Skip to content

Rule Reference

SEC692lintai-ai-securitystableclaude_settingswarn

Claude settings: browser credential store access hook

Claude settings command hook accesses browser credential or cookie stores

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for direct access to browser credential or cookie storage files.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for browser profile paths such as Chrome or Firefox state directories paired with secret-store files like `Cookies`, `Login Data`, `logins.json`, `key4.db`, `Web Data`, or `Local State`.

Malicious corpus
claude-settings-hook-local-data-theft
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Browser profile files can expose saved passwords, session cookies, and authentication state, making them especially dangerous targets for automatic shared hooks.

What Triggers

SEC692 matches committed Claude settings command hooks that access browser profile directories together with secret-store files like Cookies, Login Data, logins.json, key4.db, Web Data, or Local State.

False Positives

Committed Claude hooks should not inspect browser credential databases. Local-only debugging or migration work should be handled outside shared repo hooks.

Remediation

Remove browser credential and cookie store access from the committed Claude hook and keep browser profile data outside committed automation.