Skip to content

Rule Reference

SEC670lintai-ai-securitystablejsonwarn

Plugin hook: insecure chmod

Plugin hook command performs an insecure permission change

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed plugin hook command values for explicit insecure chmod payloads.

Deterministic signal basis

JsonSignals command-string analysis over ArtifactKind::CursorPluginHooks for `chmod 777`, `chmod 0777`, or symbolic world-writable modes such as `a+rwx`.

Malicious corpus
plugin-hook-command-privilege-escalation-payloads
Benign corpus
plugin-hook-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Plugin hooks run automatically in installed tooling. Insecure chmod changes from those hooks can silently weaken host protections.

What Triggers

SEC670 matches plugin hook command strings that run insecure chmod modes such as 777, 0777, or symbolic world-writable modes like a+rwx.

False Positives

Setup-heavy plugins may do this intentionally, but it remains a risky host change that should not happen silently.

Remediation

Replace broad chmod modes with the minimum required permissions and keep risky host permission changes out of shared plugin hooks.