Jira Metric

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: jirametric Version: 1.0.0 The `scripts/jira.sh` file contains a critical shell injection vulnerability in the `log_work` function, where the `$hours` argument is directly interpolated into a subshell command for `bc -l`, allowing arbitrary command execution. Additionally, the script includes an undocumented `metrics` command that, if triggered, sends aggregated worklog data (total hours, issue count) to an arbitrary external URL specified by the `JIRA_METRICS_URL` environment variable, posing a hidden data exfiltration risk. The `SKILL.md` does not mention this `metrics` command or the `JIRA_METRICS_URL` variable.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could be given the ability to change Jira records when the user expected only worklog reporting.

Why it was flagged

The supplied registry description is metric retrieval, but the skill instructions disclose broader Jira management and write capabilities. This under-description could lead a user to install it expecting read-only analytics.

Skill content
description: Manage Jira issues, transitions, and worklogs via the Jira Cloud REST API ... status ABC-123 ... assign ABC-123 ... comment ABC-123 ... create "Title" ... log ABC-123
Recommendation

Update the public description and capability metadata to clearly state Jira write access, or split the skill into a read-only metrics skill and a separate issue-management skill.

What this means

The agent could change issue status, assignments, comments, created issues, or time logs in Jira, affecting team workflows or reporting.

Why it was flagged

The helper script implements Jira write operations for transitions, assignees, and worklogs. The artifacts do not show an explicit user-confirmation gate before these business-impacting changes.

Skill content
resp=$(api POST "/rest/api/3/issue/${issue}/transitions" ...)
resp=$(api PUT "/rest/api/3/issue/${issue}/assignee" ...)
resp=$(api POST "/rest/api/3/issue/${issue}/worklog" ...)
Recommendation

Require explicit user confirmation for all write actions, make read-only reporting the default, and add dry-run or preview output before applying Jira mutations.

What this means

The agent may act under the user's Jira identity and access or modify more Jira data than the user realizes.

Why it was flagged

The skill requires a Jira API token and allows an empty project scope to search all accessible Jira data, while the registry metadata declares no required env vars or primary credential.

Skill content
export JIRA_EMAIL="you@example.com"
export JIRA_API_TOKEN="your-api-token"
export JIRA_URL="https://your-domain.atlassian.net"
# Optional project scope (comma-separated). Empty = search all.
Recommendation

Declare the Jira credential requirement in metadata, use least-privilege credentials where possible, set JIRA_BOARD to an explicit project list, and separate read-only from write-capable credentials.

What this means

Users may not see the credential and tool requirements before installing or enabling the skill.

Why it was flagged

The registry metadata under-declares prerequisites that SKILL.md lists, including local binaries and Jira credential environment variables. No remote install or hidden dependency is shown, but the packaging metadata is incomplete.

Skill content
Required binaries (all must exist): none ... Required env vars: none ... No install spec — this is an instruction-only skill.
Recommendation

Align registry metadata with SKILL.md by declaring required binaries, required environment variables, and credential expectations.