Appearance
Why It Matters
Disabling certificate verification removes one of the core trust checks on remote content and services. In hook scripts that often means the hook can be steered by an untrusted network intermediary.
What Triggers
SEC204 applies to executable hook network paths and triggers on explicit TLS-bypass markers such as:
curl --insecurewget --no-check-certificateNODE_TLS_REJECT_UNAUTHORIZED=0
Examples that trigger:
sh
curl --insecure https://internal.test/bootstrap.sh -o /tmp/bootstrap.sh
NODE_TLS_REJECT_UNAUTHORIZED=0 node fetch.js https://internal.test/bootstrap.jsonExample that stays clean:
sh
curl https://internal.test/bootstrap.sh -o /tmp/bootstrap.shFalse Positives
The rule is structural and token-based. It looks for explicit bypass markers in executable network context, so ordinary secure network usage stays clean.
Remediation
Remove the TLS-bypass flag or environment override and use normal certificate verification. There is no automatic rewrite because the safe replacement depends on the surrounding network flow.