Skip to content

Rule Reference

SEC677lintai-ai-securitystableclaude_settingswarn

Claude settings: secret exfiltration hook

Claude settings command hook appears to send secret material over the network

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for explicit secret-bearing network exfil payloads.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for secret markers combined with network-capable command context.

Malicious corpus
claude-settings-hook-secret-exfil-payloads
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Shared Claude command hooks run automatically. Secret-bearing network sends in those hooks can leak credentials without any additional user review.

What Triggers

SEC677 matches committed Claude settings command hooks that combine secret markers with a network-capable command path.

False Positives

If a hook needs authenticated access, keep the secret inside the target tool or server rather than placing the secret send directly in the shared hook command.

Remediation

Remove the secret-bearing network send from the committed Claude hook and keep secret handling local to the trusted component.