Atlassian Jira by altf1be
ReviewAudited by ClawScan on May 10, 2026.
Overview
This is a coherent Jira Cloud integration, but it needs a Jira API token and can change Jira issues, comments, attachments, and workflow state when invoked.
Install only if you are comfortable giving the agent Jira API-token access. Use a dedicated low-privilege Jira account where possible, confirm the Jira host, keep the token out of shared files, and ask the agent to get explicit approval before making Jira changes. The supplied script excerpt was truncated, so review the full script from the trusted source if you need higher assurance.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If the agent is allowed to use the skill, it can make visible changes in Jira under the configured account's permissions.
These commands can mutate Jira issues, comments, attachments, and workflow state. This is disclosed and central to the skill, but it is still high-impact business-data authority.
Commands include create, update, delete --confirm, comment-add, attachment-add --file, and transition --transition-id.
Use a least-privileged Jira account or token, restrict Jira project permissions where possible, and require explicit user confirmation before write, delete, attachment, or transition actions.
Anyone or any agent process with these environment variables can act in Jira with the configured account's permissions.
The script reads Jira credentials from environment variables and sends them as Basic Auth to the configured Jira API endpoint, which is expected but grants account-level Jira authority.
const host = process.env.JIRA_HOST; const email = process.env.JIRA_EMAIL; const apiToken = process.env.JIRA_API_TOKEN; ... return `Basic ${token}`; ... fetch(url, { ...options, headers });Store the token securely, verify JIRA_HOST points to the intended Atlassian site, avoid sharing the .env file, and rotate the token if it may have been exposed.
