Comprehensive toolkit for validating, linting, testing, and automating Jenkinsfile pipelines (both Declarative and Scripted). Use this skill when working with Jenkins pipeline files, validating pipeline syntax, checking best practices, debugging pipeline issues, or working with custom plugins.
93
93%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
Security
2 findings — 1 high severity, 1 medium severity. You should review these findings carefully before considering using this skill.
The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.
Insecure credential handling detected (high risk: 0.90). The skill instructs the agent to read Jenkinsfiles, detect and report hardcoded credentials, and provide inline code snippets from those files—behavior that can require reproducing secret values verbatim (exfiltration risk).
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). The SKILL.md "Plugin Documentation Lookup" workflow explicitly instructs Claude to look up unknown plugins using Context7 and, if that fails, to perform WebSearch and consult public sites like https://plugins.jenkins.io/—which requires fetching and interpreting untrusted public web content that can influence validation decisions.