Securie for Sentry — runtime exception correlation
roadmapLink Sentry errors to Securie findings. When a runtime exception indicates a potential security issue — SQL errors that look like injection attempts, auth failures spiking on a specific endpoint, 500s on routes Securie flagged — Securie correlates the Sentry event with its finding database and elevates it for investigation.
What it does
Correlates runtime errors in Sentry with security findings in Securie. A SQL error on `/api/orders/[id]` becomes interesting when Securie already flagged that route for BOLA. A spike in 401s on `/login` becomes a credential-stuffing signal. Sudden 500s on routes that handle secrets becomes a deserialization or injection signal. The correlation surface is where most intrusions first become visible in production logs.
When to use it
Best fit: teams already running Sentry in production and wanting better signal-to-noise for security-relevant errors. Also useful for post-incident review — the correlation graph helps reconstruct what happened and when.
Limitations
Roadmap. Requires a Sentry Team plan or higher (free tier doesn't expose the API). Correlation is probabilistic — not every flagged event is a real attack; tuning is required in the first weeks. Doesn't replace a SIEM for teams that need full log analysis.
Install
- Connect your Sentry API token in the Securie dashboard
- Grant read access to the Sentry projects you want correlated
- Securie subscribes to Sentry events matching security-relevant patterns
- Correlation findings appear in the Securie dashboard and (optionally) back in Sentry as tagged events