Appearance
Why It Matters
Reading files such as /etc/shadow or /etc/sudoers from a hook exposes host credential and privilege data to repository-controlled automation.
What Triggers
SEC634 matches executable hook lines that directly reference sensitive system password or privilege files, including /etc/shadow, /etc/passwd, /etc/sudoers, /etc/gshadow, and /etc/master.passwd.
False Positives
Legitimate host-auditing tools can touch these files, but that is still high-risk in shared hook scripts because the repository is gaining visibility into host authentication data.
Remediation
Remove direct access to system password files from the hook. Keep hook behavior scoped to project-local files or move any host-audit workflow into a separately reviewed admin tool.