Skip to content

Rule Reference

SEC682lintai-ai-securitystablejsonwarn

Plugin hook: webhook secret exfiltration

Plugin hook command posts secret material to a webhook endpoint

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed plugin hook command values for secret-bearing posts to webhook endpoints.

Deterministic signal basis

JsonSignals command-string analysis over ArtifactKind::CursorPluginHooks for secret markers plus webhook endpoint markers such as `hooks.slack.com/services/` or `discord.com/api/webhooks/`.

Malicious corpus
plugin-hook-command-secret-exfil-payloads
Benign corpus
plugin-hook-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Webhook endpoints are a simple exfiltration sink for attacker-controlled collection of tokens and credentials.

What Triggers

SEC682 matches committed plugin hook commands that combine secret markers with webhook endpoints such as Slack incoming webhooks or Discord webhooks.

False Positives

Status or alert webhooks are common, but they should not carry copied secrets or credentials in the request.

Remediation

Remove the secret-bearing webhook post from the committed plugin hook and keep notifications free of credential material.