This document discusses preventing key-recovery attacks on keyed intrusion detection systems (KIDS). KIDS is designed to introduce a secret key to make operations impossible without knowing the key, thereby preventing evasion attacks. However, the document shows that recovering the key is possible with a small number of queries if the attacker can interact with KIDS and receive feedback on probing requests. Two instantiations of such attacks are presented for different adversarial settings, demonstrating that KIDS does not meet its security claims of making key recovery infeasible. The document concludes by revisiting KIDS' core design and providing heuristic arguments about its suitability and limitations.