slack-explorer
Fail
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
extract-tokens.jsscript extracts sensitive Slack session tokens (xoxc) and cookies (xoxd) by accessing the macOS Keychain with thesecuritycommand and reading Slack's local application data files, including~/Library/Application Support/Slack/Cookiesandroot-state.json. - [COMMAND_EXECUTION]: The skill uses
execSyncto run several system binaries, includingsecurity,sqlite3,defaults,strings, andsw_vers. These are used to decrypt local databases and gather detailed system configuration to emulate a Slack desktop client. - [DATA_EXFILTRATION]: The skill automatically harvests credentials from the host system and prints them to the standard output. Additionally, it sends the decrypted session cookie to Slack's servers to obtain further authentication tokens, which is a pattern commonly used for automated account access.
- [PROMPT_INJECTION]: The skill ingests untrusted data in the form of Slack messages and thread replies through the
search,history, andrepliescommands. - Ingestion points: Slack message text and blocks retrieved via the Slack API (processed in
slack-client.js). - Boundary markers: None identified in the prompt templates or instructions; the agent is not instructed to ignore embedded instructions within retrieved messages.
- Capability inventory: The skill has
networkpermissions and the ability to execute shell commands viaexecSyncinextract-tokens.jsandslack.js. - Sanitization: There is no evidence of sanitization or filtering applied to message content before it is presented to the agent.
Recommendations
- AI detected serious security threats
Audit Metadata