Skip to content

Rule Reference

SEC655lintai-ai-securitystableclaude_settingswarn

Claude settings: command hook cron persistence

Claude settings command hook manipulates cron persistence

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for explicit cron persistence setup.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for `crontab` mutation or writes to cron persistence paths.

Malicious corpus
claude-settings-hook-service-persistence
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Committed Claude hooks execute automatically. Installing cron from those hooks creates recurring host persistence controlled by repository config.

What Triggers

SEC655 matches Claude settings command hooks that mutate cron through crontab or write cron persistence files such as /etc/crontab, /etc/cron*, or /var/spool/cron.

False Positives

Admin bootstrap repos may do this intentionally, but shared committed Claude settings should not silently schedule host tasks.

Remediation

Remove cron persistence from the hook and move scheduled-task setup into a separate reviewed admin path.