How to Share Secrets Securely on Slack (Without Leaking Them)
Pasting passwords in Slack creates a permanent security risk. Learn the secure way to share sensitive credentials with your team using ephemeral links.
"Can you Slack me the database password?"
It's a common request, but replying with the password itself is a security mistake. Slack retains message history, meaning that password now lives forever in:
- Chat Logs: Searchable by anyone in the channel.
- Notification Previews: Visible on lock screens.
- Third-Party Apps: Scraped by any bot with
historypermissions. - Admin Exports: Visible during compliance audits or eDiscovery.
Here is the secure workflow for sharing credentials on Slack.
The Right Way: Use an Ephemeral Link
Instead of sending the secret, send a key to the secret that works only once.
Step 1: Encrypt the Secret
Go to SnapPwd.io. Paste the password, API key, or sensitive note into the secure text area.
Step 2: Generate a One-Time Link
Click Encrypt. This happens entirely in your browser using AES-GCM encryption. The server never sees the raw secret.
Step 3: Share on Slack
Copy the generated link (e.g., snappwd.io/v1/...) and paste it into your Slack conversation.
"Here is the credential: [link]"
Step 4: Verification (Optional)
Once your teammate clicks the link, the secret is revealed to them and immediately deleted from the server. If anyone else (or a bot) tries to click it later, they will see a "Secret not found" message.
Why This Works
By decoupling the secret from the delivery channel (Slack), you ensure that Slack never holds the sensitive data. Even if your Slack workspace is compromised years later, the attacker will only find dead links.
Pro Tip: Using the CLI
For developers who live in the terminal, you can do this without leaving your workflow:
# Install the CLI
npm install -g snappwd-cli
# Pipe your secret to Slack
echo "my-super-secret-password" | snappwd | pbcopy
Then just Cmd+V into Slack.
Your Secure Link is Ready
This link will expire in 1 hour
Read Next
Do Link Scanners Burn One-Time Secret Links?
A practical research report on how link previews, Safe Links, and automated URL scanning can accidentally consume one-time secret links, plus a reproducible test protocol and defensive design guidance.
One-Time Secret Security Benchmark: 9 Tools Tested (2026)
A source-backed benchmark of SnapPwd, 1Password Item Sharing, Bitwarden Send, OneTimeSecret, Password Pusher, PrivateBin, Yopass, Cryptgeon, and scrt.link across encryption model, expiration controls, account friction, file support, self-hosting, and web hardening.