| Version | Supported |
|---|---|
| 1.x.x | ✅ |
| < 1.0 | ❌ |
This application handles sensitive Slack API tokens. Please ensure:
- Never commit tokens - Use
.envfiles (gitignored) or environment variables - Rotate compromised tokens - If tokens are exposed, regenerate them immediately in Slack admin
- Limit token scopes - Only request necessary OAuth scopes
- Use secure storage - In production, use secrets managers (AWS Secrets Manager, HashiCorp Vault, etc.)
- Localhost by default - The bridge communicates with AI Maestro on localhost
- No external exposure - The Slack connection uses Socket Mode (outbound only), no webhook endpoints needed
- TLS for production - If exposing AI Maestro externally, always use HTTPS
- Slack workspace isolation - Messages are scoped to your Slack workspace
- Agent routing validation - Only agents registered in AI Maestro can be messaged
- No credential forwarding - Slack tokens are never sent to AI Maestro agents
We take security seriously. If you discover a security vulnerability, please:
- Do NOT open a public issue
- Email: security@23blocks.com (or contact maintainers privately)
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial assessment: Within 1 week
- Fix timeline: Depends on severity (critical: 24-72 hours, high: 1-2 weeks)
- We follow responsible disclosure practices
- Security fixes are released before public disclosure
- Credit given to reporters (unless anonymity requested)
- Tokens stored in environment variables or secrets manager
-
.envfile has restricted permissions (chmod 600) - PM2 or systemd configured with non-root user
- Logs don't contain sensitive data
- Regular token rotation schedule established
- Monitoring for unusual activity
The app only needs these scopes:
app_mentions:read- Receive @mentionschannels:history- Read channel messages (for context)chat:write- Send responsesim:history,im:read,im:write- Handle DMsusers:read- Get user display names
Avoid requesting additional scopes unless necessary.
Security updates are announced via:
- GitHub Security Advisories
- Release notes
Subscribe to releases to stay informed.