fix-sentry
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection. It ingests untrusted error messages and stack traces from Sentry via
mcp__sentry__get_issue_detailsand uses this data to drive code modification and test creation in Phase 2. An attacker who can trigger specific application errors can potentially influence the agent's behavior. - Ingestion points: Sentry issue details and error messages are fetched and processed during Phase 1 (SKILL.md Step 1.5).
- Boundary markers: The instructions do not define any delimiters or warnings to ignore embedded instructions within the fetched Sentry data.
- Capability inventory: The skill has extensive capabilities including file system writes,
gitoperations (commit, push), GitHub PR management (ghCLI), and execution of project scripts (bun run,node). - Sanitization: No sanitization or validation of the fetched Sentry content is performed before it is used to influence agent actions.
- [COMMAND_EXECUTION]: The skill performs extensive command-line operations to manage the development workflow. This includes
gitfor branch management and commits, theghCLI for pull requests, andbun/nodefor running linters, tests, and custom scripts (e.g.,prek,check-i18n.js). Additionally, it usesmcp__chrome-devtools__evaluate_scriptto execute arbitrary JavaScript in the application's renderer process during verification.
Audit Metadata