work-on-ticket
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The
scripts/setup.shfile explicitly instructs and provides commands for users to append their Jira API token in plain text to shell configuration files (~/.zshrcor~/.bashrc). Storing long-lived credentials in shell profiles is a high-risk practice as these files are frequently targeted by local malware and may be accidentally synchronized or backed up insecurely. - [COMMAND_EXECUTION] (MEDIUM): Several scripts (
scripts/create-ticket.py,scripts/start-work.py) usesubprocess.runto executegitandgh(GitHub CLI) commands. While some sanitization (likeslugify) is applied to branch names, other fields such as ticket summaries are directly interpolated into command arguments. This creates a surface for argument injection if the external data from Jira contains malicious payloads designed to manipulate CLI flags. - [DATA_EXFILTRATION] (LOW): The
scripts/jira_config.pyfile contains a hardcoded default URLhttps://ihkreddy.atlassian.net. While not a credential, hardcoding specific external domains for data routing is a poor practice and could lead to accidental data exposure to the author's instance if a user fails to provide their own configuration. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill is vulnerable to indirect prompt injection because it ingests untrusted data from Jira tickets and uses it to drive local development actions.
- Ingestion points:
scripts/fetch-ticket.pyandscripts/start-work.pyretrieve ticket summaries, descriptions, and comments via the Jira REST API. - Boundary markers: None. Data is processed directly without delimiters or instructions to the agent to ignore embedded commands.
- Capability inventory: The skill can create/checkout git branches, push code to remote repositories, and create GitHub Pull Requests using
subprocess.runandghCLI. - Sanitization: The
slugifyfunction instart-work.pyuses regex[^\w\s-]to sanitize branch names, which provides some protection against command injection in those specific calls.
Audit Metadata