jira-safe

Pass

Audited by Gen Agent Trust Hub on Feb 20, 2026

Risk Level: SAFE
Full Analysis
  • DATA_EXPOSURE (SAFE): The scripts access environment variables (JIRA_EMAIL, JIRA_API_TOKEN, JIRA_BASE_URL) to perform authorized actions. While it makes network requests to an external Jira instance, this is the primary intended purpose of the skill. The Python script includes a utility to load these variables from a local .env file, which is a standard development practice.
  • COMMAND_EXECUTION (SAFE): No arbitrary command execution or shell injection vulnerabilities were found. The scripts use standard library functions for networking and do not spawn untrusted subprocesses.
  • PROMPT_INJECTION (SAFE): No instructions targeting the AI agent's behavior or safety filters were detected in the source code or comments.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 20, 2026, 07:46 PM