jira-api
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill facilitates the retrieval and processing of data from external Jira issues, which creates a surface for indirect prompt injection.
- Ingestion points: Untrusted data enters the agent context through API calls such as
client.get_issueandclient.search_issuesas documented inSKILL.md. - Boundary markers: The instructions do not define boundary markers or delimiters to isolate retrieved external content from the agent's instructions.
- Capability inventory: The skill allows the use of
Bash,WebFetch, andReadtools, which provides a significant capability surface if an attacker successfully injects instructions into Jira content. - Sanitization: The documentation and code examples do not include logic for sanitizing or validating external content before processing.
- [COMMAND_EXECUTION]: Scenario 7 in
examples/examples.mdprovides an example of running a Flask web server usingapp.run(port=5000). While illustrative for a webhook, this pattern involves opening local network ports, which can be misused or lead to unintended exposure.
Audit Metadata