coding-agent
Fail
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The README.md file recommends installing the Kiro CLI tool using a high-risk remote execution pattern.
- Evidence:
curl -fsSL https://cli.kiro.dev/install | bashin README.md. - [PROMPT_INJECTION]: The skill provides instructions that explicitly bypass the safety protocols and user confirmation prompts of the underlying AI agents.
- Evidence: The skill instructs the agent to use
--trust-all-toolsfor Kiro CLI to skip confirmation prompts and--yolofor Codex, which is described as having "NO sandbox, NO approvals (fastest, most dangerous)" in SKILL.md. - The agent is encouraged to use
mktemp -d && git initto bypass Codex's restriction against running in untrusted directories. - [COMMAND_EXECUTION]: The skill relies on the
bashtool to execute arbitrary shell commands for launching various third-party coding agents. - Evidence: Multiple instances of
bash pty:true command:"..."across SKILL.md for runningkiro-cli,claude,codex,opencode, andpi. - [EXTERNAL_DOWNLOADS]: The skill references and installs external software from third-party repositories and domains.
- Evidence: Downloads from
https://cli.kiro.dev/installand installation of the Node.js package@mariozechner/pi-coding-agent. - [DATA_EXFILTRATION]: While no direct exfiltration is present, the coding agents are granted broad read/write access to the user's filesystem (
workdir), which creates a significant risk if the agent is influenced by indirect prompt injection from analyzed code.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.kiro.dev/install - DO NOT USE without thorough review
Audit Metadata