kiro-review
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted code changes via
git diffand repository source files, then incorporates this content into a prompt for an external AI (kiro-cli). The instruction template lacks explicit boundary markers or sanitization to prevent instructions embedded within the code from overriding the review task.\n - Ingestion points:
git diffoutput and source file content (viakiro-clitool use) in SKILL.md.\n - Boundary markers: Absent in the review prompt templates provided in SKILL.md.\n
- Capability inventory: The skill can read any file in the repository and transmit data externally via
kiro-cliin SKILL.md.\n - Sanitization: No sanitization or escaping is applied to the code content before it is processed by the AI.\n- [DATA_EXFILTRATION]: The skill reads project source code and diffs, sending this information to an external AI service via
kiro-cli chat. While this is the intended purpose, it poses a data exposure risk if the codebase contains sensitive information or hardcoded secrets.\n- [COMMAND_EXECUTION]: The workflow relies on executing shell commands, includinggitandkiro-cli. It explicitly recommends using the-a(trust all tools) flag forkiro-cli, which grants the underlying AI agent high privileges to access the filesystem without further confirmation. Additionally, dynamic prompt construction involving user-supplied descriptions could lead to command injection if not handled carefully by the agent.\n- [EXTERNAL_DOWNLOADS]: The skill has a mandatory dependency on the externalkiro-clitool. The security of the operation depends on the integrity and safety of this third-party CLI which is not part of the skill package itself.
Audit Metadata