时间:2026-04-08 10:57:18 来源:网络整理编辑:新聞中心
If you perform a very specific query in the search field of online code repository Github, where man
If you perform a very specific query in the search field of online code repository Github, where many Slack bot projects are stored, you can get info that potentially lets you access a trove of corporate data, including companies' internal chats and files.
This is because a lot of Slack bot developers -- and there are a lot of them, since building a Slack bot is quite easy -- included their Slack tokens (personal Slack account credentials) directly in the code, which they share publicly on Github.
SEE ALSO:How do I make Slack apps?The issue was discovered by security company Detectify, which notified Slack about it on March 26. Detectify managed to find "thousands" of such tokens with a simple GitHub search. The story was first reported by Quartz.
Tokens of all types aren't uncommon on GitHub, but the problem is made worse by the way Slack tokens are constructed. In case of private tokens and custom bot tokens, they're a string of characters using these formats:
xoxp-XXXXXXXXX-XXXXXXXXXXXXXXXXXXX
xoxb-XXXXXXXXX-XXXXXXXXX-XXXXXXXXX-XXXXXX
Simply searching for the four letter prefixes on GitHub will net you a lot of tokens in plain text, which we were able to replicate.
If you've never built anything on the Slack platform, you may think this doesn't affect you, and in many cases that's true. But in larger business organizations, it's quite possible that some team member had built a Slack bot and inadvertently revealed their Slack token, potentially exposing company data.
Outsiders can easily gain access to internal chat conversations, shared files, direct messages and even passwords.
"Using the tokens it’s possible to eavesdrop on a company. Outsiders can easily gain access to internal chat conversations, shared files, direct messages and even passwords to other services if these have been shared on Slack," writes Detectify.
The researchers at Detectify have found tokens belonging to Fortune 500 companies, payment providers, Internet service providers health care providers, advertising agencies, university classes and newspapers, among other organizations. And using those tokens, they revealed database credentials, private messages and login details for other services.
The good news is the problem has largely already been fixed. Slack responded to the problem, telling Detectify they've “revoked the tokens you reported, notified affected users and team owners directly, and that we’ll be doing that proactively going forward”.
In other words, if someone makes the same mistake again, Slack will disable the tokens and warn them -- as seen in the message Slack recently started sending to some developers.
Developers, in general, should take care not to place tokens directly in the code and use environment variables instead. Slack admins can make sure only Team Owners and selected Slack members can create tokens and integrations; the option is in Slack's Admin Settings.
Mashablehas contacted Slack about the issue. "Slack is clear and specific that tokens should be treated just like passwords. We warn developers when they generate a token never to share it with other users or applications," a Slack spokesperson said in an email.
According to the spokesperson, Slack will continue to improve its documentation and communications to make sure developers understand this.
"For privacy reasons, we are not sharing information about the teams impacted, however, all of the reported tokens were disabled, as well as others we proactively found. We notified both the users who created the tokens, as well as the owners of affected teams," she wrote.
A popular platform for corporate communication (disclosure: We use Slack at Mashable), Slack boasted more than 2.3 million daily active users in February.
Have something to add to this story? Share it in the comments.
Katy Perry talks 'Rise,' her next batch of songs, and how to survive Twitter2026-04-08 10:47
費萊尼未參加泰山有球訓練 大概率缺席次回合戰武漢2026-04-08 10:39
粵媒:足協或開通教練培訓綠色通道 鄭智等球員可直接考試2026-04-08 10:19
曼城點球戰失利五連冠偉業夢碎 破解大巴仍是難題2026-04-08 10:17
Man stumbles upon his phone background in real life2026-04-08 10:16
西班牙人前瞻:表現平淡+缺乏信任 武磊難獲首發2026-04-08 09:31
安切洛蒂 :阿紮爾已經能出場了 但我更喜歡用其他人2026-04-08 09:24
國足戰阿曼決定兩隊最終走向 12月中超大概率推遲2026-04-08 09:19
Ivanka Trump's unpaid interns share cringeworthy financial advice2026-04-08 08:56
曝安切洛蒂賽後鼓勵科曼 :帶巴薩很難 但你要堅持2026-04-08 08:41
Tourist survives for month in frozen New Zealand wilderness after partner dies2026-04-08 10:41
殺人誅心!尤文補時遭讀秒絕殺 對手模仿C羅慶祝2026-04-08 10:36
河北隊國腳尹鴻博:希望球隊可以盡快渡過難關!2026-04-08 10:32
尤文VS薩索洛首發 :迪巴拉領銜 莫拉塔基耶薩出戰2026-04-08 10:06
This weird squid looks like it has googly eyes, guys2026-04-08 09:53
尤文VS薩索洛首發 :迪巴拉領銜 莫拉塔基耶薩出戰2026-04-08 09:37
這也能卷 ?!回聲報 :利物浦新帥已圈定 不像曼聯無頭蒼蠅2026-04-08 09:30
國米輕取升班馬終結不勝尷尬 衛冕路上緊追同城死敵2026-04-08 09:13
Darth Vader is back. Why do we still care?2026-04-08 08:59
申花主帥 :第二回合才是真正決戰 不會擺出死守姿態2026-04-08 08:54