Skip to content

Rule Reference

SEC644lintai-ai-securitystableclaude_settingswarn

Claude settings: command hook authorized_keys write

Claude settings command hook writes to SSH authorized_keys

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for explicit writes to SSH `authorized_keys`.

Deterministic signal basis

ClaudeSettingsSignals command-hook analysis over committed hook entries with type == command using redirection-or-tee targeting of `authorized_keys`.

Malicious corpus
claude-settings-hook-persistence-escalation
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Changing authorized_keys from a shared Claude hook can create or preserve remote login access on the host.

What Triggers

SEC644 matches Claude settings command hooks that write to an authorized_keys path through redirection or tee.

False Positives

SSH bootstrap flows exist, but shared committed Claude settings are not an appropriate place to make silent host access-control changes.

Remediation

Remove the authorized_keys write from the hook and move SSH key provisioning into a dedicated reviewed administrative workflow.