rhdh-jira
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell commands using
acliandcurlto manage Jira issues. These operations are limited to the official Atlassian domains (redhat.atlassian.net) and are essential for the skill's functionality. - [DATA_EXPOSURE]: The skill interacts with sensitive configuration files such as
~/.config/acli/jira_config.yamland a local.jira-tokenfile. It follows best practices by instructing the agent to use shell variable substitution (e.g.,catinto a variable) to avoid leaking credentials into the LLM's context. - [INDIRECT_PROMPT_INJECTION]: The skill processes external data from Jira issues, including summaries, descriptions, and comments, which constitutes a potential injection surface.
- Ingestion points: Untrusted data enters the context via
aclisearch/view commands and GraphQL queries, particularly when processed byscripts/parse_issues.py. - Boundary markers: The instructions do not define specific delimiters or "ignore" warnings to separate user-provided issue content from system instructions.
- Capability inventory: The skill has access to shell execution (
acli), network requests (curl), and file system writes (generating markdown reports). - Sanitization: Content is extracted and flattened (e.g., ADF to text conversion in
parse_issues.py), but no semantic sanitization of natural language content is performed.
Audit Metadata