Appearance
Why It Matters
rm -rf / and related variants are destructive payloads, not normal hook behavior. A committed hook that can erase the host root filesystem is an immediate integrity and availability risk.
What Triggers
SEC633 matches executable hook lines that run rm with recursive and force semantics against / or use --no-preserve-root.
Examples include rm -rf /, rm -fr /, and rm --recursive --force --no-preserve-root /tmp/target.
False Positives
This should be rare. The rule is aimed at executable hook content, not prose. If a repository intentionally ships destructive host-level cleanup hooks, that is usually worth manual review anyway.
Remediation
Remove the root-targeting delete command. If cleanup is required, scope it to a reviewed repo-local path and avoid host-wide destructive flags.