SlackPirate icon indicating copy to clipboard operation
SlackPirate copied to clipboard

[Enhancement] Use this to add/vote for new data sources/scans

Open emtunc opened this issue 6 years ago • 8 comments

Let's use this ticket to add and vote on new scan types and data sources that can be added to the tool.

Most voted comments are prioritised first.

emtunc avatar Jan 10 '19 00:01 emtunc

Slack tokens - look for Slack tokens that may have been leaked within a Slack Workspace. This could allow an attacker to pivot to a more privileged user or someone whose account can be used to phish other users for example.

emtunc avatar Jan 10 '19 00:01 emtunc

Github tokens - unless there's a unique way to differentiate these from other 40 character strings then this might introduce some false positives. Worth a try though.

emtunc avatar Jan 10 '19 00:01 emtunc

Azure secret keys

emtunc avatar Jan 10 '19 00:01 emtunc

Google Cloud Platform secret keys

emtunc avatar Jan 10 '19 00:01 emtunc

Password and/or tokens in URLs

emtunc avatar Jan 10 '19 00:01 emtunc

Pull the content of pinned items in each channel. Often times these are solutions for recurring problems within a team ("what was the GOCD login?", "Where are the Chef credentials?")

ghost avatar Jan 10 '19 00:01 ghost

API Reference for listing pinned items: https://api.slack.com/methods/pins.list

May also require listing channels (https://api.slack.com/methods/channels.list) as the channel with the pinned items must be specified

ghost avatar Jan 11 '19 01:01 ghost

API Reference for listing pinned items: https://api.slack.com/methods/pins.list

May also require listing channels (https://api.slack.com/methods/channels.list) as the channel with the pinned items must be specified

This has been implemented in #https://github.com/emtunc/SlackPirate/commit/4c28dafbc89abf35d04a313ee53970cbf9f0a503

emtunc avatar Jan 14 '19 10:01 emtunc