security-hook-blocks-exec-eval-tokens-in-prose

The security_reminder_hook regex triggers on literal exec( and eval( tokens even in prose documentation, handoff files, and comments describing the hook itself. This is a known meta-recursion issue — any file that documents the hook pattern by example will be blocked. Workaround: use descriptive language instead of literal tokens (e.g., ‘the exec-family functions’ or ‘dynamic evaluation calls’).