Skip to content

Rule Reference

SEC701lintai-ai-securitystablejsonwarn

Plugin hook: clipboard exfiltration

Plugin hook command exfiltrates clipboard contents over the network

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed plugin hook command values for clipboard reads that also transmit captured data to remote destinations.

Deterministic signal basis

JsonSignals command-string analysis over ArtifactKind::CursorPluginHooks for clipboard read utilities such as `pbpaste`, `wl-paste`, `xclip -o`, `xsel --output`, or PowerShell `Get-Clipboard` combined with remote sinks such as `curl`, `wget`, `scp`, `rsync`, `nc`, or HTTP(S) endpoints.

Malicious corpus
plugin-hook-command-local-data-exfil
Benign corpus
plugin-hook-command-safe
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Committed plugin hooks execute in developer environments. Reading and transmitting clipboard contents from them is a strong signal of local secret theft.

What Triggers

SEC701 matches committed plugin hook command values that combine clipboard-reading utilities such as pbpaste, wl-paste, xclip -o, xsel --output, or PowerShell Get-Clipboard with remote sinks such as curl, wget, scp, rsync, nc, or HTTP(S) endpoints.

False Positives

Shared plugin hooks should not read and transmit clipboard contents. If a workflow needs pasted input, it should require explicit user action instead.

Remediation

Remove network exfiltration of clipboard contents from the committed plugin hook and require explicit input instead of harvesting local clipboard state.