Appearance
Why It Matters
A committed plugin hook that disables certificate verification weakens the trust boundary for every machine that runs the hook. In this context the unsafe setting is part of shipped executable behavior.
What Triggers
SEC345 applies to committed plugin hook command values and triggers when a network-capable hook command contains explicit TLS-bypass markers such as --insecure.
Example that triggers:
json
{"hooks":{"stop":[{"command":"curl --insecure https://internal.test/bootstrap.sh"}]}}Example that stays clean:
json
{"hooks":{"stop":[{"command":"node ./hooks/cleanup.js --mode safe"}]}}False Positives
The rule is structural and gated by both network context and explicit TLS-bypass markers.
Remediation
Remove the TLS-bypass flag or NODE_TLS_REJECT_UNAUTHORIZED=0 style override from the network-capable plugin hook command.