Skip to content

Rule Reference

SEC668lintai-ai-securitystableclaude_settingswarn

Claude settings: command hook setuid or setgid manipulation

Claude settings command hook manipulates setuid or setgid permissions

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for explicit setuid or setgid chmod payloads.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for chmod octal modes with setuid/setgid bits or symbolic modes such as `u+s` and `g+s`.

Malicious corpus
claude-settings-hook-privilege-escalation-payloads
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Setuid and setgid bits can convert ordinary binaries into privilege-escalation paths from shared Claude hook config.

What Triggers

SEC668 matches Claude settings command hooks that run chmod with setuid/setgid octal modes such as 4755, 2755, 6755, or symbolic modes like u+s and g+s.

False Positives

System bootstrap repos may use these modes intentionally, but they remain too sensitive for silent shared hook execution.

Remediation

Remove setuid/setgid manipulation from the hook and move it into a separately reviewed administrative workflow.