Skip to content

Rule Reference

SEC700lintai-ai-securitystableclaude_settingswarn

Claude settings: browser credential store exfiltration hook

Claude settings command hook exfiltrates browser credential or cookie store data

Provider
lintai-ai-security
Surface
claude_settings
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed Claude settings command hooks for direct access to browser credential or cookie storage files combined with remote transfer behavior.

Deterministic signal basis

ClaudeSettingsSignals command-hook string analysis over committed hook entries with type == command for browser profile paths such as Chrome or Firefox state directories paired with secret-store files like `Cookies`, `Login Data`, `logins.json`, `key4.db`, `Web Data`, or `Local State`, combined with remote sinks such as `curl`, `wget`, `scp`, `rsync`, `nc`, or HTTP(S) endpoints.

Malicious corpus
claude-settings-hook-local-data-exfil
Benign corpus
claude-settings-network-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Browser cookies, saved logins, and state databases can expose sessions and credentials. Sending them through a committed shared Claude hook is high-confidence malicious behavior.

What Triggers

SEC700 matches committed Claude settings command hooks that access browser profile directories together with secret-store files like Cookies, Login Data, logins.json, key4.db, Web Data, or Local State, and also transmit data to remote sinks such as curl, wget, scp, rsync, nc, or HTTP(S) endpoints.

False Positives

Committed Claude hooks should not collect and transmit browser credential or cookie store data. Any legitimate local-only use should stay out of shared repo automation.

Remediation

Remove network exfiltration of browser credential and cookie store data from the committed Claude hook and keep browser profile data local.