Appearance
Why It Matters
Decoding a payload and immediately executing it is a common obfuscation pattern. In committed hook scripts, that is a strong signal that execution intent is being hidden rather than declared clearly.
What Triggers
SEC206 applies to executable hook shell lines and triggers on explicit base64 decode-and-exec chains.
Example that triggers:
sh
echo aGVsbG8= | base64 -d | shExample that stays clean:
sh
echo aGVsbG8= | base64 -d >payload.txtFalse Positives
The rule is intentionally narrow. Plain base64 decoding without execution stays clean, and comments or prose are not part of the scan surface.
Remediation
Remove the decode-and-exec behavior and replace it with a transparent, reviewed local script or binary path. The built-in suggestion removes the obfuscated execution chain.