Sentry
Native OpenClaw Sentry plugin for organization, project, and issue triage workflows
Community code plugin. Review compatibility and verification before install.
sentry · runtime id sentry
Install
openclaw plugins install clawhub:sentryLatest Release
Version 0.1.0
Compatibility
{
"builtWithOpenClawVersion": "2026.3.23-2",
"pluginApiRange": ">=2026.3.23"
}Capabilities
{
"bundledSkills": [],
"capabilityTags": [
"executes-code"
],
"channels": [],
"commandNames": [],
"configSchema": true,
"configUiHints": false,
"executesCode": true,
"hooks": [],
"httpRouteCount": 0,
"materializesDependencies": false,
"providers": [],
"runtimeId": "sentry",
"serviceNames": [],
"setupEntry": false,
"toolNames": []
}Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the implementation: code registers tools to list organizations, projects, issues and fetch issue details. There are no unrelated binaries or credentials requested; the plugin expects a Sentry authToken in its plugin config (declared in openclaw.plugin.json) which is appropriate for the stated purpose.
Instruction Scope
SKILL.md and skills/sentry/SKILL.md limit runtime behavior to calling the registered sentry_* tools and configuring the plugin with an auth token and optional baseUrl/defaults. There are no instructions to read arbitrary local files, environment variables outside the plugin config, or to transmit data to endpoints other than the configured Sentry API base URL.
Install Mechanism
The registry contains only source and build scripts (npm/tsc). There is no external download URL or extract step; dependencies are standard (openclaw, @sinclair/typebox). The repo provides build/test guidance but no surprising install mechanism.
Credentials
The plugin requires a single credential (Sentry authToken) via plugin config (openclaw.plugin.json enforces it). This is proportional for listing organizations/projects and reading issues. No other secrets/config paths are requested.
Persistence & Privilege
Flags are default: always: false, user-invocable: true, disable-model-invocation: false. The plugin registers its own tools and uses its own pluginConfig; it does not request permanent always-on inclusion or modify other skills/configs.
Assessment
This plugin appears to be what it claims: it will call your Sentry API (default https://sentry.io or a self-hosted baseUrl) using the auth token you configure and return organization/project/issue data. Before installing: (1) only provide a Sentry token with the minimum read scopes recommended (org:read and event:read); avoid tokens with write or admin scopes; (2) verify you trust the plugin source/owner and consider reviewing the open-source files shown here (the code uses fetch with a Bearer header and throws if authToken is missing); (3) rotate or revoke the token if you later stop using the plugin; and (4) if you run plugins in a shared environment, confirm network egress to your Sentry endpoint is acceptable since the plugin will make outbound HTTP requests to the configured baseUrl.tests/e2e/sentry-plugin.e2e.test.ts:1
File read combined with network send (possible exfiltration).
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.Verification
{
"hasProvenance": false,
"scanStatus": "clean",
"scope": "artifact-only",
"sourceCommit": "2187ae0",
"sourceRepo": "clawic/plugins",
"sourceTag": "main",
"summary": "Validated package structure and linked the release to source metadata.",
"tier": "source-linked"
}Tags
{
"latest": "0.1.0"
}Sentry Plugin
Native OpenClaw plugin that adds Sentry triage workflows with:
- organization discovery for the authenticated token
- project listing within a Sentry organization
- issue search across an organization or one project
- full issue detail retrieval for debugging context
Install
npm install
npm run build
openclaw plugins install .
openclaw plugins enable sentry
openclaw gateway restart
Config
{
plugins: {
entries: {
sentry: {
enabled: true,
config: {
authToken: "YOUR_SENTRY_AUTH_TOKEN", // pragma: allowlist secret
baseUrl: "https://sentry.io",
defaultOrganizationSlug: "my-org",
defaultProjectSlug: "web-app",
},
},
},
},
}
Recommended token scopes:
org:readfor organization and project discoveryevent:readfor issue listing and retrieval
Tools
sentry_list_organizationssentry_list_projectssentry_list_issuessentry_get_issue
