Sentry Integration

ReviewAudited by ClawScan on May 10, 2026.

Overview

This is a coherent Sentry integration, but it gives the agent token-backed ability to change Sentry issue and release state, including bulk resolution, without an explicit approval boundary.

Install only if you want the agent to operate against your Sentry account. Use a least-privilege token, set a specific org/project, and require the agent to show proposed changes and get your confirmation before resolving, ignoring, assigning, bulk-updating, finalizing releases, recording deploys, or uploading source maps.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could mark production errors as resolved or ignored, potentially hiding active incidents or changing team triage state.

Why it was flagged

The skill documents bulk issue-state changes and makes resolving or ignoring issues part of the triage workflow, without stating that the agent must obtain explicit confirmation or limit changes to a user-approved set.

Skill content
# Resolve multiple issues at once ... -d '{"id": ["123","456","789"], "status": "resolved"}' ... 6. Resolve issues that have confirmed fixes deployed; ignore transient errors
Recommendation

Require explicit user approval before any PUT/write action, especially resolve, ignore, assign, release finalization, deploy recording, source map upload, or bulk changes.

What this means

Anyone or any agent using this token can access Sentry data and perform the token's allowed actions.

Why it was flagged

The skill requires a Sentry token that delegates access to organization/project data, release management, and event reads. This is expected for the integration, but users should treat it as a privileged credential.

Skill content
export SENTRY_AUTH_TOKEN="sntrys_..." ... Generate a token ... with scopes: `project:read`, `project:releases`, `org:read`, `event:read`.
Recommendation

Use a least-privilege token scoped to the intended org/project, avoid sharing it in logs or chats, and revoke it when no longer needed.

What this means

A compromised or unexpected CLI package version could affect commands run by the agent.

Why it was flagged

The skill asks users to install a global CLI from package registries without version pinning. This is normal for a CLI integration but depends on trusted package sources.

Skill content
npm i -g @sentry/cli
# — or —
pip install sentry-cli
Recommendation

Install sentry-cli from trusted sources, consider pinning a known version, and verify the binary before using it with production credentials.

What this means

Sensitive error context, such as URLs, request details, breadcrumbs, or stack traces, may be exposed to the local agent session.

Why it was flagged

The skill retrieves full Sentry event entries, including stack traces and breadcrumbs, into the agent context. This is purpose-aligned for debugging but may contain sensitive application or user data.

Skill content
# Latest events for an issue (stack traces, breadcrumbs)
curl -s "https://sentry.io/api/0/issues/$ISSUE_ID/events/?full=true" ... | jq '.[0].entries'
Recommendation

Review Sentry data-scrubbing settings and avoid asking the agent to fetch full events unless the debugging task requires it.