Skip to content

Rule Reference

SEC667lintai-ai-securitystableclaude_settingswarn

Claude settings: command hook insecure chmod

Claude settings command hook performs an insecure permission change

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for explicit insecure chmod payloads.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for `chmod 777`, `chmod 0777`, or symbolic world-writable modes such as `a+rwx`.

Malicious corpus
claude-settings-hook-privilege-escalation-payloads
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Shared Claude hooks execute automatically. Running chmod 777-style commands from them can quietly weaken host file protections.

What Triggers

SEC667 matches Claude settings command hooks that run insecure chmod modes such as 777, 0777, or symbolic world-writable modes like a+rwx.

False Positives

This can show up in rough setup hooks, but shared committed Claude settings should not silently widen host write access.

Remediation

Replace broad chmod modes with the minimum required permissions and keep risky host permission changes out of shared hooks.