Snowsand Jira

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill appears to be a legitimate Jira integration, but it gives an agent broad ability to change Jira data using a user API token without clear approval or scoping guardrails.

Use this skill only with a Jira token/account whose permissions you are comfortable delegating to the agent. Before allowing write actions, verify the project, issue key, fields, status transition, comment text, worklog time, and any raw API request body.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent misunderstands a request or acts too broadly, it could change Jira tickets, statuses, comments, or worklogs under the user's account.

Why it was flagged

The skill explicitly enables an agent to create, update, transition, comment on, and log work against Jira issues, which can affect business workflow data. The artifacts do not describe confirmation, preview, project restrictions, or rollback guidance before these mutating actions.

Skill content
| Create issue | `jira.py create PROJ --type Task --summary "Title" --description "Body"` | ... | Update issue | `jira.py update PROJ-123 --summary "New title"` | ... | Transition | `jira.py transition PROJ-123 "In Progress"` | ... | Log work | `jira.py worklog PROJ-123 --time "2h 30m" --comment "Work done"` |
Recommendation

Require explicit user confirmation for create, update, transition, comment, worklog, and other write operations; restrict use to intended projects or issue keys; and show a preview before making changes.

What this means

The agent could use the raw Jira API to perform operations beyond the documented helper commands, limited mainly by the user's Jira account permissions.

Why it was flagged

The skill provides an escape-hatch pattern for direct Jira REST API calls using the user's token. This is purpose-related, but it bypasses the script's narrower command set and does not define limits on what endpoints or write operations the agent may use.

Skill content
## Raw API Access

For operations not covered by the script:

```bash
# GET request
curl -s -u "$JIRA_USER_EMAIL:$JIRA_API_TOKEN" ...

# POST request
curl -s -X POST -u "$JIRA_USER_EMAIL:$JIRA_API_TOKEN" ...
```
Recommendation

Prefer scoped helper commands over raw API calls, and require explicit user approval plus endpoint/body review before any raw POST, PUT, DELETE, or other mutating REST request.

What this means

Installing users may not realize from the registry metadata that the skill needs a Jira API token and can act with that account's Jira permissions.

Why it was flagged

The skill clearly requires Jira account credentials, but the registry metadata says there are no required env vars and no primary credential. This looks like an under-declared credential contract rather than hidden credential use.

Skill content
Jira Cloud uses API token authentication. Required environment variables:

- `JIRA_BASE_URL`
- `JIRA_USER_EMAIL`
- `JIRA_API_TOKEN`
Recommendation

Declare the required Jira environment variables and primary credential in metadata, and advise users to use a least-privilege Jira token or account where possible.