/hash Command

The /hash command allows you to calculate cryptographic hash values for text input using various algorithms.

Available Subcommands

/hash text

Calculates cryptographic hash values for text input.

Usage

/hash text input: <text> algorithm: <algorithm>

Options

OptionDescriptionRequiredPlatform
inputThe text to hashYesDiscord (parameter), Slack (inline)
algorithmHash algorithm to use (MD5, SHA1, SHA256, SHA512, or All)YesDiscord (parameter), Slack (flag)

Examples

MD5 Hash

/hash text input: Hello, world! algorithm: MD5

Result: 65a8e27d8879283831b664bd8b7f0ad4

SHA256 Hash

/hash text input: Hello, world! algorithm: SHA256

Result: 315f5bdb76d078c43b8ac0064e4a0164612b1fce77c869345bfc94c75894edd3

All Algorithms

/hash text input: Hello, world! algorithm: All

Result: Multiple hash values displayed in a formatted message

Hash Algorithms

AlgorithmDescriptionOutput Length
MD5Message Digest Algorithm 5, not secure for cryptographic purposes128 bits (32 hex chars)
SHA1Secure Hash Algorithm 1, considered weak for security purposes160 bits (40 hex chars)
SHA256Secure Hash Algorithm 2 (256-bit), recommended for security256 bits (64 hex chars)
SHA512Secure Hash Algorithm 2 (512-bit), strongest option512 bits (128 hex chars)

Platform-Specific Implementations

Discord Implementation

  • Commands use Discord’s slash command parameter system with named parameters (e.g., input:, algorithm:)
  • Requires the subcommand text to specify the action
  • Parameters are specified in any order with their respective labels
  • Hash results are displayed as embeds in Discord

Slack Implementation

  • Text to hash is provided directly after the /hash command
  • No subcommand needed in Slack
  • Algorithm is specified using the flag syntax (e.g., --algorithm md5)
  • Hash results are displayed using Slack Block Kit formatting

Use Cases

  • Verify file or data integrity
  • Compare strings or files without revealing content
  • Generate unique identifiers based on content
  • Learning about cryptographic hash functions
  • Verify password hashes (for educational purposes)

Security Notes

  • MD5 and SHA1 are considered cryptographically broken for security applications
  • The command displays plain input text in the response (truncated if too long)
  • No secure or sensitive data should be hashed using public Discord bots
  • Hash functions are one-way operations; the original text cannot be recovered

Notes

  • The hashing is performed on the server side
  • Only text input is supported (no file hashing)