pilot-reputation

Advanced reputation analytics and trend visualization for Pilot Protocol agents. Use this skill when: 1. You need to track polo score trends over time for agents 2. You want to analyze reputation patterns across your network 3. You need to make trust decisions based on reputation history Do NOT use this skill when: - You only need current polo scores (use pilotctl lookup) - You need real-time monitoring (use pilot-watchdog) - You're doing one-time verification (use pilot-verify)

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pilot-reputation" with this command: npx skills add vulture-labs/pilot-reputation

Pilot Reputation

Advanced reputation analytics for Pilot Protocol with trend tracking and scoring algorithms.

Commands

Record Snapshot

cat > ~/.pilot/reputation/data/snapshot-$(date +%s).json <<EOF
{
  "timestamp": "$(date -u +%Y-%m-%dT%H:%M:%SZ)",
  "local_agent": $(pilotctl --json info | jq '{hostname, address, polo_score}'),
  "peers": $(pilotctl --json peers)
}
EOF

Query History

find ~/.pilot/reputation/data -name "snapshot-*.json" -mtime -7 | sort | \
while read SNAPSHOT; do
  jq -r --arg agent "$AGENT" '.peers[] | select(.hostname == $agent) | "\(.timestamp): \(.polo_score)"' "$SNAPSHOT"
done

Calculate Trend

SCORES=$(find ~/.pilot/reputation/data -name "snapshot-*.json" -mtime -7 | sort | \
  while read SNAPSHOT; do
    jq -r --arg agent "$AGENT" '.peers[] | select(.hostname == $agent) | .polo_score' "$SNAPSHOT"
  done)

FIRST=$(echo "$SCORES" | head -1)
LAST=$(echo "$SCORES" | tail -1)
echo "Change: $((LAST - FIRST))"

Workflow Example

#!/bin/bash
# Continuous reputation tracking

REPO_DIR=~/.pilot/reputation
mkdir -p "$REPO_DIR/data"

while true; do
  cat > "$REPO_DIR/data/snapshot-$(date +%s).json" <<EOF
{"timestamp":"$(date -u +%Y-%m-%dT%H:%M:%SZ)","peers":$(pilotctl --json peers)}
EOF
  sleep 300
done

Dependencies

Requires pilot-protocol, pilotctl, jq, and bc.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Analytics Tracking Pro

Expert guidance to plan, implement, and audit analytics tracking including event taxonomy, conversion funnels, UTM strategy, and dashboard KPI setup.

Registry Source
2360Profile unavailable
Security

Session Token Ledger

Analyze local OpenClaw session token usage from a generated SQLite ledger and markdown summaries. Use when the user asks for a token audit, token体检报告, contex...

Registry Source
2280Profile unavailable
Security

Shadow AI Monitor

Shadow AI Monitor - Enterprise-grade dashboard for tracking employee AI tool usage, data exposure risks, and PIPEDA compliance. Generates professional HTML d...

Registry Source
4990Profile unavailable
Automation

MCP Business Integration

Integrate AI agents with business data via Model Context Protocol. Query ads, analytics, CRM data through normalized interfaces. Use when connecting agents t...

Registry SourceRecently Updated
2290Profile unavailable