Appearance
Why It Matters
Committed plugin hooks run for downstream users, so exporting local credential files from those hooks creates a high-risk supply-chain style exfiltration path.
What Triggers
SEC686 matches plugin hook commands that pair sensitive file paths like .env, ~/.aws/credentials, ~/.ssh/id_rsa, or ~/.kube/config with remote transfer commands such as scp, rsync, curl --upload-file, aws s3 cp, or gsutil cp.
False Positives
Artifact upload hooks can be legitimate, but committed plugin hooks should not transfer local credential files or secret stores.
Remediation
Remove the remote transfer of sensitive credential files from the committed plugin hook and keep credential material local to the trusted environment.