sentry-observability
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Remote Code Execution (CRITICAL): The file
scripts/_common.shdefines a functionrequire_sentry_clithat instructs the agent to executecurl -sL https://sentry.io/get-cli/ | bash. This pattern executes a remote script without verification and is a high-risk security flaw. - External Downloads (HIGH): The
scripts/init_sentry.shscript executesnpx @sentry/wizard@latest, which downloads and runs remote code. It also installs multiple npm packages like@sentry/nextjsand@sentry/react. - Data Exfiltration (MEDIUM): The skill reads sensitive configuration files like
.env.localand.sentryclircto retrieveSENTRY_AUTH_TOKENand then transmits this token tosentry.ioviacurlin theapi_callfunction. While this is the intended functionality, the destination is not on the trusted whitelist and involves sensitive file access. - Command Execution (MEDIUM): The skill relies on numerous shell scripts to perform environment detection, file system modifications, and system interactions.
- Indirect Prompt Injection (LOW): The scripts
scripts/issue_detail.shandscripts/list_issues.shfetch issue titles and descriptions from the Sentry API and process them as raw data. An attacker could potentially influence agent behavior by injecting malicious instructions into Sentry issue metadata.
Recommendations
- HIGH: Downloads and executes remote code from: https://sentry.io/get-cli/ - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata