jira-ticket-viewer
Fail
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/download-attachment.jsaccesses the local configuration file~/.config/.jira/.config.ymlto retrieve the user's login email. Accessing local application configuration files is a sensitive operation that exposes user metadata. - [DATA_EXFILTRATION]: The
scripts/download-attachment.jsscript constructs a Basic Authorization header containing the user'sJIRA_API_TOKEN. This header is sent to theattachment.contentURL. Because the script follows HTTP redirects and does not validate that the destination domain belongs to Atlassian, a malicious Jira ticket could trigger a request to an attacker-controlled server, resulting in the exfiltration of the Jira API token. - [COMMAND_EXECUTION]: The script
scripts/fetch-pull-requests.jsusesexecSyncto run thejira mecommand. This executes a shell process at runtime to retrieve configuration data, which increases the attack surface if the environment or tool output is manipulated. - [PROMPT_INJECTION]: The skill processes untrusted external data (Jira ticket summaries, descriptions, and comments) and presents it to the agent without sanitization. This creates a surface for indirect prompt injection.
- Ingestion points: Raw JSON data from
jira issue viewprocessed byscripts/parse-ticket.jsandscripts/download-attachment.js. - Boundary markers: Absent. There are no delimiters or instructions provided to the agent to disregard instructions within the ticket content.
- Capability inventory: The agent has access to
Bash(shell commands),Write(file creation), andEdit(file modification). - Sanitization: The
adfToMarkdownfunction inscripts/parse-ticket.jsconverts structure but does not filter for instructional text or malicious patterns. - [PROMPT_INJECTION]: The
SKILL.mdfile contains instructions that attempt to influence the agent's internal logic regarding environment variables ('verify at least 2 times before concluding it is not set'), which is a form of behavior override.
Recommendations
- AI detected serious security threats
Audit Metadata