正式なドキュメントは英語版であり、この日本語訳はAI支援翻訳により作成された参考用のものです。日本語訳の一部の内容は人間によるレビューがまだ行われていないため、翻訳のタイミングにより英語版との間に差異が生じることがあります。最新かつ正確な情報については、英語版をご参照ください。

Exposure of confidential secret or token Slack app level token

Description

The response body contains content that matches the pattern of a Slack app level token was identified. App level tokens are for use with Slack apps but only with specific APIs, which are related to the app across all organizations where the app is installed.

Three scope levels can be assigned:

  • connections:write: Route your app’s interactions and event payloads over WebSockets
  • authorizations:read: View information about your app’s authorizations on installed teams
  • app_configurations:write: Configure your application

A malicious actor with access to this token is granted one or more of the above permissions to access the API with for a specific application.

Exposing this value could allow attackers to gain access to all resources granted by this token.

Remediation

For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on Credential exposure to the internet.

To revoke a Slack app level token:

  • Sign in to Slack and access https://api.slack.com/apps
  • Find the application with the identified token and select the name
  • In the left-hand menu, select “Basic Information”
  • Scroll down to the “App-Level Tokens” section and select the token name of the identified token
  • In the token dialog, select “Revoke”
  • When prompted, select “Yes, I’m sure” in the “Are you sure?” dialog

Details

IDAggregatedCWETypeRisk
798.172false798PassiveHigh