An open API service providing repository metadata for many open source software ecosystems.

GitHub / atlassian-api / atlassian-python-api

Atlassian Python REST API wrapper. The atlassian-python-api library provides a simple and convenient way to interact with Atlassian products (such as Jira Service management, Jira Software, Confluence, Bitbucket and apps Insight, X-Ray) using Python. It is based on the official REST APIs of these products and by community for Atlassian

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/atlassian-api%2Fatlassian-python-api
PURL: pkg:github/atlassian-api/atlassian-python-api

Stars: 1,523
Forks: 701
Open issues: 185

License: apache-2.0
Language: Python
Size: 2.89 MB
Dependencies parsed at: Pending

Created at: over 11 years ago
Updated at: 5 days ago
Pushed at: 8 days ago
Last synced at: 2 days ago

Commit Stats

Commits: 1434
Authors: 334
Mean commits per author: 4.29
Development Distribution Score: 0.842
More commit stats: https://commits.ecosyste.ms/hosts/GitHub/repositories/atlassian-api/atlassian-python-api

Topics: advanced-roadmaps, api, atlassian, bamboo, bitbucket, confluence, crowd, hacktoberfest, jira, jira-service-desk, portfolio, python, rest, tempo, wrapper, xray

OpenSSF Scorecard report

4.9

Overall Score

10/10 Critical Risk
25/50 High Risk
9/40 Medium Risk
10/20 Low Risk
Generated on August 11, 2025 | Scorecard vv5.2.1-40-gf6ed084d
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
ℹ️ Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0
10/10
Maintained
High Risk

15 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10

Determines if the project is "actively maintained".

9/10
SAST
Medium Risk

SAST tool detected but not run on all commits

Determines if the project uses static code analysis.

Show details
ℹ️ Info: SAST configuration detected: CodeQL
⚠️ Warn: 14 commits out of 18 are checked with a SAST tool
5/10
Code-Review
High Risk

Found 17/30 approved changesets -- score normalized to 5

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/atlassian-api/atlassian-python-api/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:45: update your workflow using https://app.stepsecurity.io/secureworkflow/atlassian-api/atlassian-python-api/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:59: update your workflow using https://app.stepsecurity.io/secureworkflow/atlassian-api/atlassian-python-api/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/codeql-analysis.yml:72: update your workflow using https://app.stepsecurity.io/secureworkflow/atlassian-api/atlassian-python-api/codeql-analysis.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/atlassian-api/atlassian-python-api/test.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/test.yml:33: update your workflow using https://app.stepsecurity.io/secureworkflow/atlassian-api/atlassian-python-api/test.yml/master?enable=pin
⚠️ Warn: containerImage not pinned by hash: Dockerfile.qa:1: pin your Docker image by updating ubuntu:20.04 to ubuntu:20.04@sha256:8feb4d8ca5354def3d8fce243717141ce31e2c428701f6682bd2fafe15388214
⚠️ Warn: containerImage not pinned by hash: Dockerfile.standalone:1: pin your Docker image by updating openjdk:11 to openjdk:11@sha256:99bac5bf83633e3c7399aed725c8415e7b569b54e03e4599e580fc9cdb7c21ab
⚠️ Warn: pipCommand not pinned by hash: Dockerfile.qa:67
⚠️ Warn: pipCommand not pinned by hash: Dockerfile.qa:68
⚠️ Warn: pipCommand not pinned by hash: Dockerfile.qa:69
⚠️ Warn: pipCommand not pinned by hash: Dockerfile.qa:70
ℹ️ Info: 0 out of 5 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 0 out of 1 third-party GitHubAction dependencies pinned
ℹ️ Info: 0 out of 2 containerImage dependencies pinned
ℹ️ Info: 0 out of 4 pipCommand dependencies pinned
0/10
Security-Policy
Medium Risk

security policy file not detected

Determines if the project has published a security policy.

Show details
⚠️ Warn: no security policy file detected
⚠️ Warn: no security file to analyze
⚠️ Warn: no security file to analyze
⚠️ Warn: no security file to analyze
0/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
ℹ️ Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql-analysis.yml:28
ℹ️ Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql-analysis.yml:29
⚠️ Warn: no topLevel permission defined: .github/workflows/codeql-analysis.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/test.yml:1
ℹ️ Info: no jobLevel write permissions found
0/10
Vulnerabilities
High Risk

16 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

Show details
⚠️ Warn: Project is vulnerable to: PYSEC-2024-48 / GHSA-fj7x-q9j7-g6q6
⚠️ Warn: Project is vulnerable to: PYSEC-2022-238 / GHSA-h3qr-fjhm-jphw
⚠️ Warn: Project is vulnerable to: GHSA-9hjg-9r4m-mvj7
⚠️ Warn: Project is vulnerable to: GHSA-9wx4-h78v-vm56
⚠️ Warn: Project is vulnerable to: PYSEC-2023-74 / GHSA-j8r2-6x86-q33q
⚠️ Warn: Project is vulnerable to: PYSEC-2018-28 / GHSA-x84v-xcm2-53pg
⚠️ Warn: Project is vulnerable to: GHSA-34jh-p97f-mpxf
⚠️ Warn: Project is vulnerable to: PYSEC-2023-212 / GHSA-g4mx-q9vg-27p4
⚠️ Warn: Project is vulnerable to: PYSEC-2023-207 / GHSA-gwvm-45gx-3cf8
⚠️ Warn: Project is vulnerable to: PYSEC-2019-133 / GHSA-mh33-7rrq-662w
⚠️ Warn: Project is vulnerable to: GHSA-pq67-6m6q-mj2v
⚠️ Warn: Project is vulnerable to: PYSEC-2019-132 / GHSA-r64q-w8jr-g9qp
⚠️ Warn: Project is vulnerable to: PYSEC-2023-192 / GHSA-v845-jxx5-vc9f
⚠️ Warn: Project is vulnerable to: PYSEC-2020-148 / GHSA-wqvq-5m8c-6g24
⚠️ Warn: Project is vulnerable to: PYSEC-2018-32 / GHSA-www2-v7xj-xrc6
⚠️ Warn: Project is vulnerable to: PYSEC-2021-108
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Packaging
Not Applicable

packaging workflow not detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
⚠️ Warn: no GitHub/GitLab publishing workflow detected.
N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.