当前位置:首页 >新聞中心 >【】

【】

2024-12-22 13:09:56 [焦點] 来源:有聲有色網

If you perform a very specific query in the search field of online code repository Github, where many Slack bot projects are stored, you can get info that potentially lets you access a trove of corporate data, including companies' internal chats and files. 

This is because a lot of Slack bot developers -- and there are a lot of them, since building a Slack bot is quite easy -- included their Slack tokens (personal Slack account credentials) directly in the code, which they share publicly on Github. 

SEE ALSO:How do I make Slack apps?

The issue was discovered by security company Detectify, which notified Slack about it on March 26. Detectify managed to find "thousands" of such tokens with a simple GitHub search. The story was first reported by Quartz.

Tokens of all types aren't uncommon on GitHub, but the problem is made worse by the way Slack tokens are constructed. In case of private tokens and custom bot tokens, they're a string of characters using these formats:

xoxp-XXXXXXXXX-XXXXXXXXXXXXXXXXXXX

xoxb-XXXXXXXXX-XXXXXXXXX-XXXXXXXXX-XXXXXX

Simply searching for the four letter prefixes on GitHub will net you a lot of tokens in plain text, which we were able to replicate.

If you've never built anything on the Slack platform, you may think this doesn't affect you, and in many cases that's true. But in larger business organizations, it's quite possible that some team member had built a Slack bot and inadvertently revealed their Slack token, potentially exposing company data. 

Outsiders can easily gain access to internal chat conversations, shared files, direct messages and even passwords.

"Using the tokens it’s possible to eavesdrop on a company. Outsiders can easily gain access to internal chat conversations, shared files, direct messages and even passwords to other services if these have been shared on Slack," writes Detectify.

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

The researchers at Detectify have found tokens belonging to Fortune 500 companies, payment providers, Internet service providers health care providers, advertising agencies, university classes and newspapers, among other organizations. And using those tokens, they revealed database credentials, private messages and login details for other services. 

The good news is the problem has largely already been fixed. Slack responded to the problem, telling Detectify they've “revoked the tokens you reported, notified affected users and team owners directly, and that we’ll be doing that proactively going forward”.

In other words, if someone makes the same mistake again, Slack will disable the tokens and warn them -- as seen in the message Slack recently started sending to some developers. 

Developers, in general, should take care not to place tokens directly in the code and use environment variables instead. Slack admins can make sure only Team Owners and selected Slack members can create tokens and integrations; the option is in Slack's Admin Settings. 

Mashablehas contacted Slack about the issue. "Slack is clear and specific that tokens should be treated just like passwords. We warn developers when they generate a token never to share it with other users or applications," a Slack spokesperson said in an email.

According to the spokesperson, Slack will continue to improve its documentation and communications to make sure developers understand this.

"For privacy reasons, we are not sharing information about the teams impacted, however, all of the reported tokens were disabled, as well as others we proactively found. We notified both the users who created the tokens, as well as the owners of affected teams," she wrote.

A popular platform for corporate communication (disclosure: We use Slack at Mashable), Slack boasted more than 2.3 million daily active users in February.

Have something to add to this story? Share it in the comments.


(责任编辑:娛樂)

    推荐文章
    • Fyvush Finkel, Emmy winner for 'Picket Fences,' dies at 93

      Fyvush Finkel, Emmy winner for 'Picket Fences,' dies at 93NEW YORK (AP) — Actor Fyvush Finkel, the plastic-faced Emmy Award-winning character actor whos ...[详细]
    • 勃起後容易疲軟怎麽治療

      勃起後容易疲軟怎麽治療勃起後容易疲軟是什麽原因?首先,這種情況被認為是腎虛的典型表現 ,需要積極和詳細的檢查 。確認診斷後 ,可以積極進行藥物治療,以達到良好的治療效果。此外  ,還需要調整心態,不要有太大的心理壓力。然後記得多鍛煉 ...[详细]
    • 一到晚上胸悶氣短心慌

      一到晚上胸悶氣短心慌有許多人會有一到晚上就胸悶氣短心慌的這麽一種情況,出現這種情況有很大可能是因為人體心髒部分的疾病從而引起的、也有可能是因為人們的肺部出現有什麽問題而引起的 。麵對這種病症需要人們格外注重以免其以後引起什 ...[详细]
    • 氣血虧虛吃什麽補的快

      氣血虧虛吃什麽補的快女性因為月經的關係 ,大部分都是貧血的情況 ,所以平時吃一些能夠補血益氣的食物能夠讓女性的狀態調理的越來越好 ,很多麵部紅潤有光澤的女性都是因為氣血充足的原因 。如果氣血虧虛吃什麽補的快呢?補血補氣的食物有很 ...[详细]
    • This app is giving streaming TV news a second try

      This app is giving streaming TV news a second tryWatchup, the once-buzzy news video streaming service, is trying its hand again at the news game with ...[详细]
    • Reports of unresponsive Samsung Galaxy phones pile up after big AI update

      Reports of unresponsive Samsung Galaxy phones pile up after big AI updateSamsung Galaxy users are on Reddit and the Samsung Community forum posting complaints about their de ...[详细]
    • 檢查發現胎兒左心室有強光點是怎麽回事

      檢查發現胎兒左心室有強光點是怎麽回事女性懷孕了之後對於自己腹中的胎兒想必是格外注重的 ,為了了解胎兒的身體發育狀況或者是身體健康狀況等等都會選擇各種各樣的方式來檢查 。有一些女性在檢查的時候會發現胎兒左心室有強光點的這種情況 ,出現這種情況可 ...[详细]
    • 驢肉和什麽一起燉最好

      驢肉和什麽一起燉最好很多人雖然喜歡吃驢肉,但是並沒有掌握對驢肉的烹飪方法,所以很多的時候隻能到飯店當中進行品嚐了 。任何食物 ,都有最適合的搭配和烹飪 ,簡單的學習一下 ,就可以掌握。而且 ,每個人都有各自的飲食習慣 ,根據自己口味 ...[详细]
    • Major earthquake and multiple aftershocks rock central Italy

      Major earthquake and multiple aftershocks rock central ItalyUPDATE: Aug. 25, 2016, 8:22 a.m. BST 。 Death toll is now at least 247 dead: 190 in Rieti province and ...[详细]
    • 勃起後容易疲軟怎麽治療

      勃起後容易疲軟怎麽治療勃起後容易疲軟是什麽原因?首先 ,這種情況被認為是腎虛的典型表現 ,需要積極和詳細的檢查 。確認診斷後 ,可以積極進行藥物治療,以達到良好的治療效果。此外,還需要調整心態,不要有太大的心理壓力。然後記得多鍛煉 ...[详细]
    热点阅读