8.0 KiB
Gemini CLI hooks
Hooks are scripts or programs that Gemini CLI executes at specific points in the agentic loop, allowing you to intercept and customize behavior without modifying the CLI's source code.
What are hooks?
Hooks run synchronously as part of the agent loop—when a hook event fires, Gemini CLI waits for all matching hooks to complete before continuing.
With hooks, you can:
- Add context: Inject relevant information (like git history) before the model processes a request.
- Validate actions: Review tool arguments and block potentially dangerous operations.
- Enforce policies: Implement security scanners and compliance checks.
- Log interactions: Track tool usage and model responses for auditing.
- Optimize behavior: Dynamically filter available tools or adjust model parameters.
Getting started
- Writing hooks guide: A tutorial on creating your first hook with comprehensive examples.
- Best practices: Guidelines on security, performance, and debugging.
- Hooks reference: The definitive technical specification of I/O schemas and exit codes.
Core concepts
Hook events
Hooks are triggered by specific events in Gemini CLI's lifecycle.
| Event | When It Fires | Impact | Common Use Cases |
|---|---|---|---|
SessionStart |
When a session begins (startup, resume, clear) | Inject Context | Initialize resources, load context |
SessionEnd |
When a session ends (exit, clear) | Advisory | Clean up, save state |
BeforeAgent |
After user submits prompt, before planning | Block Turn / Context | Add context, validate prompts, block turns |
AfterAgent |
When agent loop ends | Retry / Halt | Review output, force retry or halt execution |
BeforeModel |
Before sending request to LLM | Block Turn / Mock | Modify prompts, swap models, mock responses |
AfterModel |
After receiving LLM response | Block Turn / Redact | Filter/redact responses, log interactions |
BeforeToolSelection |
Before LLM selects tools | Filter Tools | Filter available tools, optimize selection |
BeforeTool |
Before a tool executes | Block Tool / Rewrite | Validate arguments, block dangerous ops |
AfterTool |
After a tool executes | Block Result / Context | Process results, run tests, hide results |
PreCompress |
Before context compression | Advisory | Save state, notify user |
Notification |
When a system notification occurs | Advisory | Forward to desktop alerts, logging |
Global mechanics
Understanding these core principles is essential for building robust hooks.
Strict JSON requirements (The "Golden Rule")
Hooks communicate via stdin (Input) and stdout (Output).
- Silence is Mandatory: Your script must not print any plain text to
stdoutother than the final JSON object. Even a singleechoorprintcall before the JSON will break parsing. - Pollution = Failure: If
stdoutcontains non-JSON text, parsing will fail. The CLI will default to "Allow" and treat the entire output as asystemMessage. - Debug via Stderr: Use
stderrfor all logging and debugging (e.g.,echo "debug" >&2). Gemini CLI capturesstderrbut never attempts to parse it as JSON.
Exit codes
Gemini CLI uses exit codes to determine the high-level outcome of a hook execution:
| Exit Code | Label | Behavioral Impact |
|---|---|---|
| 0 | Success | The stdout is parsed as JSON. Preferred code for all logic, including intentional blocks (e.g., {"decision": "deny"}). |
| 2 | System Block | Critical Block. The target action (tool, turn, or stop) is aborted. stderr is used as the rejection reason. High severity; used for security stops or script failures. |
| Other | Warning | Non-fatal failure. A warning is shown, but the interaction proceeds using original parameters. |
Matchers
You can filter which specific tools or triggers fire your hook using the
matcher field.
- Tool events (
BeforeTool,AfterTool): Matchers are Regular Expressions. (e.g.,"write_.*"). - Lifecycle events: Matchers are Exact Strings. (e.g.,
"startup"). - Wildcards:
"*"or""(empty string) matches all occurrences.
Configuration
Hooks are configured in settings.json. Gemini CLI merges configurations from
multiple layers in the following order of precedence (highest to lowest):
- Project settings:
.gemini/settings.jsonin the current directory. - User settings:
~/.gemini/settings.json. - System settings:
/etc/gemini-cli/settings.json. - Extensions: Hooks defined by installed extensions.
Configuration schema
{
"hooks": {
"BeforeTool": [
{
"matcher": "write_file|replace",
"hooks": [
{
"name": "security-check",
"type": "command",
"command": "$GEMINI_PROJECT_DIR/.gemini/hooks/security.sh",
"timeout": 5000
}
]
}
]
}
}
Hook configuration fields
| Field | Type | Required | Description |
|---|---|---|---|
type |
string | Yes | The execution engine. Currently only "command" is supported. |
command |
string | Yes* | The shell command to execute. (Required when type is "command"). |
name |
string | No | A friendly name for identifying the hook in logs and CLI commands. |
timeout |
number | No | Execution timeout in milliseconds (default: 60000). |
description |
string | No | A brief explanation of the hook's purpose. |
Environment variables
Hooks are executed with a sanitized environment.
GEMINI_PROJECT_DIR: The absolute path to the project root.GEMINI_SESSION_ID: The unique ID for the current session.GEMINI_CWD: The current working directory.CLAUDE_PROJECT_DIR: (Alias) Provided for compatibility.
Security and risks
Warning: Hooks execute arbitrary code with your user privileges. By configuring hooks, you are allowing scripts to run shell commands on your machine.
Project-level hooks are particularly risky when opening untrusted projects.
Gemini CLI fingerprints project hooks. If a hook's name or command changes
(e.g., via git pull), it is treated as a new, untrusted hook and you will
be warned before it executes.
See Security Considerations for a detailed threat model.
Managing hooks
Use the CLI commands to manage hooks without editing JSON manually:
- View hooks:
/hooks panel - Enable/Disable all:
/hooks enable-allor/hooks disable-all - Toggle individual:
/hooks enable <name>or/hooks disable <name>