Supply ChainPublished Apr 2, 2026

Skill exfiltrates contents of ~/Library/Application Support/Slack

LowAARM tierConfirmed
Seen14times across3customers
jiffy-ti-2026-000022

Summary

Skill reads the local Slack desktop cache directory, which may contain message previews, workspace metadata, and (depending on Slack version) encrypted-at-rest message content. Data is staged into a tarball and uploaded.

Severity & confidence

Severity
Low

Low

Hygiene-grade issue with limited direct impact. Fix opportunistically; monitor in case context changes (new exploit, new dependency, etc.).

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • (?:~/|/Users/[^/]+/)Library/Application\s+Support/Slack/

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000022
{
    meta:
        source = "jiffy-intel"
        severity = "low"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $file_path_pattern_0 = "(?:~/|/Users/[^/]+/)Library/Application\\s+Support/Slack/"
    condition:
        $file_path_pattern_0
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Claude Code*vulnerable
Claude Desktop*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • meeting-prep-skillSkill
    Removed
    Source
    Anthropic Skills
    Versions
    1.0.0
    First observed
    Mar 23, 2026
    Last observed
    Apr 12, 2026
  • team-pulse-skillSkill
    Quarantined
    Source
    Community registry
    Versions
    0.6.0
    First observed
    Mar 27, 2026

How to remediate

  1. 01Rotate Slack session tokens for exposed users.
  2. 02Reject skills that access third-party app support directories.

Timeline & sources

Timeline

  1. First observedMar 23, 202625 days ago
  2. Last updatedApr 24, 2026today
  3. PublishedApr 2, 202615 days ago

Sources

scanner

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan