atlassian-mcp
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted data from Jira issues and Confluence pages, which constitutes an indirect prompt injection attack surface.\n
- Ingestion points: Jira issue descriptions and Confluence page content are ingested in
references/common-workflows.mdthrough tools likejira_get_issueandconfluence_get_page.\n - Boundary markers: There are no explicit boundary markers or instructions to ignore embedded commands in the data interpolation examples.\n
- Capability inventory: The skill allows for various write operations across its references, including
jira_update_issue,jira_add_comment,confluence_create_page, andconfluence_update_page.\n - Sanitization: A utility function
escapeHtmlis provided inreferences/common-workflows.mdto sanitize data for the Confluence storage format.\n- [COMMAND_EXECUTION]: The skill provides configuration guidance for running shell-based MCP servers.\n - Evidence:
SKILL.mdandreferences/mcp-server-setup.mdinclude command-line configurations for usingnpxanduvxto execute Atlassian MCP servers.\n- [EXTERNAL_DOWNLOADS]: The skill directs users to install external MCP server packages.\n - Evidence: References
@anthropic/mcp-atlassian,mcp-atlassian(sooperset), andatlassian-mcp(xuanxt) as dependencies to be installed via standard package managers like npm, pip, or uv.
Audit Metadata