Skip to content

Rule Reference

SEC533lintai-ai-securitystablemarkdownwarn

AI markdown: shared gh api PUT tool grant

AI-native markdown frontmatter grants `Bash(gh api --method PUT:*)` tool access

Provider
lintai-ai-security
Surface
markdown
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks AI-native markdown frontmatter for exact GitHub API PUT mutation authority through `allowed-tools`.

Deterministic signal basis

MarkdownSignals exact frontmatter string detection for `Bash(gh api --method PUT:*)` in allowed-tools entries.

Malicious corpus
skill-gh-api-put-allowed-tools
Benign corpus
skill-gh-api-put-allowed-tools-specific-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

SEC533 / MD-GH-API-PUT-ALLOWED-TOOLS

SEC533 flags AI-native markdown frontmatter when allowed-tools or allowed_tools grants the exact token Bash(gh api --method PUT:*).

Why It Matters

gh api --method PUT is a broad GitHub mutation path. Shared frontmatter should not quietly make remote PUT mutations a default capability for every agent that loads the file.

Trigger Shape

  • AI-native markdown surface with parsed frontmatter
  • path is not fixture-like
  • allowed-tools or allowed_tools contains the exact token Bash(gh api --method PUT:*)

Safer Example

md
---
allowed-tools:
  - Bash(gh api --method GET:*)
---