Notification Hooks
Plugin ActiveNotification Hooks - Event-driven automation hooks
To enable automated event-driven notifications within Claude Code, informing users about important events, errors, or task completions.
Features
- Event-driven automation hooks
- Notifications for Slack, Telegram, and Discord
- Hooks for various events (PreToolUse, PostToolUse, Stop)
- Customizable via environment variables
Use Cases
- Receive Slack notifications for long-running operations.
- Get Telegram alerts when errors occur during tool execution.
- Be notified via Discord when a Claude Code session stops.
- Enhance security awareness with pre-command execution notifications.
Non-Goals
- Directly processing or analyzing notification content.
- Providing advanced workflow orchestration beyond simple event triggering.
- Acting as a general-purpose messaging platform.
Workflow
- User installs the plugin.
- User configures required environment variables for desired notification services.
- Claude Code triggers an event (e.g., tool execution, error, session stop).
- The relevant hook script executes.
- The hook sends a notification to the configured service.
Practices
- Event-driven automation
- Notification management
- Security awareness
Prerequisites
- Claude Code environment
- Configured environment variables for notification services (e.g., TELEGRAM_BOT_TOKEN, DISCORD_WEBHOOK_URL)
Practical Utility
- info:Unique selling propositionThe plugin provides a set of pre-configured hooks for common notification services, offering convenience over direct API implementation but is a thin wrapper around these services.
Documentation
- warning:Configuration & parameter referenceWhile some environment variables are listed for notification services, the documentation does not explicitly state default values or precedence order for configurations.
Security
- warning:Secret ManagementSecrets like API tokens and webhook URLs are expected to be provided via environment variables, but the plugin's documentation does not explicitly mention how these secrets are handled or if they are stored securely (e.g., in userConfig with `sensitive: true`).
- warning:Data ExfiltrationSome hooks require credentials (API tokens, webhook URLs) to be sent to third-party services (Slack, Telegram, Discord), and the documentation does not specify if these are handled securely or if there's an opt-out mechanism.
- warning:Hook securityWhile the hooks are primarily for notifications, the broad wildcard matchers ('*') could potentially lead to unexpected executions if not carefully managed, and secrets are handled via environment variables without explicit guidance on secure storage.
- warning:Keychain-stored secretsThe plugin uses environment variables for secrets like API keys and webhook URLs, but it does not explicitly route these through `userConfig` with `sensitive: true`, which is the recommended way to handle secrets for keychain storage.
Code Execution
- warning:ValidationThe hook scripts use environment variables for configuration but do not demonstrate explicit schema validation for these parameters, potentially leading to unexpected behavior if variables are malformed or missing.
- warning:Error HandlingThe bash scripts for hooks do not show explicit error handling for API calls or environment variable lookups, meaning errors might be opaque or unhandled.
- info:LoggingThe hooks do not appear to implement local audit logging for their actions; notifications are sent externally.
Compliance
- warning:GDPRThe hooks send notification data to third-party services (Slack, Discord, Telegram) which may involve personal data if such data is included in the tool's output or context. Sanitization of this data before sending is not explicitly documented.
- warning:Hook privacyHooks send data to external notification services. While this is the intended functionality, the documentation could be clearer about what data is sent and how it is protected, especially concerning credentials.
Errors
- warning:Actionable error messagesThe error handling in the bash scripts is minimal; errors from external API calls or missing environment variables may not be user-friendly or provide clear remediation steps.
Invocation
- warning:Hook matcher tightnessSeveral hooks use a wildcard matcher ('*') for their event type or tool, which is too broad and could lead to unintended hook executions.
Installation
First, add the marketplace
/plugin marketplace add davepoon/buildwithclaude/plugin install hooks-notifications@buildwithclaudeQuality Score
Similar Extensions
Cc Safe Setup
99734 safety hooks for Claude Code — prevent file deletion, credential leaks, git disasters, and token waste during autonomous AI coding sessions
Claude Code Hooks
99Production safety hooks for autonomous Claude Code operation. Context monitoring, syntax checking, branch protection, activity logging, and more.
Tdd
99TDD workflow enforcement with auto-test hook
Claude Recap
99Topic-based automatic memory for Claude Code — never lose context across sessions or compactions.
Hooks Safety
99Essential safety hooks to prevent destructive operations in Claude Code. From cc-safe-setup (655+ hooks).
Hooks Automation
99Automation Hooks - Event-driven automation hooks