the next agent, and add validation or human approval before any step that stores, publishes, deletes, or changes important data.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

An agent using this skill can run local shell commands to submit and monitor Pilot tasks.

Why it was flagged

The skill authorizes Bash and uses it to run pilotctl commands. This is expected for a CLI orchestration skill, but Bash is a broad tool and should be used only for the documented Pilot workflow.

Skill content
allowed-tools:
  - Bash
...
pilotctl --json task submit "$AGENT_2" --task "Transform data: $RESULT"
Recommendation

Use this skill only in environments where pilotctl is trusted, and keep execution limited to the documented pilotctl and jq commands unless the user explicitly approves broader shell use.

#
ASI07: Insecure Inter-Agent Communication
Medium
What this means

Data produced by one agent may be sent to another agent, which could disclose sensitive task results to agents with different access or trust levels.

Why it was flagged

The skill is explicitly designed to move intermediate results across agents. That is disclosed and purpose-aligned, but it can expose sensitive outputs to downstream agents if the agents are not trusted or appropriately scoped.

Skill content
You need to route intermediate results between different specialized agents
Recommendation

Only chain trusted agents, avoid forwarding secrets unless necessary, and confirm each downstream agent is authorized to receive the intermediate data.

#
ASI08: Cascading Failures
Low
What this means

A bad or manipulated upstream result could be passed along to transform or store steps before a person reviews it.

Why it was flagged

The workflow automatically takes one step's result and embeds it in the next task. This is the intended pipeline behavior, but if an upstream result is malformed or contains hostile instructions, that content can influence later agents.

Skill content
FETCH_RESULT=$(pilotctl --json task list --type submitted | jq -r ".[] | select(.task_id == \"$FETCH_TASK_ID\") | .result")

# Step 2: Transform
TRANSFORM_TASK=$(pilotctl --json task submit "$TRANSFORM_AGENT" \
  --task "Transform data: $FETCH_RESULT")
Recommendation

For important or sensitive workflows, add validation, delimit untrusted data clearly, and require human approval before storage, publication, account changes, or other high-impact downstream steps.

#
ASI04: Agentic Supply Chain Vulnerabilities
Info
What this means

The safety of actual execution depends on the separately installed Pilot tooling, jq, and the agents selected for the chain.

Why it was flagged

The skill depends on external components beyond the single SKILL.md file. The artifacts do not include code or an install spec for these dependencies, so their provenance and behavior are outside this review.

Skill content
Requires pilot-protocol skill, jq, and multiple agents with complementary capabilities.
Recommendation

Install pilotctl, jq, and any related Pilot skills from trusted sources, and review the capabilities of each agent before using it in a pipeline.