@samfp/pi-steering-hooks
Deterministic tool-call guardrails for pi — enforce rules with before-tool hooks instead of prompts. Zero token cost, 100% reliability.
Package details
Install @samfp/pi-steering-hooks from npm and Pi will load the resources declared by the package manifest.
$ pi install npm:@samfp/pi-steering-hooks- Package
@samfp/pi-steering-hooks- Version
0.2.0- Published
- Apr 21, 2026
- Downloads
- 271/mo · 6/wk
- Author
- samfp
- License
- MIT
- Types
- extension
- Size
- 24.3 KB
- Dependencies
- 0 dependencies · 1 peer
Pi manifest JSON
{
"extensions": [
"./src/index.ts"
]
}Security note
Pi packages can execute code and influence agent behavior. Review the source before installing third-party packages.
README
pi-steering-hooks
Deterministic tool-call guardrails for pi. Enforce rules with before-tool hooks instead of prompts — zero token cost, 100% reliability.
Prompt-based rules ("never force push") work most of the time. Steering hooks work every time. They intercept tool calls before execution and block violations deterministically, with an override escape hatch for when the agent has a good reason.
Inspired by Strands Agents: Steering Accuracy Beats Prompts.
Install
pi install @samfp/pi-steering-hooks
Default Rules
| Rule | Tool | What it blocks |
|---|---|---|
no-force-push |
bash | git push --force (destructive history rewrite) |
no-hard-reset |
bash | git reset --hard (discards uncommitted work) |
no-rm-rf-slash |
bash | rm -rf / (catastrophic, no override allowed) |
conventional-commits |
bash | Non-conventional git commit -m messages |
no-long-running-commands |
bash | Dev servers and watchers that block the agent |
Override Mechanism
When a rule fires, the agent can retry with an override comment:
git push --force origin main # steering-override: no-force-push — deploying hotfix to unblock prod
The override is allowed through but logged to the session for audit. Rules with noOverride: true (like no-rm-rf-slash) cannot be overridden.
Custom Rules
Create steering.json in your project root or ~/.pi/agent/:
{
"disable": ["conventional-commits"],
"rules": [
{
"name": "no-git-push",
"tool": "bash",
"field": "command",
"pattern": "\\bgit\\s+push\\b",
"reason": "Use `cr` instead of `git push`."
},
{
"name": "aws-requires-profile",
"tool": "bash",
"field": "command",
"pattern": "\\baws\\s+[a-z]",
"unless": "(--profile|AWS_PROFILE=|\\baws\\s+(sts\\s+get-caller-identity|configure)\\b)",
"reason": "Always use --profile or AWS_PROFILE with aws CLI commands."
},
{
"name": "no-write-env-files",
"tool": "write",
"field": "path",
"pattern": "\\.env",
"reason": "Don't overwrite .env files — they may contain secrets.",
"noOverride": true
}
]
}
Rule Format
| Field | Type | Description |
|---|---|---|
name |
string | Unique rule identifier |
tool |
"bash" | "write" | "edit" |
Which tool to intercept |
field |
"command" | "path" | "content" |
Which input field to test |
pattern |
string | Regex — if it matches, the rule fires (violation) |
requires |
string? | Additional regex that must also match (AND condition) |
unless |
string? | Regex exemption — if this matches, rule doesn't fire |
reason |
string | Message shown to the agent when blocked |
noOverride |
boolean? | If true, no override escape hatch |
Config Locations
Checked in order (first found wins):
./steering.json(project root)~/.pi/agent/steering.json(global)
How It Works
- Extension registers a
tool_callhook - On every bash/write/edit call, rules are evaluated against the tool input
- If a rule matches: block the call and return the reason to the agent
- Agent sees the block message and adjusts its approach
- If the agent has a legitimate reason, it can retry with
# steering-override: rule-name — reason - Overrides are logged via
appendEntryfor audit
No tokens spent on rule enforcement. No prompt drift. No "oops, the model forgot the rule this time."
License
MIT