Skip to content

Rule Reference

SEC681lintai-ai-securitystablejsonwarn

Plugin hook: insecure HTTP secret send

Plugin hook command sends secret material to an insecure http:// endpoint

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed plugin hook command values for secret-bearing exfil over insecure HTTP.

Deterministic signal basis

JsonSignals command-string analysis over ArtifactKind::CursorPluginHooks for `http://` endpoints gated by concurrent secret markers in a network-capable command path.

Malicious corpus
plugin-hook-command-secret-exfil-payloads
Benign corpus
plugin-hook-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Secret export over plain HTTP is both an exfiltration path and a transport-security failure.

What Triggers

SEC681 matches committed plugin hook commands where a secret-bearing network send targets an explicit http:// endpoint.

False Positives

Committed hooks should not move secret values over plain HTTP. Local fixture traffic without real secrets should not be part of the shipped plugin hook path.

Remediation

Remove the insecure secret-bearing HTTP request or redesign the hook so secrets never leave the trusted component boundary.