Skip to content

Comments

ci(fix-security-vulnerability): Use opus 4.6#19416

Merged
nicohrubec merged 1 commit intodevelopfrom
nh/security-action-opus
Feb 19, 2026
Merged

ci(fix-security-vulnerability): Use opus 4.6#19416
nicohrubec merged 1 commit intodevelopfrom
nh/security-action-opus

Conversation

@nicohrubec
Copy link
Member

@nicohrubec nicohrubec commented Feb 19, 2026

Maybe we need a smarter clanker

Closes #19417 (added automatically)

Copy link
Member

@andreiborza andreiborza left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

image

model: claude-opus-4-6
claude_args: |
--max-turns 20 --allowedTools "Bash(gh api repos/getsentry/sentry-javascript/dependabot/alerts/*),Bash(gh pr create *),Bash(gh issue create *),Bash(yarn why *),Bash(yarn install*),Bash(yarn dedupe-deps:*),Bash(npm view *),Bash(git checkout *),Bash(git add *),Bash(git commit *),Edit,Write"
--max-turns 20 --allowedTools "Bash(gh api *repos/getsentry/sentry-javascript/dependabot/alerts/*),Bash(gh pr create *),Bash(gh issue create *),Bash(yarn why *),Bash(yarn install*),Bash(yarn dedupe-deps:*),Bash(npm view *),Bash(git checkout *),Bash(git add *),Bash(git commit *),Edit,Write"
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bug: The allowedTools pattern for gh api includes an unintentional leading wildcard *, making it overly permissive and conflicting with explicit prompt instructions.
Severity: MEDIUM

Suggested Fix

Remove the leading wildcard * from the allowedTools pattern. The pattern should be Bash(gh api repos/getsentry/sentry-javascript/dependabot/alerts/*) to strictly enforce the intended command structure and prevent the use of forbidden flags.

Prompt for AI Agent
Review the code at the location below. A potential bug has been identified by an AI
agent.
Verify if this is a real issue. If it is, propose a fix; if not, explain why it's not
valid.

Location: .github/workflows/fix-security-vulnerability.yml#L56

Potential issue: In the `fix-security-vulnerability.yml` workflow, the `allowedTools`
pattern for `gh api` was changed to `Bash(gh api
*repos/getsentry/sentry-javascript/dependabot/alerts/*)`. The leading wildcard `*`
before `repos/` is likely unintentional and creates an overly permissive security rule.
This change allows the AI assistant to potentially bypass explicit instructions in the
prompt that forbid using flags like `--paginate`. While the prompt instructs the model
to use an exact command format, this technical loophole weakens the security boundary
intended to restrict the AI's actions.

Did we get this right? 👍 / 👎 to inform future reviews.

Copy link

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

Bugbot Autofix is OFF. To automatically fix reported issues with Cloud Agents, enable Autofix in the Cursor dashboard.

model: claude-opus-4-6
claude_args: |
--max-turns 20 --allowedTools "Bash(gh api repos/getsentry/sentry-javascript/dependabot/alerts/*),Bash(gh pr create *),Bash(gh issue create *),Bash(yarn why *),Bash(yarn install*),Bash(yarn dedupe-deps:*),Bash(npm view *),Bash(git checkout *),Bash(git add *),Bash(git commit *),Edit,Write"
--max-turns 20 --allowedTools "Bash(gh api *repos/getsentry/sentry-javascript/dependabot/alerts/*),Bash(gh pr create *),Bash(gh issue create *),Bash(yarn why *),Bash(yarn install*),Bash(yarn dedupe-deps:*),Bash(npm view *),Bash(git checkout *),Bash(git add *),Bash(git commit *),Edit,Write"
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overly permissive wildcard weakens security tool restriction

Medium Severity

The leading * wildcard in Bash(gh api *repos/getsentry/sentry-javascript/dependabot/alerts/*) allows arbitrary text before repos/, including CLI flags like --method PATCH. The SKILL.md teaches the agent to dismiss alerts via gh api --method PATCH repos/.../dependabot/alerts/<number>, which the original pattern blocked but the new pattern permits. This undermines the defense-in-depth for the prompt's "Do NOT dismiss any alerts" instruction. A narrower fix (e.g., adding a second pattern for /repos/...) would preserve least-privilege.

Fix in Cursor Fix in Web

Triggered by project rule: PR Review Guidelines for Cursor Bot

@github-actions
Copy link
Contributor

github-actions bot commented Feb 19, 2026

Codecov Results 📊


Generated by Codecov Action

@github-actions
Copy link
Contributor

Codecov Results 📊

22 passed | ⏭️ 8 skipped | Total: 30 | Pass Rate: 73.33% | Execution Time: 12.22s

All tests are passing successfully.


Generated by Codecov Action

@github-actions
Copy link
Contributor

Codecov Results 📊

23 passed | ⏭️ 7 skipped | Total: 30 | Pass Rate: 76.67% | Execution Time: 11.48s

All tests are passing successfully.


Generated by Codecov Action

@github-actions
Copy link
Contributor

size-limit report 📦

Path Size % Change Change
@sentry/browser 25.61 kB - -
@sentry/browser - with treeshaking flags 24.12 kB - -
@sentry/browser (incl. Tracing) 42.42 kB - -
@sentry/browser (incl. Tracing, Profiling) 47.08 kB - -
@sentry/browser (incl. Tracing, Replay) 81.24 kB - -
@sentry/browser (incl. Tracing, Replay) - with treeshaking flags 70.86 kB - -
@sentry/browser (incl. Tracing, Replay with Canvas) 85.93 kB - -
@sentry/browser (incl. Tracing, Replay, Feedback) 98.09 kB - -
@sentry/browser (incl. Feedback) 42.33 kB - -
@sentry/browser (incl. sendFeedback) 30.28 kB - -
@sentry/browser (incl. FeedbackAsync) 35.28 kB - -
@sentry/browser (incl. Metrics) 26.78 kB - -
@sentry/browser (incl. Logs) 26.92 kB - -
@sentry/browser (incl. Metrics & Logs) 27.6 kB - -
@sentry/react 27.37 kB - -
@sentry/react (incl. Tracing) 44.76 kB - -
@sentry/vue 30.06 kB - -
@sentry/vue (incl. Tracing) 44.26 kB - -
@sentry/svelte 25.64 kB - -
CDN Bundle 28.16 kB - -
CDN Bundle (incl. Tracing) 43.25 kB - -
CDN Bundle (incl. Logs, Metrics) 29 kB - -
CDN Bundle (incl. Tracing, Logs, Metrics) 44.09 kB - -
CDN Bundle (incl. Replay, Logs, Metrics) 68.08 kB - -
CDN Bundle (incl. Tracing, Replay) 80.12 kB - -
CDN Bundle (incl. Tracing, Replay, Logs, Metrics) 80.99 kB - -
CDN Bundle (incl. Tracing, Replay, Feedback) 85.56 kB - -
CDN Bundle (incl. Tracing, Replay, Feedback, Logs, Metrics) 86.46 kB - -
CDN Bundle - uncompressed 82.33 kB - -
CDN Bundle (incl. Tracing) - uncompressed 128.05 kB - -
CDN Bundle (incl. Logs, Metrics) - uncompressed 85.17 kB - -
CDN Bundle (incl. Tracing, Logs, Metrics) - uncompressed 130.88 kB - -
CDN Bundle (incl. Replay, Logs, Metrics) - uncompressed 208.83 kB - -
CDN Bundle (incl. Tracing, Replay) - uncompressed 244.93 kB - -
CDN Bundle (incl. Tracing, Replay, Logs, Metrics) - uncompressed 247.75 kB - -
CDN Bundle (incl. Tracing, Replay, Feedback) - uncompressed 257.73 kB - -
CDN Bundle (incl. Tracing, Replay, Feedback, Logs, Metrics) - uncompressed 260.54 kB - -
@sentry/nextjs (client) 47.17 kB - -
@sentry/sveltekit (client) 42.88 kB - -
@sentry/node-core 52.16 kB +0.02% +6 B 🔺
@sentry/node 166.53 kB +0.01% +8 B 🔺
@sentry/node - without tracing 93.95 kB +0.02% +12 B 🔺
@sentry/aws-serverless 109.45 kB +0.01% +8 B 🔺

View base workflow run

@github-actions
Copy link
Contributor

node-overhead report 🧳

Note: This is a synthetic benchmark with a minimal express app and does not necessarily reflect the real-world performance impact in an application.

Scenario Requests/s % of Baseline Prev. Requests/s Change %
GET Baseline 9,412 - 9,321 +1%
GET With Sentry 1,682 18% 1,707 -1%
GET With Sentry (error only) 6,234 66% 6,098 +2%
POST Baseline 1,196 - 1,188 +1%
POST With Sentry 612 51% 599 +2%
POST With Sentry (error only) 1,062 89% 1,054 +1%
MYSQL Baseline 3,333 - 3,238 +3%
MYSQL With Sentry 503 15% 475 +6%
MYSQL With Sentry (error only) 2,689 81% 2,655 +1%

View base workflow run

@nicohrubec nicohrubec merged commit 3cc0b1d into develop Feb 19, 2026
74 of 75 checks passed
@nicohrubec nicohrubec deleted the nh/security-action-opus branch February 19, 2026 14:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

ci(fix-security-vulnerability): Use opus 4.6

2 participants