Kiro Agentic IDE Guide

PassAudited by ClawScan on May 10, 2026.

Overview

This is a coherent Kiro workflow guide, but its examples include automated commands and credentialed external integrations that users should review before enabling.

This skill appears safe as a Kiro how-to/template package. Before copying its examples, verify the Kiro and MCP packages are official, use least-privilege credentials, narrow filesystem paths, review persistent .kiro steering/hooks/MCP files, and avoid automatic production deploys or destructive hooks unless you intentionally want them.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a user copies these hook patterns, Kiro may run commands that modify files, deploy to production, or perform other actions whenever the trigger fires.

Why it was flagged

The hooks reference documents shell commands that run automatically on events such as file deletion or git push.

Skill content
action: run "if [ -f {{test_file}} ]; then rm {{test_file}}; fi" ... action: run "vercel --prod"
Recommendation

Enable only trusted, scoped hooks; test them first; quote or sanitize file variables where applicable; and require human review for deploys, deletes, backups, or other high-impact actions.

What this means

Tokens or database URLs used here can grant access to repositories, databases, or workspaces, including mutation capabilities depending on the token scope.

Why it was flagged

The MCP examples pass service credentials into MCP servers for GitHub, PostgreSQL, and Slack integrations.

Skill content
"GITHUB_TOKEN": "${GITHUB_TOKEN}" ... "DATABASE_URL": "${DATABASE_URL}" ... "SLACK_BOT_TOKEN": "${SLACK_BOT_TOKEN}"
Recommendation

Use dedicated least-privilege tokens, avoid hardcoding secrets, rotate keys regularly, and enable only the MCP servers needed for the current project.

What this means

Project files or data from connected services may be read, written, or exposed through enabled MCP servers if paths or permissions are too broad.

Why it was flagged

The guide connects the agent environment to external MCP servers and local filesystem access, with boundaries controlled by server configuration.

Skill content
Model Context Protocol (MCP) 允许 Kiro 连接到外部工具、API 和数据源 ... "allowedPaths": ["/Users/mac/.openclaw/workspace"]
Recommendation

Keep allowedPaths narrow, review each MCP server’s permissions, inspect logs, and avoid enabling servers that are not required for the task.

What this means

A compromised or changed external npm package could affect the user’s agent environment if they run these examples.

Why it was flagged

The guide shows running external MCP server packages through npx without pinning versions; this is user-directed setup, not automatic execution.

Skill content
"command": "npx", "args": ["-y", "@modelcontextprotocol/server-github"]
Recommendation

Use official packages, pin known-good versions where possible, verify package provenance, and follow Kiro/MCP vendor documentation.

What this means

Untrusted changes to .kiro/steering files could influence future agent behavior or cause the agent to follow inappropriate project rules.

Why it was flagged

Steering files are persistent markdown rules and project context that Kiro agents may reuse across future tasks.

Skill content
Steering - 通过 markdown 文件定义自定义规则和项目上下文
Recommendation

Keep steering files under version control, review changes like code, and do not store secrets or untrusted instructions in persistent agent context.