时间:2025-06-17 17:23:48 来源:网络整理编辑:新聞中心
If you perform a very specific query in the search field of online code repository Github, where man
If you perform a very specific query in the search field of online code repository Github, where many Slack bot projects are stored, you can get info that potentially lets you access a trove of corporate data, including companies' internal chats and files.
This is because a lot of Slack bot developers -- and there are a lot of them, since building a Slack bot is quite easy -- included their Slack tokens (personal Slack account credentials) directly in the code, which they share publicly on Github.
SEE ALSO:How do I make Slack apps?The issue was discovered by security company Detectify, which notified Slack about it on March 26. Detectify managed to find "thousands" of such tokens with a simple GitHub search. The story was first reported by Quartz.
Tokens of all types aren't uncommon on GitHub, but the problem is made worse by the way Slack tokens are constructed. In case of private tokens and custom bot tokens, they're a string of characters using these formats:
xoxp-XXXXXXXXX-XXXXXXXXXXXXXXXXXXX
xoxb-XXXXXXXXX-XXXXXXXXX-XXXXXXXXX-XXXXXX
Simply searching for the four letter prefixes on GitHub will net you a lot of tokens in plain text, which we were able to replicate.
If you've never built anything on the Slack platform, you may think this doesn't affect you, and in many cases that's true. But in larger business organizations, it's quite possible that some team member had built a Slack bot and inadvertently revealed their Slack token, potentially exposing company data.
Outsiders can easily gain access to internal chat conversations, shared files, direct messages and even passwords.
"Using the tokens it’s possible to eavesdrop on a company. Outsiders can easily gain access to internal chat conversations, shared files, direct messages and even passwords to other services if these have been shared on Slack," writes Detectify.
The researchers at Detectify have found tokens belonging to Fortune 500 companies, payment providers, Internet service providers health care providers, advertising agencies, university classes and newspapers, among other organizations. And using those tokens, they revealed database credentials, private messages and login details for other services.
The good news is the problem has largely already been fixed. Slack responded to the problem, telling Detectify they've “revoked the tokens you reported, notified affected users and team owners directly, and that we’ll be doing that proactively going forward”.
In other words, if someone makes the same mistake again, Slack will disable the tokens and warn them -- as seen in the message Slack recently started sending to some developers.
Developers, in general, should take care not to place tokens directly in the code and use environment variables instead. Slack admins can make sure only Team Owners and selected Slack members can create tokens and integrations; the option is in Slack's Admin Settings.
Mashablehas contacted Slack about the issue. "Slack is clear and specific that tokens should be treated just like passwords. We warn developers when they generate a token never to share it with other users or applications," a Slack spokesperson said in an email.
According to the spokesperson, Slack will continue to improve its documentation and communications to make sure developers understand this.
"For privacy reasons, we are not sharing information about the teams impacted, however, all of the reported tokens were disabled, as well as others we proactively found. We notified both the users who created the tokens, as well as the owners of affected teams," she wrote.
A popular platform for corporate communication (disclosure: We use Slack at Mashable), Slack boasted more than 2.3 million daily active users in February.
Have something to add to this story? Share it in the comments.
Give your kitchen sponge a rest on this adorable bed2025-06-17 17:23
韓媒:中國女足是一個難纏的對手 但她們踢了加時體能消耗大2025-06-17 17:21
熱議中國女足殺入亞洲杯決賽 :謝謝姑娘們再一次拯救了整個行業2025-06-17 17:17
利物浦受製本土名單僅剩23席 克洛普根本沒在怕的2025-06-17 16:19
Cat gets stuck in the most awkward position ever2025-06-17 16:12
國足淩晨回國繼續封閉訓練 李霄鵬團隊暫無下課之虞2025-06-17 16:01
水慶霞 :我們找回了鏗鏘玫瑰的精神 這就是重新起航2025-06-17 15:35
過於搞笑!非洲杯兩球員滑稽失誤 送馬內單刀破門2025-06-17 15:10
Here's what 'Game of Thrones' actors get up to between takes2025-06-17 15:00
登貝萊解封或首發出戰馬競 難了!切爾西看不上他2025-06-17 14:38
Satisfy your Olympics withdrawals with Nike's latest app2025-06-17 17:03
中紀委發文 :像女足一樣無畏風雪 、勇毅前行2025-06-17 17:00
家鄉要為梅西造雕像 !已開旅遊專線 妥妥吸金利器2025-06-17 16:25
鏗鏘玫瑰!中國女足絕不言棄 水家軍送上最好的春節禮物2025-06-17 15:58
There's a big piece of fake chicken stuck to this phone case2025-06-17 15:53
曝大阪櫻花接近簽回申花外援約尼奇 日媒:轉會費基本談妥2025-06-17 15:52
林皇無緣曼聯名單!朗尼克稱其需清醒 遭憤怒回懟2025-06-17 15:51
穆帥裏程碑之夜怒噴裁判:已經變味了 這不是足球2025-06-17 15:49
WhatsApp announces plans to share user data with Facebook2025-06-17 15:27
水慶霞:王霜能否踢決賽再看 韓國隊這幾年進步很大2025-06-17 15:01