Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
jira-issue-analyzer
v1.0.0Jira 问题分析编排器。负责获取 issue 与附件、委托日志分析 subagent,并产出最终 Markdown 报告到本地目录。适用于用户要求生成 Jira 问题分析文档的场景。
⭐ 0· 54·0 current·0 all-time
byDimos@dimos92
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name/description match the included Python code (jira_client, main) which fetches issues, downloads attachments, and produces reports. However, the registry metadata declares no required environment variables or primary credential, while the code and SKILL.md clearly require JIRA_BASE_URL and JIRA_TOKEN — a metadata mismatch that should be resolved.
Instruction Scope
SKILL.md stays within the stated purpose (create venv, install requirements, fill .env, run main.py to get/download issues, delegate to included jira-log-analyst). It references only local paths under ~/.cursor and the target project .cursor/work/jira for report output. It does not instruct exfiltration to external endpoints beyond the configured Jira server. Still, the instructions assume files live in ~/.cursor/skills and require a .env with secrets not declared in the registry.
Install Mechanism
No install spec — instruction-only with shipped Python scripts. requirements.txt only lists requests and python-dotenv, which is proportionate to the task. Nothing in the install surface pulls arbitrary remote archives or runs opaque installers.
Credentials
The code legitimately needs JIRA_BASE_URL and JIRA_TOKEN, but the skill metadata does not declare them. Additional concerns: jira_client sets session.trust_env = False which disables honoring HTTP(S)_PROXY environment variables — this will bypass system or enterprise proxy controls (monitoring/network egress rules) and may be unexpected. The code fetches personal fields (assignee/reporters' email addresses) and downloads attachments — all expected for the feature but they are sensitive and require that users trust the skill before providing credentials.
Persistence & Privilege
The skill does not request permanent inclusion (always:false) and does not modify other skills or system-wide configs. It will create a virtualenv under the skill directory and write report files into the user's project .cursor/work/jira directory per the instructions — this is expected behavior for a local report generator.
What to consider before installing
Things to check before installing or running this skill:
- Metadata vs code: The registry declares no required env vars, but the code and SKILL.md require JIRA_BASE_URL and JIRA_TOKEN. Treat this as a packaging oversight — confirm you are comfortable providing a Jira token before proceeding.
- Token scope: Use a Jira personal access token with minimal scope/expiration appropriate for read-only issue/attachment access, not a full admin token. Do not reuse broad credentials.
- Proxy behavior: The Jira client disables environment proxy settings (session.trust_env = False). If your organization relies on an HTTP(S) proxy for egress control or monitoring, this will bypass it. Ask the maintainer why this was set; remove or change it if you need proxy-based controls.
- Hard-coded script: jira/unzip_attachment.py contains a hard-coded zip filename (c52056b2-..._app_log.zip) and will exit if that file is not present; it appears to be an example or leftover. Review and either remove or parameterize it before running to avoid unexpected behavior.
- Inspect .env.example: Confirm what variables are required and that no extra secrets are requested. The code currently only reads JIRA_BASE_URL and JIRA_TOKEN but verify there are no hidden env dependencies.
- Run in isolated environment: Create the venv as instructed and review the code locally before executing. Consider running network-active parts in an environment where you can monitor outbound requests (e.g., via a firewall or proxy you control).
- Confirm report storage: Reports and attachments will be written to your project .cursor/work/jira and temporary /tmp/jira_<ISSUE_KEY> by default. Ensure you are comfortable with these locations and that sensitive attachments are handled according to your policy.
If the publisher updates the registry to declare required env vars, documents why proxies are disabled, and removes or documents the hard-coded unzip example, my confidence that the package is coherent would increase.Like a lobster shell, security has layers — review code before you run it.
latestvk9705wpqppk65bcf7pm76qzc6h83w4a1
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
