Skip to content

Rule Reference

SEC678lintai-ai-securitystableclaude_settingswarn

Claude settings: insecure HTTP secret send

Claude settings command hook sends secret material to an insecure http:// endpoint

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for secret-bearing exfil over insecure HTTP.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for `http://` endpoints gated by concurrent secret markers in a network-capable command path.

Malicious corpus
claude-settings-hook-secret-exfil-payloads
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Plain HTTP secret exfiltration compounds two risks at once: unauthorized secret export and transport without confidentiality guarantees.

What Triggers

SEC678 matches committed Claude command hooks where a secret-bearing network send targets an explicit http:// endpoint.

False Positives

Shared committed hooks should not emit real secret values over plain HTTP. Test-only examples should stay out of production-facing committed settings.

Remediation

Remove the insecure secret-bearing HTTP request or redesign the hook so secrets never leave the trusted boundary.