Sentry Error Analyzer
Analysis
This instruction-only Sentry analysis skill is coherent and purpose-aligned, but it may use a Sentry API token and process sensitive error data.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
For Sentry API data: ```bash # Fetch issues sorted by frequency curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN"
The skill includes shell/API command examples using curl and jq. They are coherent with the skill's purpose and presented as examples, not hidden or automatic execution.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
curl -s -H "Authorization: Bearer $SENTRY_AUTH_TOKEN"
The skill documents using a Sentry bearer token to fetch project issue and event data. This is purpose-aligned for Sentry analysis, but the registry metadata does not declare a credential or environment variable.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
**Raw error logs** — stack traces with timestamps and metadata
The skill is designed to analyze Sentry logs, stack traces, event metadata, tags, and potentially user-related error patterns. This is expected for the purpose, but such data can be sensitive when moved from Sentry or local exports into an agent session.
