Code PluginExecutes codesource-linked

Sentry

Native OpenClaw Sentry plugin for organization, project, and issue triage workflows

Community code plugin. Review compatibility and verification before install.
sentry · runtime id sentry
Install
openclaw plugins install clawhub:sentry
Latest Release
Version 0.1.0
Compatibility
{
  "builtWithOpenClawVersion": "2026.3.23-2",
  "pluginApiRange": ">=2026.3.23"
}
Capabilities
{
  "bundledSkills": [],
  "capabilityTags": [
    "executes-code"
  ],
  "channels": [],
  "commandNames": [],
  "configSchema": true,
  "configUiHints": false,
  "executesCode": true,
  "hooks": [],
  "httpRouteCount": 0,
  "materializesDependencies": false,
  "providers": [],
  "runtimeId": "sentry",
  "serviceNames": [],
  "setupEntry": false,
  "toolNames": []
}
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the implementation: code registers tools to list organizations, projects, issues and fetch issue details. There are no unrelated binaries or credentials requested; the plugin expects a Sentry authToken in its plugin config (declared in openclaw.plugin.json) which is appropriate for the stated purpose.
Instruction Scope
SKILL.md and skills/sentry/SKILL.md limit runtime behavior to calling the registered sentry_* tools and configuring the plugin with an auth token and optional baseUrl/defaults. There are no instructions to read arbitrary local files, environment variables outside the plugin config, or to transmit data to endpoints other than the configured Sentry API base URL.
Install Mechanism
The registry contains only source and build scripts (npm/tsc). There is no external download URL or extract step; dependencies are standard (openclaw, @sinclair/typebox). The repo provides build/test guidance but no surprising install mechanism.
Credentials
The plugin requires a single credential (Sentry authToken) via plugin config (openclaw.plugin.json enforces it). This is proportional for listing organizations/projects and reading issues. No other secrets/config paths are requested.
Persistence & Privilege
Flags are default: always: false, user-invocable: true, disable-model-invocation: false. The plugin registers its own tools and uses its own pluginConfig; it does not request permanent always-on inclusion or modify other skills/configs.
Assessment
This plugin appears to be what it claims: it will call your Sentry API (default https://sentry.io or a self-hosted baseUrl) using the auth token you configure and return organization/project/issue data. Before installing: (1) only provide a Sentry token with the minimum read scopes recommended (org:read and event:read); avoid tokens with write or admin scopes; (2) verify you trust the plugin source/owner and consider reviewing the open-source files shown here (the code uses fetch with a Bearer header and throws if authToken is missing); (3) rotate or revoke the token if you later stop using the plugin; and (4) if you run plugins in a shared environment, confirm network egress to your Sentry endpoint is acceptable since the plugin will make outbound HTTP requests to the configured baseUrl.
!
tests/e2e/sentry-plugin.e2e.test.ts:1
File read combined with network send (possible exfiltration).
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.
Verification
{
  "hasProvenance": false,
  "scanStatus": "clean",
  "scope": "artifact-only",
  "sourceCommit": "2187ae0",
  "sourceRepo": "clawic/plugins",
  "sourceTag": "main",
  "summary": "Validated package structure and linked the release to source metadata.",
  "tier": "source-linked"
}
Tags
{
  "latest": "0.1.0"
}

Sentry Plugin

Native OpenClaw plugin that adds Sentry triage workflows with:

  • organization discovery for the authenticated token
  • project listing within a Sentry organization
  • issue search across an organization or one project
  • full issue detail retrieval for debugging context

Install

npm install
npm run build
openclaw plugins install .
openclaw plugins enable sentry
openclaw gateway restart

Config

{
  plugins: {
    entries: {
      sentry: {
        enabled: true,
        config: {
          authToken: "YOUR_SENTRY_AUTH_TOKEN", // pragma: allowlist secret
          baseUrl: "https://sentry.io",
          defaultOrganizationSlug: "my-org",
          defaultProjectSlug: "web-app",
        },
      },
    },
  },
}

Recommended token scopes:

  • org:read for organization and project discovery
  • event:read for issue listing and retrieval

Tools

  • sentry_list_organizations
  • sentry_list_projects
  • sentry_list_issues
  • sentry_get_issue