Skip to content

Rule Reference

SEC658lintai-ai-securitystablejsonwarn

Plugin hook: cron persistence

Plugin hook command manipulates cron persistence

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed plugin hook command values for explicit cron persistence setup.

Deterministic signal basis

JsonSignals command-string analysis over ArtifactKind::CursorPluginHooks for `crontab` mutation or writes to cron persistence paths.

Malicious corpus
plugin-hook-command-service-persistence
Benign corpus
plugin-hook-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Plugin hooks run automatically in installed tooling. Cron mutation from those hooks creates recurring persistence on the host.

What Triggers

SEC658 matches plugin hook command strings that mutate cron through crontab or write cron persistence files such as /etc/crontab, /etc/cron*, or /var/spool/cron.

False Positives

Provisioning-style plugins may do this intentionally, but it should remain explicit and reviewed.

Remediation

Remove cron persistence from the plugin hook and keep scheduled-task installation out of ordinary shared plugins.