sentry

Fail

Audited by Gen Agent Trust Hub on Feb 12, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis

================================================================================

🔴 VERDICT: HIGH

This skill is rated HIGH due to its direct access and reading of a sensitive credential file (~/.sentryclirc) to obtain an authentication token. While the token is subsequently used to communicate with the legitimate Sentry API (sentry.io), the act of programmatically accessing and parsing a user's local authentication configuration file presents a significant security risk. A compromised skill could potentially exfiltrate this token to an attacker-controlled server.

Total Findings: 2

🔴 HIGH Findings: • Sensitive File Access

  • lib/auth.js:3:18: const rcPath = join(homedir(), ".sentryclirc"); • Sensitive File Read
  • lib/auth.js:15:20: const content = readFileSync(rcPath, "utf-8");

🔵 LOW Findings: • Network Request with Sensitive Data to Trusted Service

  • lib/auth.js:30:16: const res = await fetch(url, {

================================================================================

Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 12, 2026, 05:55 PM