atlassian-usage

Pass

Audited by Gen Agent Trust Hub on Feb 28, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides several examples of shell commands using the atl CLI, such as atl jira search-jql and atl confluence get-page, which process user-provided identifiers.
  • [PROMPT_INJECTION]: The skill defines a process for extracting Project Keys and Page IDs from untrusted URL strings and interpolating them into shell commands, creating an indirect prompt injection surface. Ingestion points: Identification and extraction of parameters from *.atlassian.net URLs in SKILL.md. Boundary markers: None specified for the interpolation of extracted values into command-line arguments. Capability inventory: Subprocess execution via the atl CLI for searching, reading, and updating Atlassian content. Sanitization: The instructions do not advise the agent to validate or escape the extracted identifiers before their use in sensitive CLI operations.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 28, 2026, 11:07 PM