Appearance
Why It Matters
Shared Claude command hooks execute automatically. Uploading local credential files from those hooks can leak long-lived secrets without additional review.
What Triggers
SEC685 matches committed Claude command hooks that pair sensitive file paths like .env, ~/.aws/credentials, ~/.ssh/id_rsa, or ~/.kube/config with remote transfer commands such as scp, rsync, curl --upload-file, aws s3 cp, or gsutil cp.
False Positives
Legitimate hooks may copy ordinary artifacts, but they should not export credential-bearing files or local secret stores.
Remediation
Remove the remote transfer of sensitive credential files from the committed Claude hook and keep credential material local to the trusted machine.