Protect your Salesforce environment from SaaS Supply Chain Threats with Obsidian Security

SaaS Supply Chain Breaches Are Targeting Salesforce Data

Criminal groups like ShinyHunters are leveraging stolen OAuth tokens to compromise app-to-app integrations into Salesforce and steal sensitive customer data. These SaaS supply chain attacks can affect hundreds of organizations, because when a SaaS vendor is compromised, threat actors can exploit the direct connections customers make into their Salesforce environments to access data.

In August 2025, Salesforce breaches via the Salesloft–Drift integration impacted over 700 companies. In November 2025, attackers claim to have accessed roughly 285 additional Salesforce instances after compromising Gainsight, with stolen tokens and secrets from the earlier Salesloft–Drift supply-chain compromise.

Stop SaaS Supply Chain Breaches Before They Spread through Salesforce

Obsidian Security protects businesses from SaaS supply chain attacks targeting  Salesforce integrations with proactive visibility and management of app-to-app risk, and unique threat alerts built on real-world data.   

  • Find and score SaaS and AI integrations associated with Salesforce. Remove inactive connections to reduce risk across your environment.
  • Mitigate risks from unsecured and shadow SaaS applications connected to Salesforce by getting full visibility, enforcing least privilege, hardening configurations, and applying consistent security policies.
  • Spot abnormal activity across OAuth pathways into Salesforce in near real time, and use enriched, contextual alerts to accelerate investigation and remediation.
  • Leverage custom, proprietary IoCs and saved searches built into our threat models, informed by real-world supply-chain attacks

Salesforce Misconfigurations Leave Files, Users, and Tokens Exposed.

A shocking number of organizations are leaking private and sensitive information due to misconfigurations in Salesforce.

Obsidian Security makes it easy to identify publicly shared files and remediate misconfigurations.

Salesforce Misconfigurations Leave Files, Users, and Tokens Exposed

A shocking number of organizations are leaking private and sensitive information due to misconfigurations in Salesforce.

Obsidian Security makes it easy to identify publicly shared files and remediate misconfigurations.

50%

of organizations have local login enabled

Obsidian Network Data

82%

Of SFDC tenants have publicly-exposed files

Obsidian Network Data

200

organizations leaked private data via misconfigured SFDC accounts

KrebsOnSecurity

Teams lack the time and expertise to manually audit Salesforce

A ‘do-it-yourself’ approach to Salesforce security creates unmanageable complexity and misses critical gaps.

  • Struggle to correlate and standardize privileged accounts with User Profiles and Permission Sets across Salesforce tenants
  • Blind to undisclosed SaaS-to-Salesforce integrations and public links
  • No controls preventing unauthorized access via enabled but uninstalled Salesforce integrations that retain active OAuth tokens

Detect MFA bypass, public files, and excess permissions in Salesforce

  • Identify and reduce over-privileged users (ghost administrators)
  • Audit and remove dormant accounts across tenants to reduce attack surface
  • Identify publicly shared files lacking access controls (a common misconfiguration that risks data exfiltration)
  • Detect users that bypass MFA and directly login to your Salesforce URL

Mitigating Modern SaaS Threats in Salesforce with Obsidian

Salesforce empowers data innovation, but also introduces risks from excessive access and third-party code. Obsidian’s SaaS-native security stack continuously monitors token usage, enforces secure configurations, and delivers identity-aware detection to help organizations mitigate modern SaaS threats.