sentry-policy-guardrails
Implements governance and policy guardrails for Sentry to enforce organizational standards and compliance across teams.
Install this skill
Security score
The sentry-policy-guardrails skill was audited on May 12, 2026 and we found 23 security issues across 3 threat categories. Review the findings below before installing.
Categories Tested
Security Issues
Template literal with variable interpolation in command context
| 117 | throw new Error(`Invalid service name "${opts.serviceName}" — use lowercase kebab-case, 3-40 chars`); |
Template literal with variable interpolation in command context
| 122 | throw new Error(`Invalid environment "${env}". Allowed: ${VALID_ENVS.join(', ')}`); |
Template literal with variable interpolation in command context
| 128 | ? `${opts.serviceName}@${opts.version}+${sha}` |
Template literal with variable interpolation in command context
| 129 | : `${opts.serviceName}@${opts.version}`; |
Template literal with variable interpolation in command context
| 247 | ```bash |
Template literal with variable interpolation in command context
| 306 | const headers = { Authorization: `Bearer ${token}` }; |
Template literal with variable interpolation in command context
| 310 | `https://sentry.io/api/0/organizations/${org}/stats_v2/?` + |
Template literal with variable interpolation in command context
| 317 | `https://sentry.io/api/0/organizations/${org}/projects/?all_projects=1`, |
Template literal with variable interpolation in command context
| 338 | console.log(`[${q.team}] errors=${u.errors}/${q.errors} (${ePct}%) txns=${u.txns}/${q.transactions} (${tPct}%) [${flag}]`); |
Template literal with variable interpolation in command context
| 348 | ```yaml |
Access to .env file
| 120 | const env = (opts.environment || process.env.NODE_ENV || 'development').toLowerCase(); |
Access to .env file
| 126 | const sha = (process.env.GIT_SHA || process.env.COMMIT_SHA || '').substring(0, 7); |
Access to .env file
| 151 | deployment: process.env.DEPLOYMENT_ID || 'unknown', |
Access to .env file
| 152 | region: process.env.AWS_REGION || process.env.GCP_REGION || 'unknown', |
Access to .env file
| 166 | dsn: process.env.SENTRY_DSN!, |
Access to .env file
| 305 | const org = process.env.SENTRY_ORG!, token = process.env.SENTRY_AUTH_TOKEN!; |
Access to .env file
| 406 | dsn: process.env.SENTRY_DSN!, |
Access to .env file
| 418 | dsn: process.env.SENTRY_DSN!, |
External URL reference
| 189 | if grep -rn "https://[a-f0-9]*@.*ingest.*sentry" \ |
External URL reference
| 253 | API="https://sentry.io/api/0" |
External URL reference
| 310 | `https://sentry.io/api/0/organizations/${org}/stats_v2/?` + |
External URL reference
| 317 | `https://sentry.io/api/0/organizations/${org}/projects/?all_projects=1`, |
External URL reference
| 436 | - [Security Policy](https://sentry.io/security/) |