jira

Fail

Audited by Socket on Mar 1, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
README.md

The package's functionality is legitimate: it automates Jira operations via go-jira and OS keychain. There is no direct evidence in the provided documentation of intentional malware, hardcoded credentials, or obfuscated code. However, the combination of high-privilege operations (full Jira access), a 'raw API' escape hatch, and use of shell scripts creates meaningful risk if implementation does not correctly sanitize inputs and protect persisted configuration/cache files. Recommended actions before trusting in automation: review each jira-*.sh and _config.sh for safe shell practices (proper quoting, no eval/dynamic exec), ensure least-privilege Jira credentials are used, verify file permissions for caches/configs, add auditing/operation logs on the Jira side, and restrict who/what can invoke the scripts (do not expose to untrusted input). If possible, replace raw-shell command composition with safer libraries or explicit argument arrays to avoid injection risks.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 1, 2026, 01:06 AM
Package URL
pkg:socket/skills-sh/rezkam%2Fboring-but-good%2Fjira%2F@c9fd00c0a1fbca6549961c081fdd34c67cbfc508