Snowsand Jira
ReviewAudited by ClawScan on May 10, 2026.
Overview
The skill appears to be a legitimate Jira integration, but it gives an agent broad ability to change Jira data using a user API token without clear approval or scoping guardrails.
Use this skill only with a Jira token/account whose permissions you are comfortable delegating to the agent. Before allowing write actions, verify the project, issue key, fields, status transition, comment text, worklog time, and any raw API request body.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If the agent misunderstands a request or acts too broadly, it could change Jira tickets, statuses, comments, or worklogs under the user's account.
The skill explicitly enables an agent to create, update, transition, comment on, and log work against Jira issues, which can affect business workflow data. The artifacts do not describe confirmation, preview, project restrictions, or rollback guidance before these mutating actions.
| Create issue | `jira.py create PROJ --type Task --summary "Title" --description "Body"` | ... | Update issue | `jira.py update PROJ-123 --summary "New title"` | ... | Transition | `jira.py transition PROJ-123 "In Progress"` | ... | Log work | `jira.py worklog PROJ-123 --time "2h 30m" --comment "Work done"` |
Require explicit user confirmation for create, update, transition, comment, worklog, and other write operations; restrict use to intended projects or issue keys; and show a preview before making changes.
The agent could use the raw Jira API to perform operations beyond the documented helper commands, limited mainly by the user's Jira account permissions.
The skill provides an escape-hatch pattern for direct Jira REST API calls using the user's token. This is purpose-related, but it bypasses the script's narrower command set and does not define limits on what endpoints or write operations the agent may use.
## Raw API Access For operations not covered by the script: ```bash # GET request curl -s -u "$JIRA_USER_EMAIL:$JIRA_API_TOKEN" ... # POST request curl -s -X POST -u "$JIRA_USER_EMAIL:$JIRA_API_TOKEN" ... ```
Prefer scoped helper commands over raw API calls, and require explicit user approval plus endpoint/body review before any raw POST, PUT, DELETE, or other mutating REST request.
Installing users may not realize from the registry metadata that the skill needs a Jira API token and can act with that account's Jira permissions.
The skill clearly requires Jira account credentials, but the registry metadata says there are no required env vars and no primary credential. This looks like an under-declared credential contract rather than hidden credential use.
Jira Cloud uses API token authentication. Required environment variables: - `JIRA_BASE_URL` - `JIRA_USER_EMAIL` - `JIRA_API_TOKEN`
Declare the required Jira environment variables and primary credential in metadata, and advise users to use a least-privilege Jira token or account where possible.
