Slack Token exposed over internet (Github)
None
Vulnerability Details
> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to verify and then potentially issue a bounty, so be sure to take your time filling out the report!
**Summary:** Slack token is exposed in public github repositoty
**Description:** [This file](https://github.com/RocketChat/RCMarkdownParser/blob/1b8a052bcd38bcf459ecb6bb644daa7d70769434/.travis.yml) on one of your github repos contains a Slack token for the RocketChat account.
As noted in the official documentation, if this is to be published, it should be encrypted, which isn't the case here.
## Releases Affected:
RCMarkdownParser file on the latest github master branch
## Steps To Reproduce (from initial installation to vulnerability):
(Add details for how we can reproduce the issue)
1. Go to https://github.com/RocketChat/RCMarkdownParser/blob/1b8a052bcd38bcf459ecb6bb644daa7d70769434/.travis.yml
2. Notice the slack token present which can be used to access the account and communications.
## Supporting Material/References:
Screenshot attached.
## Suggested mitigation
Remove the slack token from the repo and also from the history
## Impact
The token can be used to control the account and read internal communications.
Actions
View on HackerOneReport Stats
- Report ID: 386614
- State: Closed
- Substate: resolved
- Upvotes: 14