Appearance
Why It Matters
Shared hooks should not export local credential files such as SSH keys, cloud credentials, or .env files to remote systems or buckets.
What Triggers
SEC683 matches executable hook lines that pair sensitive file paths like .env, ~/.aws/credentials, ~/.ssh/id_rsa, or ~/.kube/config with transfer commands such as scp, rsync, curl --upload-file, aws s3 cp, or gsutil cp.
False Positives
Some setup scripts move local files between trusted systems, but committed shared hooks should not silently transfer credential-bearing files as part of normal execution.
Remediation
Remove the remote transfer of sensitive credential files from the hook and keep credential material local to the trusted system that owns it.