Appearance
Why It Matters
Browser profile stores such as Chrome cookies, Firefox logins, and browser state databases often contain session tokens, saved credentials, and authentication material with immediate account impact.
What Triggers
SEC688 matches executable hook lines that access browser profile paths such as Chrome or Firefox state directories together with secret-store files like Cookies, Login Data, logins.json, key4.db, Web Data, or Local State.
False Positives
Shared committed hooks should not inspect browser credential or cookie databases. Legitimate migration or debugging tasks should be handled manually in tightly scoped local scripts, not in repo-shared automation.
Remediation
Remove browser credential and cookie store access from the shared hook script and keep browser profile data outside committed automation.