Unfurling links in messages

As users post messages containing links into Slack, we attach previews, adding context and continuity to conversations.

Classic link unfurling is the default treatment for links posted into Slack. When a link is spotted, Slack crawls it and provides a preview. Slack app unfurling is a more customizable experience initiated when Slack recognizes a link associated with your app, then sends your Slack app a corresponding event.

Slack app unfurling

Teach links new tricks by using the Events API and Web API together. To begin, you'll need your very own Slack app.

While we'll provide explanation of each step, here's a glance at what the configuration and process of unfurling looks like for an app:

Diagram of an app unfurling a link
  1. Provide an inciting incident: have a user post a message containing a fully-qualified URL matching the registered domain.
  2. Your app will receive a link_shared event, giving your app the hints it needs to do its thing.
  3. Your app uses chat.unfurl to attach custom unfurling behavior to the original message. Like a cherry on top of an already special sundae, you can use blocks to make the message rich and interactive

Now we'll go into the details of each step, from configuring your app to contextualizing the link in conversation.

Configuring your app

To support custom app unfurling, your app needs to have the permissions to listen to links posted into Slack and unfurl those links.

Scopes and token types

Navigate to your app configuration and choose the OAuth & Permissions sidebar to select scopes.

  • links:read lets your app to read specific links that are posted into Slack.
  • links:write is the flip-side of the coin that gives your app permission to unfurl content associated with links.
A modern bot token is recommended for all link unfurling operations.


If you haven't already set up your app to support the Events API. After that, navigate to the Event Subscriptions sidebar.

  • Under Subscribe to bot events, add the link_shared event to receive information about links posted into Slack that are associated with your app.

  • The link_shared event will dispatch for all channels in each workspace it is installed in.

These events do not contain the message itself, but instead just the info about the message you need to provide it unfurl behavior: the message's ts value, the channel it appeared in, and which URLs it contained matching your registered domains.

Register your domain(s)

On the same Event Subscriptions page, click App unfurl domains near the bottom of the page. Your app can register up to five domains, and will only receive link_shared events for URLs that match your registered domains.

Adding or removing domains requires re-installation of your Slack app. Every time an app is installed, the installing user is agreeing to those specifically mentioned domains.

Each domain you register will be matched to URLs by a few heuristics:

  • Domains must have a TLD and cannot be a TLD alone (example.com and another.example.com are valid, example is not and nor is .com).
  • IP addresses are not domains and cannot be matched.
  • All additive subdomains and paths to the domain you provide will be considered matches.
  • By including a subdomain in your domain, you exclude the naked domain.
  • When users mention links to one of your domains, it must be fully qualified with a protocol (http:// or https://). Slack will not unfurl decidedly ambiguous domain and URL mentions.
  • The link_shared event is dispatched when a message posted includes a matching domain, with the exception of messages posted by classic Slack apps. Apps will also not receive link_shared events for their own messages. Refer to Quickstart: differences between classic and modern Slack apps for more information.
  • When users mention links and they contain an explicit port (like https://example.com:23/skidoo), Slack will still consider it a clean match to a registered example.com.
You should own these domains and if you don't, you must follow all the terms, conditions, rules, policies, proclamations, warnings, and edicts around a domain. Be courteous, kind, and helpful.

Be sure and leave out the protocol part of a URL when registering your domain. Discard any http:// or https:// or path or query string components, please.

Finally, Unicode domains are not supported.

Handling link_shared events

You've set everything up: your Slack app, the Events API, a link_shared event subscription, and you've registered your domain(s). You've installed your Slack app on a workspace, specifically requesting the scopes you needed and after you've registered your domains.

You have the knowledge. You have the back end. You have the power. You are ready to receive and react to link_shared event deliveries.

When a user shares a link in a channel that matches your criteria, you'll receive an event shaped like this:

    "token": "XXYYZZ",
    "team_id": "TXXXXXXXX",
    "api_app_id": "AXXXXXXXXX",
    "event": {
        "type": "link_shared",
        "channel": "Cxxxxxx",
        "is_bot_user_member": false,
        "user": "Uxxxxxxx",
        "message_ts": "123452389.9875",
        "unfurl_id": "C123456.123456789.987501.1b90fa1278528ce6e2f6c5c2bfa1abc9a41d57d02b29d173f40399c9ffdecf4b",
        "thread_ts": "123456621.1855",
        "source": "conversations_history",
        "links": [
                "domain": "example.com",
                "url": "https://example.com/12345"
                "domain": "example.com",
                "url": "https://example.com/67890"
                "domain": "another-example.com",
                "url": "https://yet.another-example.com/v/abcde"
    "type": "event_callback",
    "authed_users": [
    "event_id": "Ev08MFMKH6",
    "event_time": 123456789

For details on these fields, reference the link_shared event page.

Responding to link_shared events

Once you've received this event, you can decide what to do next.

Most likely, you'll use those url values within the event object to look up what to display to the user. Maybe you'll make an API call to another service. Maybe you'll just reference your app's own base of knowledge and never even hit another service at all.

Be sure and respond with a friendly HTTP 200 OK to the event as quickly as possible. Do not wait to wrestle an unfurl with chat.unfurl before telling Slack you received the event. You'll probably want to enqueue behavior like this.

Consider this link_shared event a kind of ping. Now it's up to you to pong with chat.unfurl.

Attaching content with chat.unfurl

The chat.unfurl method requires a token and your wonderful content. It also requires either a combination of ts and channel or unfurl_id and source.

You can fetch the ts and channel values from the link_shared event sent to your app. Once you're in possession of these parameters, you can call chat.unfurl, including your content within the unfurls parameter.

The unfurls parameter expects a JSON map where the keys correspond to the URLs contained in the link_shared event.

Each defined URL may contain an array of blocks, including your custom arrangement of text alongside actionable buttons and selects. All of the typical formatting available to you in messages holds true.

If you call chat.unfurl with a application/x-www-form-encoded type content type (rather than application/json), the unfurls parameter will expect a URL-encoded string fragment of your JSON map.

Here's an example if you're using a application/json content type:

    "channel": "C12345",
    "ts": "156762948.24601",
    "unfurls": {
        "https://gentle-buttons.com/carafe": {
            "blocks": [
                    "type": "section",
                    "text": {
                        "type": "mrkdwn",
                        "text": "Take a look at this carafe, just another cousin of glass"
                    "accessory": {
                        "type": "image",
                        "image_url": "https://gentle-buttons.com/img/carafe-filled-with-red-wine.png",
                        "alt_text": "Stein's wine carafe"

To explore all chat.unfurl parameters, reference the method page.

chat.unfurl response

If your attempt to attach your unfurl to the message is successful, you'll be the proud winner of a rather generic HTTP 200 OK response:

    "ok": true

There are error responses too. You'll receive them if you forget to include ts, channel, or properly-formed unfurls parameter. See the errors section of chat.unfurl for more info.

That's it. You made a link unfurl and added to the complexity of the universe in your own way. While your work could be done here, you can opt to make your unfurl richer and interactive.

Making unfurls interactive

Since the blocks you provide in link unfurls are just like other Slack app-enabled message layouts, you can make them interactive with interactive components too.

Let's build on the knowledge gained so far and, provided you've set yourself up to use message buttons already, let's examine a more complicated example.

Let's say your app received an event detailing a match for https://figment.example.com/imagine. This is a service you provide to help stimulate the imagination. At this specific URL, you generate a random imagination exercise to stimulate the working mind.

Choosing what to do next on Neptune

This imagination machine might construct its JSON hash response to something resembling this:

    "https://figment.example.com/imagine": {
        "blocks": [
                "type": "section",
                "text": {
                    "type": "mrkdwn",
                    "text": "*Let's pretend we're on a rocket ship to Neptune.*\nThe planet Neptune looms near. What do you want to do?"
                "accessory": {
                    "type": "button",
                    "action_id": "orbit",
                    "text": {
                        "type": "plain_text",
                        "text": "Orbit"
                    "style": "primary"
                "type": "actions",
                "elements": [
                        "type": "button",
                        "action_id": "land",
                        "text": {
                            "type": "plain_text",
                            "text": "Attempt to land"
                        "type": "button",
                        "action_id": "destruct",
                        "text": {
                            "type": "plain_text",
                            "text": "Self-destruct"
                        "style": "danger"

Now your interactive unfurl is firmly attached to the originating message, complete with buttons.

Almost everything you already know about interactive components is true for these kind of buttons too.

Almost everything. Read on.

Alternate interactive payload behavior

When a user decides to click on one of your interactive components, we'll send your request URL an invocation payload just as usual.

The only catch is that there will be no message field. Instead, there will be an app_unfurl field that will only contain the blocks that your app added when providing the unfurl. You still can't see the entire message.

Here's an example invocation:

  "type": "block_actions",
  "actions": [
      "action_id": "orbit",
      "block_id": "05cM",
      "text": { ... },
      "style": "primary",
      "type": "button",
      "action_ts": "123456791.2111"
  "app_unfurl": {
    "id": 1,
    "blocks": [ ... ],
    "app_unfurl_url": "https://figment.example.com/imagine",
    "is_app_unfurl": true
  "team": {
        "id": "T123456",
        "domain": "example"
    "channel": {
        "id": "C123456",
        "name": "generators"
    "user": {
        "id": "U061F7AUR",
        "name": "exemplar"
    "token": "xxx",
    "container": {
        "type": "message_attachment",
        "message_ts": "123456789.9875",
        "attachment_id": 1,
        "channel_id": "C123456",
        "is_ephemeral": false,
        "is_app_unfurl": true,
        "app_unfurl_url": "https://figment.example.com/imagine"
  "trigger_id": "112345.327112347633.59cee77e21deda86fd37639d3b5ddbcc",
  "response_url": "https://hooks.slack.com/actions/T123456/XXXX/XXXX",

Here's a closer look at the most relevant fields in this flavor of interactive unfurl:

Field Type Description Required?
is_app_unfurl boolean When set to true, this invocation is related to a Slack app unfurl your app is registered to handle. When absent or false, it's a standard action. No
app_unfurl object Contains blocks relevant to link unfurling from the original message that started this flow. See below. No

From this point forward, you can use the response_url and all the other tools in the interactive toolbox to evolve this interaction. What next will befall our intrepid interstellar travelers?

Authenticated unfurls

Not all links are wild and free, full of content anyone can see. Some links require users to validate their identity. Slack provides several paths to unfurl non-public content based on user authentication.

Note that for apps using these authenticated unfurl requests, users who are on the same team that owns the app will always receive these requests, regardless of whether they have muted unfurl requests (i.e. selecting No as shown below), or the app is already one of the user's Muted Apps:

An ephemeral message asking the user to set up a Slack app

App directory

If you have an app directory app, we provide a way to ask the user posting a link to your service to authenticate before proceeding with an unfurl the whole channel can see.

If you react to a link_shared event with a call to chat.unfurl with the user_auth_required parameter set to true, instead of displaying custom unfurl content, Slack displays an ephemeral message encouraging the user to install your app:

An emphemeral message asking the user to install the Slack app before proceeding with unfurling services

By selecting Install from App Directory, users will be taken to your application's installation or configuration page β€” even if it's not a part of the app directory.

Unless you're building an internal integration, you'll likely want to provide an Add to Slack button on your app's home page that requests the links:read and links:write scopes during the OAuth flow.

This way you use the OAuth sequence to validate the authority of the member to unfurl privileged content within a channel for everyone to see. During the callback step where the user returns to your website, you would capture any needed additional information about the user about their identity on your service. What you need to do is up to you and the context of your content. Avoid surprising users by doing something unexpected.

After installation, the next time the user posts a message mentioning your links (or even retroactively), you can provide unfurl content.

Custom authentication flows

To send users more directly to your website and a personalized authentication flow, use chat.unfurl's user_auth_url parameter to provide a "just in time" URL on your servers.

Or, painstakingly author an amazing ephemeral message with formatting using the user_auth_message parameter, including the link to your custom authentication flow in the message. Your ephemeral message can also include block kit content with use of user_auth_blocks.

Typical flows

When building an app that also needs to authenticate with your service or a third party service outside of your control β€” for instance, if your app uses Twitter or Facebook to authorize users or your require them to sign in to your app first β€” you can handle that authentication step as part of this flow.

  • First specify the user_auth_url or user_auth_message parameters when using chat.unfurl. The URL should point to a page you control. If relevant to your app, include any state information you need in the URL.
  • As users arrive, send them down one of these paths β€” the order is up to you:
    • Authenticate them into your app using service-specific login and password techniques.
    • Generate a Slack OAuth authorization URL and send the now-authenticated-with-your-service user to authorize your Slack app.
    • Associate any additional accounts like Twitter and Facebook by invoking each authentication flow and returning back to your service.

Whether you authorize users before or after Slack redirects the user to your OAuth redirect URI depends on how you want to juggle maintaining state and where you expect any authentication fatigue-based drop off to occur.

Tips, tricks, and warnings

Subtlety makes life secretly spicy. In case you missed it:

  • Links will only unfurl if the message they appear in contains a fully-qualified URL. Yes, the protocol like http or https is required.
  • As you register additional domains, workspaces will need to install your Slack app again for changes to take effect on that workspace.
  • App unfurls are a terrific way to build interactive workflows.
  • Interactive payloads do not include a message object. For limited information about the original message, you can instead look in the app_unfurl object.
  • It's best to only register domains that you own, but if you're providing wrapper functionality for domains owned by others, you must follow all the terms, conditions, and policies declared by the owner. Even if that means you can't provide app unfurl functionality for that domain.
  • link_shared events don't contain the original message; your app just learns about any links that match your registered domains.
  • Everyone in a channel can see your app's unfurls. Using authenticated unfurls only requires authentication to unfurl, but still broadcasts those unfurls to a conversation.
  • The link_shared event is not dispatched when a message posted by an app or integration includes a matching domain.
  • If two apps are installed and are both subscribed to link_shared events for the same domain, only the originally installed app will receive the event.

Imagine the figure of a fiddlehead fern frond unfurling, its universe within unraveledβ€” revealed.

In addition to Slack app unfurling, we generate content previews by default. Learn more about classic unfurling below.

Classic link unfurling

If a workspace doesn't have a Slack app handler for a specific domain, unfurling will fall back to classic behavior: Slack crawls the URL, looks for common OpenGraph and Twitter Card metadata, and renders some micro-approximation of the content. For some domains, Slack even provides its own extra bells and whistles.

Anatomy of an unfurl

When deciding whether to unfurl a link we consider the type of content that has been linked to. We treat "media" --Β that is images, tweets, videos, or audio -- differently to pages that are primarily text-content.

Here are some examples of media content:

While these are examples of text-based content:

By default we unfurl all links in any messages posted by users and Slack apps. This applies to messages posted via incoming webhooks, chat.postMessage and chat.postEphemeral.

We also unfurl links to media based content within Block kit blocks.

If you'd like to override these defaults on a per-message basis you can pass unfurl_links or unfurl_media while posting that message. unfurl_links applies to text based content, unfurl_media applies to media based content. These flags are mutually exclusive, the unfurl_links flag has no effect on media content.

There is one notable exception to these rules: we never unfurl links where the label is a complete substring of your URL minus the protocol. This is so a paragraph of text can contain domain names or abbreviated URLs that are treated as a reference, and not a link to be unfurled. For example, if a message contains a link to http://example.com with the label example.com then that link will not be unfurled. There are more examples of this rule below.

Preventing classic link unfurling

Our servers must fetch every URL in a message to determine what kind of content it references.

Ensure that the links:write scope is added to your app configuration for apps that will be performing app unfurling.

Set both unfurl_links and unfurl_media to false when posting messages to stop Slack from crawling a link and attempting to display an unfurl.

For example, Slack will not crawl or unfurl the URL featured in text below:

    "text": "Check out the <https://api.slack.com|Slack API>",
    "unfurl_links": false,
    "unfurl_media": false


All of these examples are for incoming webhooks, but similar rules apply to our other APIs:

api.slack.com is text-based, so this link will not unfurl:

    "text": "<https://api.slack.com>"

Passing "unfurl_links": true means the link will unfurl:

    "text": "<https://api.slack.com>",
    "unfurl_links": true

This xkcd link is an image, so the content will be unfurled by default:

    "text": "<http://imgs.xkcd.com/comics/regex_golf.png>"

We can then disable that using the unfurl_media flag:

    "text": "<http://imgs.xkcd.com/comics/regex_golf.png>",
    "unfurl_media": false

Even though unfurl_links is true, this link has a label that matches the URL minus the protocol, so the link will not unfurl:

    "text": "<https://api.slack.com|api.slack.com>",
    "unfurl_links": true

The label for this link does not match the URL minus the protocol, so this link will unfurl:

    "text": "<https://api.slack.com|Slack API>",
    "unfurl_links": true