Skip to content
| Marketplace
Sign in
Visual Studio Code>Other>Kiro YoloNew to Visual Studio Code? Get it now.
Kiro Yolo

Kiro Yolo

Carlos Eduardo Lino

| (0) | Free
| Sponsor
Auto-approve Kiro IDE agent executions with denylist safety. Open source, auditable, no telemetry.
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

Kiro Yolo

Auto-approve Kiro IDE agent executions so you can go hands-free. Dangerous commands are blocked by a configurable denylist.

Open source. Zero telemetry. Fully auditable.

Features

  • ⚡ Auto-approve — automatically accepts pending Kiro agent executions
  • 🛡️ Denylist safety — blocks dangerous commands (rm -rf, drop table, reverse shells, etc.)
  • 🔔 Idle alerts — plays a sound and/or flashes the taskbar when the agent finishes
  • 🚫 Auto-decline spec sessions — optionally skips spec session prompts
  • 📊 Status bar — shows current state and approved/blocked counts

How It Works

Polls Kiro's internal execution queue. If a pending execution doesn't match any denylist pattern, it auto-approves. If it matches, it blocks and logs the reason.

Commands

Command Description
Kiro Yolo: Toggle ON/OFF Enable/disable auto-approval
Kiro Yolo: Toggle Sound on Idle Toggle sound notification
Kiro Yolo: Toggle Flash on Idle Toggle taskbar flash
Kiro Yolo: Toggle Auto-Decline Spec Sessions Auto-answer "No" to spec prompts
Kiro Yolo: Dump Kiro Commands List all Kiro commands (debug)

Settings

Setting Default Description
kiroAutorun.enabled true Enable/disable auto-approval
kiroAutorun.pollIntervalSeconds 2 Seconds between polls
kiroAutorun.soundOnIdle true Play sound when agent finishes
kiroAutorun.flashOnIdle true Flash taskbar when agent finishes
kiroAutorun.autoDeclineSpec false Auto-decline spec session prompts
kiroAutorun.denylist (see below) Blocked command patterns

Default Denylist

The extension ships with a sensible default denylist that blocks:

  • Destructive file ops (rm -rf, del /f /s /q)
  • Privilege escalation (sudo rm, chmod 777)
  • Pipe-to-shell (curl | sh, wget | bash)
  • Database destruction (drop table, drop database, truncate table)
  • System commands (shutdown, reboot, mkfs)
  • Reverse shells and fork bombs
  • Force pushes (git push --force)

You can customize the denylist in VS Code settings.

Support

If this extension saves you time, consider supporting the project ☕

License

MIT

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft