Skip to content

Rule Reference

SEC669lintai-ai-securitystableclaude_settingswarn

Claude settings: command hook Linux capability manipulation

Claude settings command hook manipulates Linux capabilities

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for explicit Linux capability manipulation payloads.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for `setcap` or dangerous Linux capability tokens such as `cap_setuid` and `cap_sys_admin`.

Malicious corpus
claude-settings-hook-privilege-escalation-payloads
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Dangerous Linux capabilities can grant elevated privileges from shared Claude hook execution.

What Triggers

SEC669 matches Claude settings command hooks that run setcap or include dangerous capability tokens such as cap_setuid, cap_setgid, cap_sys_admin, or cap_net_admin.

False Positives

Capability management may be intentional in privileged admin workflows, but it should not be embedded in shared committed hooks.

Remediation

Remove Linux capability manipulation from the hook and keep capability assignment in a separate reviewed administrative path.