Appearance
Why It Matters
Linux capabilities like cap_setuid and cap_sys_admin can grant powerful privileges without full root.
What Triggers
SEC663 matches executable hook lines that run setcap or include dangerous capability tokens such as cap_setuid, cap_setgid, cap_sys_admin, or cap_net_admin.
False Positives
Capability assignment can be legitimate in low-level system tooling, but it remains a sensitive host privilege change in shared hooks.
Remediation
Remove Linux capability manipulation from the hook and keep capability assignment in an explicit reviewed admin workflow.