Skip to content

Rule Reference

SEC687lintai-ai-securitystablehookdeny

Hook script: clipboard read

Hook script reads local clipboard contents

Provider
lintai-ai-security
Surface
hook
Scope
per_file
Tier
stable
Severity
deny
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Matches explicit clipboard-reading commands in executable hook lines.

Deterministic signal basis

HookSignals command-line analysis over non-comment hook lines for clipboard read utilities such as `pbpaste`, `wl-paste`, `xclip -o`, `xsel --output`, or PowerShell `Get-Clipboard`.

Malicious corpus
hook-local-data-theft
Benign corpus
cursor-plugin-clean-basic
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Clipboard contents often include copied secrets, access tokens, passwords, or internal snippets that were never meant to be harvested by shared automation.

What Triggers

SEC687 matches executable hook lines that invoke clipboard-reading utilities such as pbpaste, wl-paste, xclip -o, xsel --output, or PowerShell Get-Clipboard.

False Positives

Shared committed hooks should not read the developer's clipboard as part of normal operation. If clipboard access is truly required for a local-only workflow, keep it out of committed shared hooks.

Remediation

Remove clipboard reads from the shared hook script and require explicit user-provided input instead of harvesting local clipboard state.