sentry-javascript-bugs
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [SAFE]: The skill provides a robust framework for static analysis of frontend code based on real production error data. It uses local reference files for pattern matching and does not attempt any network operations or external downloads.
- [COMMAND_EXECUTION]: The skill lists 'Bash' as an allowed tool. While the current instructions focus on using 'Read' and 'Grep' for code analysis, the presence of shell access is a powerful capability that requires the agent to adhere to its defined scope.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted code chunks provided by users.
- Ingestion points: Code chunks and hunks from 'Warden's diff pipeline' processed during review.
- Boundary markers: No explicit delimiters or instructions to ignore embedded commands in the reviewed code are provided.
- Capability inventory: The agent has access to 'Read', 'Grep', 'Glob', and 'Bash' tools.
- Sanitization: There is no evidence of sanitization or validation of the input code content to prevent it from influencing the agent's behavior.
Audit Metadata