jira
Audited by Socket on Mar 1, 2026
1 alert found:
Obfuscated FileThe package's functionality is legitimate: it automates Jira operations via go-jira and OS keychain. There is no direct evidence in the provided documentation of intentional malware, hardcoded credentials, or obfuscated code. However, the combination of high-privilege operations (full Jira access), a 'raw API' escape hatch, and use of shell scripts creates meaningful risk if implementation does not correctly sanitize inputs and protect persisted configuration/cache files. Recommended actions before trusting in automation: review each jira-*.sh and _config.sh for safe shell practices (proper quoting, no eval/dynamic exec), ensure least-privilege Jira credentials are used, verify file permissions for caches/configs, add auditing/operation logs on the Jira side, and restrict who/what can invoke the scripts (do not expose to untrusted input). If possible, replace raw-shell command composition with safer libraries or explicit argument arrays to avoid injection risks.