Skip to content

Rule Reference

SEC656lintai-ai-securitystableclaude_settingswarn

Claude settings: command hook systemd persistence

Claude settings command hook registers a systemd service or unit for persistence

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for explicit systemd service registration or unit-file writes.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for `systemctl enable|link` or writes to systemd unit paths.

Malicious corpus
claude-settings-hook-service-persistence
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Systemd registration from shared Claude settings can make repository-controlled automation persist beyond the immediate session.

What Triggers

SEC656 matches Claude settings command hooks that run systemctl enable or systemctl link, or write unit files into systemd service paths.

False Positives

Provisioning-oriented repos are the main edge case, but this still deserves explicit review rather than implicit hook execution.

Remediation

Remove systemd persistence from the hook and keep service installation in a separate reviewed provisioning workflow.