Appearance
Why It Matters
A plugin hook that reads /etc/shadow-style files can expose host credential and privilege data to plugin-controlled execution paths.
What Triggers
SEC646 matches plugin hook command strings that directly reference /etc/shadow, /etc/passwd, /etc/sudoers, /etc/gshadow, or /etc/master.passwd.
False Positives
Dedicated admin plugins may intentionally inspect these files, but that remains a high-risk behavior in repository-shipped plugin hooks.
Remediation
Remove direct password-file access from the plugin hook, or move host-audit behavior into a separately reviewed administrative tool.