security-hook-triggers-on-literal-exec-eval-tokens-in-prose

The security_reminder_hook regex catches literal exec( and eval( tokens anywhere in file content, including documentation and prose that merely describes the hook. This is a recurring meta-recursion: any handoff or SKILL.md that explains the hook will trigger it. Workaround: use descriptive language (‘shell execution call’, ‘dynamic evaluation’) instead of the literal token forms. Applies across all file types written via Edit/Write tools.