Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Jira Task Manager
v1.0.0Jira automation for JiraATX (project DS). Create, update, comment, transition issues, list To Do tasks, sync repo, execute tasks end-to-end. Triggers: DS-XXX...
⭐ 0· 64·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description, required env vars (JIRA_API_TOKEN, JIRA_EMAIL), and provided scripts all target Jira and local repo automation — broadly coherent. However, the package also embeds a Jira API token and email in references/jira.md and as defaults inside multiple scripts, which contradicts the declared requirement to provide credentials via environment variables.
Instruction Scope
SKILL.md and scripts instruct the agent to read local source files, scan the user's workspace, run git commands, and execute repo test commands. These actions are consistent with end-to-end development flows but allow filesystem enumeration and arbitrary command execution (via subprocess.run) in the user's repos. The workflow claims to wait for user approval before pushing/transitions, but the scripts are capable of making status transitions and updates with the supplied credentials.
Install Mechanism
Instruction-only (no installer). Scripts rely on typical system tools (python, git, npm, pytest) and the jira Python package. No external downloads or archive extraction present in the install spec.
Credentials
Declared env vars are appropriate for Jira integration. However, the repository contains a plaintext JIRA_API_TOKEN and JIRA_EMAIL in references/jira.md and many scripts provide that token as a default fallback. Embedding a usable API token in shipped files is disproportionate and risky — it may inadvertently expose or reuse another account's credentials.
Persistence & Privilege
always is false, the skill is user-invocable and may be autonomously invoked (platform default). The skill does not request system-wide configuration changes or permanent agent privileges.
Scan Findings in Context
[embedded-credential] unexpected: references/jira.md and multiple scripts include a long-looking Atlassian API token and a specific email address as defaults. This is not expected for a skill that declares credentials should be supplied via environment variables and is a serious privacy/credential leakage risk.
What to consider before installing
This skill appears to implement Jira and local-repo automation, but there are red flags you should consider before installing:
- Hard-coded credentials: The package contains a plaintext JIRA_API_TOKEN and JIRA_EMAIL in references/jira.md and as default values inside many scripts. Do NOT assume those are safe or inert — they may be valid and could expose someone else's account or allow the skill to act without your consent. Ask the publisher to remove embedded secrets and rely only on environment-provided credentials.
- Local filesystem and command execution: The scripts scan your workspace, run git commands, and execute repo test commands (subprocess.run). Only install/use this skill in an environment you trust. Prefer running it in an isolated development VM or container if you want to test.
- Confirm intended behavior: The SKILL.md says it will wait for user approval before pushing/merging or transitioning issues, but the scripts can perform transitions and updates via the Jira API. Verify the agent's runtime prompts actually occur and that it will not perform irreversible operations without explicit consent.
- Remove or rotate exposed credentials: If you control the Jira account referenced, rotate the API token immediately. If you do not, consider the embedded token evidence of sloppy packaging and avoid installing until it's removed.
- Verify repository mappings: references/repos.json contains absolute /Users/a/... paths. Ensure these mappings won't point to sensitive paths on your machine, or update them before running.
If you need a safer alternative, ask the publisher to produce a version with no embedded secrets, relative repo-paths or a configurable workspace, and explicit checks that require interactive approval before any write/transition operations.Like a lobster shell, security has layers — review code before you run it.
latestvk97bgpbzqa67vr99ggmfsvnbhh83k6sp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🎯 Clawdis
EnvJIRA_API_TOKEN, JIRA_EMAIL
Primary envJIRA_API_TOKEN
