This project uses Slack browser session tokens (xoxc- and xoxd-) which provide full access to your Slack workspace. Please understand the security implications:
- Never share your tokens - They provide the same access as your Slack login
- Tokens are stored locally with restricted permissions (
chmod 600) - macOS Keychain provides encrypted storage when available
- Tokens expire every 1-2 weeks, limiting exposure window
- The web server binds to
localhostonly by default - API keys are required for web server access
- Never expose the web server to the public internet
| Version | Supported |
|---|---|
| 4.0.x | ✅ |
| 3.2.x | ✅ |
| < 3.2 | ❌ |
If you discover a security vulnerability, please report it responsibly:
- Do NOT open a public issue
- Email the details to the maintainer privately
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment within 48 hours
- Status update within 7 days
- Credit in the security advisory (if desired)
When using this project:
- Keep tokens private - Never commit them to version control
- Use token auto-refresh - Limits exposure of stale tokens
- Monitor access - Check Slack's "Access Logs" periodically
- Limit scope - Only use in trusted environments
- Keep updated - Install security updates promptly
We follow responsible disclosure:
- Reporter notifies maintainer privately
- Maintainer confirms and assesses severity
- Fix is developed and tested
- Security advisory is published with fix
- Reporter is credited (if desired)
- This project accesses Slack's Web API using browser session credentials
- Tokens may be invalidated by Slack at any time
- Token access scope matches the user's existing Slack access
- Not affiliated with or endorsed by Slack Technologies