Skip to main content

Invite Takumi to Slack

info

The English user guide is currently in beta preview. Most of the documents have been automatically translated from the Japanese version. Should you find any inaccuracies, please reach out to Flatt Security.

info

This feature is currently available only to selected organizations.

What is Takumi

takumi Takumi is an AI agent built to support human product engineers and security engineers. It identifies and fixes vulnerabilities, triages findings, and assists with secure design — all within your Slack workspace.

info

If you don't use Slack, please check out How to chat with Takumi in Shisho Cloud byGMO.

Required Settings to Invite Takumi to Slack

takumi

To enable Takumi to assess private repositories on GitHub via Slack, you need "Slack Integration" and "GitHub Integration" in the "Settings > Integrations" tab, and then set up data scope per Slack channel (/takumi-scopes).

1. How to Set Up Slack Integration

Settings in Shisho Cloud byGMO

Takumi needs to be invited to your Slack workspace as a Slack App. You can connect your Slack workspace under "Settings > Integrations > Takumi Integration":

Set up a new slack workspace

Click on "Set up a new Slack workspace" to be redirected to a screen provided by Slack. Review the details carefully and click "Allow":

Permission Request Screen in Slack

After clicking, the connection between your Slack workspace and Shisho Cloud byGMO will be completed. If successful, the Slack workspace should appear as shown below:

Added a workspace in Shisho Cloud byGMO

warning

When performing this operation, approval from the Slack workspace owner may be required. In that case, please contact the Slack workspace owner and request approval for the Slack App.

After the Slack App integration is approved, please perform the Slack workspace and Shisho Cloud connection process again from the Shisho Cloud screen.

info

If you have issues with Slack integration, please check "About Slack Integration" or refer to the Slack Help Center.

2. How to Set Up GitHub Integration

When you connect Takumi to your GitHub organization, Takumi can assess private repositories as well. Please set up GitHub integration by referring to the "Integrations > GitHub" guide.

Once you've completed both Slack and GitHub integrations, add Takumi to your preferred channel and start requesting assessments!

3. How to Set Up data scope per Slack channel

After integrating your Slack and GitHub, the repository to request an assessment for must be included as the scope. Refer to the "Using Takumi Slack Commands" guide to add repositories to Takumi's scope.

How to Use Takumi

Get the Most Out of Takumi

Check the guide: Getting the Most Out of Takumi.

Stop Takumi's Task

If you type SLEEP, Takumi will pause the current task.

info

Takumi has ability to detect vulnerabilities with high accuracy through deep analysis. When investigating an entire repository, it may continue the investigation for several hours.

Optional Configuration Items

Takumi Configs

"Web Search Feature" Option

tip

We recommend turning OFF the "Web Search Feature" option.

When the "Web Search Feature" option is enabled, Takumi will flexibly search for information on the internet by operating a browser as needed during the audit process. By default, this is turned off, and Takumi will not operate a browser.

Reasons for Recommending Disabling This Option

Even with the "Web Search Feature" option turned OFF, Takumi can handle many security tasks. This is because Takumi is provided with safe access methods not only to the source code, but also to GitHub Issues, Pull Requests, vulnerability databases, and other sources.
The "Web Search Feature" is a means for having Takumi investigate sources other than these information sources.

For the following reasons, we recommend turning OFF Takumi's "Web Search Feature" option.

  1. Risk of information leakage due to Takumi's unexpected browser operations:
    With the "Web Search Feature", we cannot eliminate the possibility that Takumi might input your confidential information (code, prompts, etc.) or information derived from them to external sites through search queries or form inputs that may occur during browser operations.

    Note that when the "Web Search Feature" is off, the operations for accessing external information (similar to function calling / tool use) have limited access to the network; it is restricted to the scope where we can guarantee that the arguments of operations do not contain such confidential information (or information directly derived from them).1

  2. Impact on running time and credit consumption:
    When Takumi uses a browser during the audit process, the running time and credit consumption tend to increase. For tasks that can be accomplished even with the "Web Search Feature" turned off, keeping this option off can suppress these increases.

Footnotes

  1. For example, the "tool to get details from CVE ID" allows strict validation of arguments because the CVE ID format is restrictive. Also, the "tool to list known vulnerability information (CVE IDs, etc.) in dependencies" safely matches vulnerability databases with used packages within Takumi's execution environment. These tools access external information safely, and thus are provided to Takumi even when the "Web Search Feature" is off.