Commands
Hash
Documentation for the /hash command to calculate cryptographic hashes
/hash
Command
The /hash
command allows you to calculate cryptographic hash values for text input using various algorithms.
Available Subcommands
/hash text
Calculates cryptographic hash values for text input.
Usage
Options
Option | Description | Required | Platform |
---|---|---|---|
input | The text to hash | Yes | Discord (parameter), Slack (inline) |
algorithm | Hash algorithm to use (MD5, SHA1, SHA256, SHA512, or All) | Yes | Discord (parameter), Slack (flag) |
Examples
MD5 Hash
Result: 65a8e27d8879283831b664bd8b7f0ad4
SHA256 Hash
Result: 315f5bdb76d078c43b8ac0064e4a0164612b1fce77c869345bfc94c75894edd3
All Algorithms
Result: Multiple hash values displayed in a formatted message
Hash Algorithms
Algorithm | Description | Output Length |
---|---|---|
MD5 | Message Digest Algorithm 5, not secure for cryptographic purposes | 128 bits (32 hex chars) |
SHA1 | Secure Hash Algorithm 1, considered weak for security purposes | 160 bits (40 hex chars) |
SHA256 | Secure Hash Algorithm 2 (256-bit), recommended for security | 256 bits (64 hex chars) |
SHA512 | Secure Hash Algorithm 2 (512-bit), strongest option | 512 bits (128 hex chars) |
Platform-Specific Implementations
Discord Implementation
- Commands use Discord’s slash command parameter system with named parameters (e.g.,
input:
,algorithm:
) - Requires the subcommand
text
to specify the action - Parameters are specified in any order with their respective labels
- Hash results are displayed as embeds in Discord
Slack Implementation
- Text to hash is provided directly after the
/hash
command - No subcommand needed in Slack
- Algorithm is specified using the flag syntax (e.g.,
--algorithm md5
) - Hash results are displayed using Slack Block Kit formatting
Use Cases
- Verify file or data integrity
- Compare strings or files without revealing content
- Generate unique identifiers based on content
- Learning about cryptographic hash functions
- Verify password hashes (for educational purposes)
Security Notes
- MD5 and SHA1 are considered cryptographically broken for security applications
- The command displays plain input text in the response (truncated if too long)
- No secure or sensitive data should be hashed using public Discord bots
- Hash functions are one-way operations; the original text cannot be recovered
Notes
- The hashing is performed on the server side
- Only text input is supported (no file hashing)
Was this page helpful?