<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Extension on Mathias WOLFF</title><link>https://www.blog-des-telecoms.com/en/tags/extension/</link><description>Recent content in Extension on Mathias WOLFF</description><generator>Hugo</generator><language>en-US</language><copyright>&lt;a href="https://www.blog-des-telecoms.com"&gt;Blog des télécoms&lt;/a&gt; © 2009 - 2026 by &lt;a href="https://www.linkedin.com/in/mathias-wolff-47a7941/"&gt;Mathias WOLFF&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by-nc-sa/4.0/"&gt;CC BY-NC-SA 4.0&lt;/a&gt;&lt;img src="https://mirrors.creativecommons.org/presskit/icons/cc.svg" style="max-width: 1em;max-height:1em;margin-left: .2em;"&gt;&lt;img src="https://mirrors.creativecommons.org/presskit/icons/by.svg" style="max-width: 1em;max-height:1em;margin-left: .2em;"&gt;&lt;img src="https://mirrors.creativecommons.org/presskit/icons/nc.svg" style="max-width: 1em;max-height:1em;margin-left: .2em;"&gt;&lt;img src="https://mirrors.creativecommons.org/presskit/icons/sa.svg" style="max-width: 1em;max-height:1em;margin-left: .2em;"&gt;</copyright><lastBuildDate>Thu, 07 May 2026 18:07:06 +0200</lastBuildDate><atom:link href="https://www.blog-des-telecoms.com/en/tags/extension/index.xml" rel="self" type="application/rss+xml"/><item><title>Securing pi from the Inside: Guards, Scanners, and Audit with pi-secured-setup</title><link>https://www.blog-des-telecoms.com/en/blog/securing-pi-from-the-inside-guards-scanners-audit/</link><pubDate>Thu, 07 May 2026 10:00:00 +0200</pubDate><guid>https://www.blog-des-telecoms.com/en/blog/securing-pi-from-the-inside-guards-scanners-audit/</guid><description>&lt;p&gt;A few days ago, I covered &lt;strong&gt;Greywall&lt;/strong&gt; — a kernel-level sandbox that contains pi with a deny-by-default approach. That&amp;rsquo;s your outer wall. But what about threats &lt;strong&gt;inside&lt;/strong&gt; the boundary? The agent that accidentally writes to the wrong project, the &lt;code&gt;.env&lt;/code&gt; file that ends up in the LLM context, the skill whose &lt;code&gt;SKILL.md&lt;/code&gt; was silently modified. That&amp;rsquo;s a different problem, and it needs a different tool.&lt;/p&gt;
&lt;p&gt;Today I&amp;rsquo;m releasing &lt;strong&gt;pi-secured-setup&lt;/strong&gt; — a pi extension that adds &lt;strong&gt;Guards&lt;/strong&gt;, &lt;strong&gt;Scanners&lt;/strong&gt;, and an &lt;strong&gt;audit trail&lt;/strong&gt; directly inside the agent. No kernel modules, no containers, no external dependencies. Just a &lt;code&gt;pi install&lt;/code&gt; and you&amp;rsquo;re protected.&lt;/p&gt;</description></item></channel></rss>