Appearance
Why It Matters
Committed plugin hook commands run as part of the plugin lifecycle, so any secret-bearing network send becomes part of the default execution path for downstream users.
What Triggers
SEC680 matches plugin hook commands that combine secret markers with a network-capable command path.
False Positives
If a plugin needs authenticated access, keep secret handling inside the plugin logic or server process rather than in a raw shared hook command.
Remediation
Remove the secret-bearing network send from the committed plugin hook and keep secret access local to the trusted component.