hooks
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityThe provided fragment is a small management wrapper that delegates all substantive work to an external plugin script (manage-hooks.sh). The main risks are supply-chain and execution risk from running that third-party script and forwarding unvalidated agent arguments to it. Because the fragment will cause persistent changes to ~/.claude/settings.json (which load hooks at session start), a malicious or vulnerable manage-hooks.sh could introduce persistent, hard-to-notice behavior changes, perform data exfiltration, or run arbitrary commands. I find low likelihood that this fragment itself contains deliberate malware, but a moderate security risk exists until the invoked script is reviewed and integrity-checked. Recommended actions: review/manage-hooks.sh contents before running, validate plugin provenance, implement argument sanitization and script signature checks, and back up settings.json before changes.