mirror of
https://github.com/anthropics/claude-code.git
synced 2026-05-01 18:32:45 +00:00
This commit fixes a security vulnerability where deny rules could be bypassed by creating symbolic links to restricted files. Changes: - Add symlink resolution in rule_engine.py _extract_field method - Add symlink resolution in security_reminder_hook.py check_patterns - Create new symlink_deny_hook.py for blocking symlinks to system paths - Include Read tool in file event handlers for deny rule checking - Update hooks.json to apply security hooks to Read tool The vulnerability allowed attackers to bypass deny rules like Read(/etc/passwd) by creating a symlink (e.g., ln -s /etc/passwd test.txt) and then reading the symlink instead of the restricted file directly. The fix uses os.path.realpath() to resolve all symlinks to their canonical paths before checking against deny patterns, ensuring that deny rules are enforced regardless of whether the path is accessed directly or via symlink.
77 lines
2.3 KiB
Python
Executable File
77 lines
2.3 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
"""PreToolUse hook executor for hookify plugin.
|
|
|
|
This script is called by Claude Code before any tool executes.
|
|
It reads .claude/hookify.*.local.md files and evaluates rules.
|
|
"""
|
|
|
|
import os
|
|
import sys
|
|
import json
|
|
|
|
# CRITICAL: Add plugin root to Python path for imports
|
|
# We need to add the parent of the plugin directory so Python can find "hookify" package
|
|
PLUGIN_ROOT = os.environ.get('CLAUDE_PLUGIN_ROOT')
|
|
if PLUGIN_ROOT:
|
|
# Add the parent directory of the plugin
|
|
parent_dir = os.path.dirname(PLUGIN_ROOT)
|
|
if parent_dir not in sys.path:
|
|
sys.path.insert(0, parent_dir)
|
|
|
|
# Also add PLUGIN_ROOT itself in case we have other scripts
|
|
if PLUGIN_ROOT not in sys.path:
|
|
sys.path.insert(0, PLUGIN_ROOT)
|
|
|
|
try:
|
|
from hookify.core.config_loader import load_rules
|
|
from hookify.core.rule_engine import RuleEngine
|
|
except ImportError as e:
|
|
# If imports fail, allow operation and log error
|
|
error_msg = {"systemMessage": f"Hookify import error: {e}"}
|
|
print(json.dumps(error_msg), file=sys.stdout)
|
|
sys.exit(0)
|
|
|
|
|
|
def main():
|
|
"""Main entry point for PreToolUse hook."""
|
|
try:
|
|
# Read input from stdin
|
|
input_data = json.load(sys.stdin)
|
|
|
|
# Determine event type for filtering
|
|
# For PreToolUse, we use tool_name to determine "bash" vs "file" event
|
|
tool_name = input_data.get('tool_name', '')
|
|
|
|
event = None
|
|
if tool_name == 'Bash':
|
|
event = 'bash'
|
|
elif tool_name in ['Edit', 'Write', 'MultiEdit', 'Read']:
|
|
# Include Read tool in file events to check symlink bypass
|
|
# Security fix for CVE-2025-59829
|
|
event = 'file'
|
|
|
|
# Load rules
|
|
rules = load_rules(event=event)
|
|
|
|
# Evaluate rules
|
|
engine = RuleEngine()
|
|
result = engine.evaluate_rules(rules, input_data)
|
|
|
|
# Always output JSON (even if empty)
|
|
print(json.dumps(result), file=sys.stdout)
|
|
|
|
except Exception as e:
|
|
# On any error, allow the operation and log
|
|
error_output = {
|
|
"systemMessage": f"Hookify error: {str(e)}"
|
|
}
|
|
print(json.dumps(error_output), file=sys.stdout)
|
|
|
|
finally:
|
|
# ALWAYS exit 0 - never block operations due to hook errors
|
|
sys.exit(0)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|