jira-cr
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the 'run_command' tool to execute 'git diff --staged'. This is a standard and expected operation for the skill's primary purpose. The command is static and does not incorporate untrusted user input into the shell string.
- [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection as it processes untrusted data from external sources.
- Ingestion points: External data is ingested via the 'getJiraIssue' tool, specifically from the issue's Summary, Description, and Acceptance Criteria fields.
- Boundary markers: The skill does not use specific delimiters or instructions to prevent the agent from following directives potentially embedded in the Jira ticket content.
- Capability inventory: The skill has the capability to execute local shell commands (git) and post content back to Jira.
- Sanitization: No validation or sanitization of the Jira ticket data is performed before it is processed by the AI.
Audit Metadata