Skip to content

Rule Reference

SEC642lintai-ai-securitystableclaude_settingswarn

Claude settings: command hook password file access

Claude settings command hook accesses a sensitive system password file

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for direct access to sensitive password and sudo policy files.

Deterministic signal basis

ClaudeSettingsSignals command-hook path detection over committed hook entries with type == command for `/etc/shadow`, `/etc/passwd`, `/etc/sudoers`, `/etc/gshadow`, or `/etc/master.passwd`.

Malicious corpus
claude-settings-hook-persistence-escalation
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Shared Claude hooks should not inspect host authentication or privilege files. That exposes sensitive local system state to repository-controlled automation.

What Triggers

SEC642 matches Claude settings command hooks that directly reference /etc/shadow, /etc/passwd, /etc/sudoers, /etc/gshadow, or /etc/master.passwd.

False Positives

Host-audit hooks are possible, but they are still high-risk in a shared committed settings file and typically warrant explicit review.

Remediation

Remove password-file access from the hook. Keep command hooks focused on workspace-local operations, or move host auditing into a separate reviewed admin process.