Beta Release: Cascade Hooks are currently in beta and undergoing active development. Features and APIs may change. Please contact Windsurf Support with feedback or bug reports.
Hooks are designed for power users and enterprise teams who need fine-grained control over Cascade’s behavior. They require basic shell scripting knowledge.
What You Can Build
Hooks unlock a wide range of automation and governance capabilities:- Logging & Analytics: Track every file read, code change, or command executed by Cascade for compliance and usage analysis
- Security Controls: Block Cascade from accessing sensitive files or running dangerous commands
- Quality Assurance: Run linters, formatters, or tests automatically after code modifications
- Custom Workflows: Integrate with issue trackers, notification systems, or deployment pipelines
- Team Standardization: Enforce coding standards and best practices across your organization
How Hooks Work
Hooks are shell commands that run automatically when specific Cascade actions occur. Each hook:- Receives context (details about the action being performed) via JSON as standard input
- Executes your script - Python, Bash, Node.js, or any executable
- Returns a result via exit code and output streams
2. This makes pre-hooks ideal for implementing security policies or validation checks.
Configuration
Hooks are configured in JSON files that can be placed at three different levels. Cascade loads and merges hooks from all locations, giving teams flexibility in how they distribute and manage hook configurations.System-Level
System-level hooks are ideal for organization-wide policies enforced on shared development machines. For example, you can use them to enforce security policies, compliance requirements, or mandatory code review workflows.- macOS:
/Library/Application Support/Windsurf/hooks.json - Linux/WSL:
/etc/windsurf/hooks.json - Windows:
C:\ProgramData\Windsurf\hooks.json
User-Level
User-level hooks are perfect for personal preferences and optional workflows.- Location:
~/.codeium/windsurf/hooks.json
Workspace-Level
Workspace-level hooks allow teams to version control project-specific policies alongside their code. They may include custom validation rules, project-specific integrations, or team-specific workflows.- Location:
.windsurf/hooks.jsonin your workspace root
Hooks from all three locations are merged together. If the same hook event is configured in multiple locations, all hooks will execute in order: system → user → workspace.
Basic Structure
Here is an example of the basic structure of the hooks configuration:Configuration Options
Each hook accepts the following parameters:| Parameter | Type | Description |
|---|---|---|
command | string | The shell command to execute. Can be any valid executable with arguments. |
show_output | boolean | Whether to display the hook’s stdout/stderr output on the user-facing Cascade UI. Useful for debugging. |
working_directory | string | Optional. The directory to execute the command from. Defaults to your workspace root. |
Hook Events
Cascade provides eight hook events that cover the most critical actions in the agent workflow.Common Input Structure
All hooks receive a JSON object with the following common fields:| Field | Type | Description |
|---|---|---|
agent_action_name | string | The hook event name (e.g., “pre_read_code”, “post_write_code”) |
trajectory_id | string | Unique identifier for the overall Cascade conversation |
execution_id | string | Unique identifier for the single agent turn |
timestamp | string | ISO 8601 timestamp when the hook was triggered |
tool_info | object | Event-specific information (varies by hook type) |
pre_read_code
Triggered before Cascade reads a code file. This may block the action if the hook exits with code 2. Use cases: Restrict file access, log read operations, check permissions Input JSON:file_path may be a directory path when Cascade reads a directory recursively.
post_read_code
Triggered after Cascade successfully reads a code file. Use cases: Log successful reads, track file access patterns Input JSON:file_path may be a directory path when Cascade reads a directory recursively.
pre_write_code
Triggered before Cascade writes or modifies a code file. This may block the action if the hook exits with code 2. Use cases: Prevent modifications to protected files, backup files before changes Input JSON:post_write_code
Triggered after Cascade writes or modifies a code file. Use cases: Run linters, formatters, or tests; log code changes Input JSON:pre_run_command
Triggered before Cascade executes a terminal command. This may block the action if the hook exits with code 2. Use cases: Block dangerous commands, log all command executions, add safety checks Input JSON:post_run_command
Triggered after Cascade executes a terminal command. Use cases: Log command results, trigger follow-up actions Input JSON:pre_mcp_tool_use
Triggered before Cascade invokes an MCP (Model Context Protocol) tool. This may block the action if the hook exits with code 2. Use cases: Log MCP usage, restrict which MCP tools can be used Input JSON:post_mcp_tool_use
Triggered after Cascade successfully invokes an MCP tool. Use cases: Log MCP operations, track API usage, see MCP results Input JSON:Exit Codes
Your hook scripts communicate results through exit codes:| Exit Code | Meaning | Effect |
|---|---|---|
0 | Success | Action proceeds normally |
2 | Blocking Error | The Cascade agent will see the error message from stderr. For pre-hooks, this blocks the action. |
| Any other | Error | Action proceeds normally |
Only pre-hooks (pre_read_code, pre_write_code, pre_run_command, pre_mcp_tool_use) can block actions using exit code 2. Post-hooks cannot block since the action has already occurred.
show_output is true.
Example Use Cases
Logging All Cascade Actions
Track every action Cascade takes for auditing purposes. Config (~/.codeium/windsurf/hooks.json):
log_input.py):
Restricting File Access
Prevent Cascade from reading files outside a specific directory. Config (~/.codeium/windsurf/hooks.json):
block_read_access.py):
Blocking Dangerous Commands
Prevent Cascade from executing potentially harmful commands. Config (~/.codeium/windsurf/hooks.json):
block_dangerous_commands.py):
Running Code Formatters After Edits
Automatically format code files after Cascade modifies them. Config (~/.codeium/windsurf/hooks.json):
format_code.sh):
Best Practices
Security
Use Cascade Hooks at Your Own Risk: Hooks execute shell commands automatically with your user account’s full permissions. You are entirely responsible for the code you configure. Poorly designed or malicious hooks can modify files, delete data, expose credentials, or compromise your system.
- Validate all inputs: Never trust the input JSON without validation, especially for file paths and commands.
- Use absolute paths: Always use absolute paths in your hook configurations to avoid ambiguity.
- Protect sensitive data: Avoid logging sensitive information like API keys or credentials.
- Review permissions: Ensure your hook scripts have appropriate file system permissions.
- Audit before deployment: Review every hook command and script before adding to your configuration.
- Test in isolation: Run hooks in a test environment before enabling them on your primary development machine.
Performance Considerations
- Keep hooks fast: Slow hooks will impact Cascade’s responsiveness. Aim for sub-100ms execution times.
- Use async operations: For non-blocking hooks, consider logging to a queue or database asynchronously.
- Filter early: Check the action type at the start of your script to avoid unnecessary processing.
Error Handling
- Always validate JSON: Use try-catch blocks to handle malformed input gracefully.
- Log errors properly: Write errors to
stderrso they’re visible whenshow_outputis enabled. - Fail safely: If your hook encounters an error, consider whether it should block the action or allow it to proceed.
Testing Your Hooks
- Start with logging: Begin by implementing a simple logging hook to understand the data flow.
- Use
show_output: true: Enable output during development to see what your hooks are doing. - Test blocking behavior: Verify that exit code 2 properly blocks actions in pre-hooks.
- Check all code paths: Test both success and failure scenarios in your scripts.
Enterprise Distribution
Enterprise organizations need to enforce security policies, compliance requirements, and development standards that individual users cannot bypass. Cascade Hooks supports this through system-level configuration, which takes precedence and cannot be disabled by end users without root permissions. Deploy your mandatoryhooks.json configuration to these OS-specific locations:
macOS:
/usr/local/share/windsurf-hooks/ on Unix systems).
Deployment Methods
Enterprise IT teams can deploy system-level hooks using standard tools and workflows: Mobile Device Management (MDM)- Jamf Pro (macOS) - Deploy via configuration profiles or scripts
- Microsoft Intune (Windows/macOS) - Use PowerShell scripts or policy deployment
- Workspace ONE, Google Endpoint Management, and other MDM solutions
- Ansible, Puppet, Chef, SaltStack - Use your existing infrastructure automation
- Custom deployment scripts - Shell scripts, PowerShell, or your preferred tooling
Verification and Auditing
After deployment, verify that hooks are properly installed and cannot be bypassed:Important: System-level hooks are entirely managed by your IT or security team. Windsurf does not deploy or manage files at system-level paths. Ensure your internal teams handle deployment, updates, and compliance according to your organization’s policies.
Workspace Hooks for Team Projects
For project-specific conventions, teams can use workspace-level hooks in version control:Additional Resources
- MCP Integration: Learn more about Model Context Protocol in Windsurf
- Workflows: Discover how to combine hooks with Cascade Workflows
- Analytics: Track Cascade usage with Team Analytics