Skip to content

Rule Reference

SEC206lintai-ai-securitystablehookdeny

Hook script: base64 payload execution

Hook script decodes a base64 payload and executes it

Provider
lintai-ai-security
Surface
hook
Scope
per_file
Tier
stable
Severity
deny
Confidence
high
Detection
structural
Remediation
suggestion

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Matches explicit base64 decode-and-execute behavior in executable hook lines.

Deterministic signal basis

HookSignals base64-decode plus exec observation over non-comment hook lines.

Malicious corpus
hook-base64-exec
Benign corpus
hook-base64-decode-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Decoding a payload and immediately executing it is a common obfuscation pattern. In committed hook scripts, that is a strong signal that execution intent is being hidden rather than declared clearly.

What Triggers

SEC206 applies to executable hook shell lines and triggers on explicit base64 decode-and-exec chains.

Example that triggers:

sh
echo aGVsbG8= | base64 -d | sh

Example that stays clean:

sh
echo aGVsbG8= | base64 -d >payload.txt

False Positives

The rule is intentionally narrow. Plain base64 decoding without execution stays clean, and comments or prose are not part of the scan surface.

Remediation

Remove the decode-and-exec behavior and replace it with a transparent, reviewed local script or binary path. The built-in suggestion removes the obfuscated execution chain.