sentry-otel-exporter-setup
Pass
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches the OpenTelemetry Collector binary and configuration templates from the official OpenTelemetry GitHub repositories.
- [REMOTE_CODE_EXECUTION]: It downloads and executes an external binary (otelcol-contrib) from the well-known OpenTelemetry organization on GitHub.
- [COMMAND_EXECUTION]: The skill uses shell commands like curl, tar, chmod, and docker to install, configure, and run services.
- [COMMAND_EXECUTION]: It uses the source command to load environment variables from local .env files, which can lead to arbitrary command execution if the file contains shell substitutions.
- [DATA_EXFILTRATION]: The skill searches for and reads sensitive configuration files (e.g., .env) to manage Sentry organization slugs and authentication tokens.
- [PROMPT_INJECTION]: The skill processes local configuration and environment files while possessing high-privilege capabilities, creating a surface for indirect prompt injection. Ingestion points: Reads collector-config.yaml and .env files discovered via file system globbing. Boundary markers: No explicit boundary markers or ignore instructions warnings are used when reading these files. Capability inventory: Performs network requests via curl, modifies file permissions with chmod, and executes the otelcol-contrib binary and docker commands. Sanitization: No sanitization or validation of the content of the .env or configuration files is performed.
Audit Metadata