Affected MCP server: https://github.com/modelcontextprotocol/servers-archived/tree/main/src/slack
Slack MCP Server allows users to query messages and documents across public and private channels. An attacker can exploit prompt injection by posting a malicious instruction in a public channel. When a victim queries Slack MCP Server for sensitive data (e.g., an API key) that exists in their private channel, the LLM may follow the attacker's instruction and exfiltrate the private data, even though the attacker is not a member of the private channel.
Prompt injection in Slack MCP Server can allow attackers to exfiltrate sensitive data from private channels, even if they are not a member, by leveraging the LLM's inability to distinguish between trusted and untrusted context.