sentry-known-pitfalls
Helps troubleshoot Sentry issues by identifying common pitfalls and providing best practices for configuration and error handling.
Install this skill
Security score
The sentry-known-pitfalls skill was audited on May 12, 2026 and we found 17 security issues across 3 threat categories. Review the findings below before installing.
Categories Tested
Security Issues
Template literal with variable interpolation in command context
| 166 | const SENTRY_RELEASE = `myapp@${process.env.GIT_SHA || 'dev'}`; |
Template literal with variable interpolation in command context
| 187 | return await fetch(`/api/users/${id}`).then(r => r.json()); |
Template literal with variable interpolation in command context
| 197 | return await fetch(`/api/users/${id}`).then(r => r.json()); |
Access to .env file
| 41 | - Environment variable management (`.env`, secrets manager, or CI/CD vars) |
Access to .env file
| 72 | Sentry.init({ dsn: process.env.SENTRY_DSN }); |
Access to .env file
| 75 | // vite.config.ts: define: { __SENTRY_DSN__: JSON.stringify(process.env.SENTRY_DSN) } |
Access to .env file
| 162 | Sentry.init({ release: process.env.npm_package_version }); |
Access to .env file
| 166 | const SENTRY_RELEASE = `myapp@${process.env.GIT_SHA || 'dev'}`; |
Access to .env file
| 211 | Sentry.init({ dsn: process.env.SENTRY_DSN }); |
Access to .env file
| 215 | dsn: process.env.SENTRY_DSN, |
Access to .env file
| 216 | environment: process.env.NODE_ENV || 'development', |
Access to .env file
| 221 | if (process.env.VERCEL_ENV) return process.env.VERCEL_ENV; |
Access to .env file
| 222 | if (process.env.RAILWAY_ENVIRONMENT) return process.env.RAILWAY_ENVIRONMENT; |
Access to .env file
| 223 | return process.env.NODE_ENV || 'development'; |
Access to .env file
| 293 | | Hardcoded DSN | Spam events from attackers | `process.env.SENTRY_DSN` or build-time injection | |
Access to .env file
| 299 | | No `environment` | Dev noise in prod dashboard | `environment: process.env.NODE_ENV` | |
External URL reference
| 68 | dsn: 'https://[email protected]/7890123', |