jira-assistant
Fail
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: Scripts within the testing library (
tests/lib_container.shandtests/claude-devcontainer/lib/container.sh) contain logic to extract authentication data from sensitive local sources. Specifically, the functionget_oauth_credentialsuses the macOSsecurityCLI to retrieve passwords from the Keychain, andget_api_key_from_configreads API keys directly from~/.claude.jsonto configure the agent's authentication in Docker containers. - [REMOTE_CODE_EXECUTION]: Multiple Dockerfiles and initialization scripts (
tests/Dockerfile.dev-enhanced,tests/enhanced/setup-enhanced.sh,tests/claude-devcontainer/Dockerfile.enhanced) install external tools using the high-riskcurl | shpattern. This includes the installation of the Starship prompt, the Rust toolchain viarustup, and the Docker CLI. - [COMMAND_EXECUTION]: The skill provides a comprehensive set of shell scripts for container orchestration and environment management. These scripts execute broad commands via
subprocessand grant the container user passwordlesssudoprivileges to allow runtime installation of system, Python, and Node.js packages. - [DYNAMIC_EXECUTION]:
tests/remediate_tests.pyimplements an automated feedback loop where an AI model analyzes routing failures and generates structural modifications to the agent's own instruction files (SKILL.md). These changes are automatically applied to the local file system using theSkillEditorutility, representing a dynamic self-modification capability.
Recommendations
- HIGH: Downloads and executes remote code from: https://starship.rs/install.sh - DO NOT USE without thorough review
Audit Metadata