What Happened
In March 2026, a data breach exposed Drift customer conversation data due to improper API scope management in their Salesforce CRM integration. The issue: conversation data flowing into CRM without sufficient isolation. An attacker with Salesforce access gained access to full conversation transcripts, customer information, and sensitive discussions. This is not a Drift-specific problem. It is a chat-to-CRM integration problem.
The Technical Problem
Chat platforms connect to CRM to log conversations and enrich lead records. The integration requires read-write access to CRM APIs. Without granular scope controls, a breach in one system leaks into the other. OAuth scope creep is the culprit: asking for broad permissions and never reducing them.
How to Protect Yourself
1. Audit Your OAuth Scopes
Request only the minimum permissions your integration needs. Read-only for contact lookup. Write-only for logging conversations. Never request broad "read-write all contacts" permissions.
2. Implement Data Isolation
Conversations and contact records should flow through separate API channels. A breach in one should not expose the other.
3. Monitor Token Lifecycle
OAuth tokens should have expiration dates. Implement rotation schedules. Revoke tokens immediately when integrations change.
What Vurbalize Does Differently
Vurbalize implements:
- Granular OAuth scopes: No broad permissions. Each integration requests only what it needs.
- Data isolation: Conversation data and CRM data flow separately. A breach in one does not expose the other.
- Token rotation: Automatic expiration and refresh. No dormant long-lived tokens.
- Audit logging: Every API access is logged. Security teams can detect unusual access patterns.
- Transparent permissions: Customers see exactly what scopes are requested and can approve or deny individually.
Sources
- Public reporting on Drift/Salesloft OAuth breach, August 2025
- Google Threat Intelligence reporting, August 2025
- Salesforce AppExchange removal notice, August 2025
- Internal analysis: single-tenant architecture, OAuth scope analysis