Kiro provides powerful capabilities that can modify your system and AWS resources. Understanding security implications and following best practices helps you use these capabilities safely.
When using Kiro, be aware of the following potential security risks:
These risks are significantly increased when using /tools trust-all or /acceptall, which bypass confirmation prompts.
Specific examples of risks include:
When using Kiro in any environment, especially those with sensitive files, private keys, tokens, or other confidential information, consider implementing these security measures:
By default, Kiro can read files without asking for permission each time (Read is trusted by default). For sensitive environments, you can restrict this behavior:
/tools untrust read
With this setting, Kiro will ask for your explicit permission before reading any file. This gives you granular control over which files Kiro can access during your session.
You can also make this setting persistent by adding it to your shell startup script:
echo 'alias kiro-cli="kiro-cli --untrust-fs-read"' >> ~/.bashrc
This ensures that every new Kiro session starts with Read untrusted, requiring explicit permission for file access.
For environments with highly sensitive information, consider these additional measures:
/tools untrust use_aws to require explicit permission before making AWS API callsIf you must use /tools trustall or /acceptall for specific workflows, follow these safety practices to minimize risks:
/tools trust-all only for specific tasks, then immediately disable it using /tools reset to return to default permissions/tools trust-all/tools trust-all is enabled/tools trust-all is enabledTo return to the default permission settings after using /tools trust-all, use the reset command:
/tools reset
This reverts all tools to their default permission levels, with only Read trusted by default.
Security considerations