Skip to content

Rule Reference

SEC695lintai-ai-securitystablehookdeny

Hook script: clipboard exfiltration

Hook script exfiltrates clipboard contents over the network

Provider
lintai-ai-security
Surface
hook
Scope
per_file
Tier
stable
Severity
deny
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Matches clipboard-reading commands that also transmit data to remote network endpoints in executable hook lines.

Deterministic signal basis

HookSignals command-line analysis over non-comment hook lines for clipboard read utilities such as `pbpaste`, `wl-paste`, `xclip -o`, `xsel --output`, or PowerShell `Get-Clipboard` combined with remote sinks such as `curl`, `wget`, `scp`, `rsync`, `nc`, or HTTP(S) endpoints.

Malicious corpus
hook-local-data-exfil
Benign corpus
cursor-plugin-clean-basic
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Clipboard contents often include copied passwords, tokens, secrets, and internal snippets. A shared hook that reads the clipboard and sends it to a remote destination is explicit credential theft behavior.

What Triggers

SEC695 matches executable hook lines that combine clipboard-reading utilities such as pbpaste, wl-paste, xclip -o, xsel --output, or PowerShell Get-Clipboard with remote sinks such as curl, wget, scp, rsync, nc, or HTTP(S) endpoints.

False Positives

Shared committed hooks should not read and transmit clipboard contents. Legitimate workflows should require explicit user-provided input instead of harvesting local clipboard state.

Remediation

Remove network exfiltration of clipboard contents from the shared hook and require explicit input rather than copying local clipboard data.