Skip to content

Commit a36f7f4

Browse files
authored
Schema adjustments
Clean up some unnecessary files Some Schema adjusments Add License
2 parents 459fef4 + 28e14ed commit a36f7f4

13 files changed

+274
-290
lines changed

.gitignore

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,6 @@ npm-debug.log*
2020
.DS_Store
2121
Thumbs.db
2222

23-
python_code/
24-
2523
# TypeScript build info
2624
*.tsbuildinfo
2725

Dockerfile

Lines changed: 0 additions & 14 deletions
This file was deleted.

Dockerfile_base

Lines changed: 0 additions & 11 deletions
This file was deleted.

LICENSE

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
MIT License
2+
3+
Copyright (c) 2025 Check Point Software Technologies Ltd.
4+
5+
Permission is hereby granted, free of charge, to any person obtaining a copy
6+
of this software and associated documentation files (the "Software"), to deal
7+
in the Software without restriction, including without limitation the rights
8+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9+
copies of the Software, and to permit persons to whom the Software is
10+
furnished to do so, subject to the following conditions:
11+
12+
The above copyright notice and this permission notice shall be included in all
13+
copies or substantial portions of the Software.
14+
15+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21+
SOFTWARE.

README.md

Lines changed: 24 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,17 @@
22

33
## What is MCP?
44

5-
The Model Context Protocol (MCP) is a standardized interface that allows AI agents and automation tools to interact programmatically with Check Point Quantum Management servers. Using MCP, you can:
5+
Model Context Protocol (MCP) servers expose a structured, machine-readable API for your enterprise data—designed for AI-powered automation, copilots, and decision engines. By delivering a clear, contextual slice of your security environment, MCP lets you query, analyze, and optimize complex systems without building custom SDKs or parsing raw exports.
6+
7+
## Why MCP for Security?
8+
9+
Security Policies often span hundreds of rules and thousands of objects across diverse enforcement points. Understanding, auditing, or optimizing these environments is slow and error-prone.
10+
MCP changes this: exposing security management data in a modular, context-rich format, ready for AI systems to consume. Enabling the AI to use your data with precision. Ask real-world questions, and get structured, actionable answers—instantly.
11+
12+
## Features
613

714
- Query and visualize installed policies, rulebases, and network topology
8-
- Retrieve and analyze access, NAT, and threat prevention rules
15+
- Retrieve and analyze access, NAT and VPN rules
916
- List and inspect objects such as hosts, networks, services, VPN communities, and more
1017

1118
## Demo
@@ -14,21 +21,25 @@ The Model Context Protocol (MCP) is a standardized interface that allows AI agen
1421

1522
## Example Use Cases
1623

17-
### Ensure regulatory compliance with industry standards
18-
Prompt: Check if my gateway configuration meets PCI-DSS/HIPAA/GDPR requirements.
19-
20-
### Find broad-definition rules
21-
Prompt: List all firewall rules that allow traffic from any source to any destination on any port. Highlight rules that are disabled or unused.
24+
### Regulatory Compliance Checks
25+
“Do my current gateways meet PCI-DSS, HIPAA, or GDPR standards?”
26+
*→ Returns a detailed gap analysis across your policy layers.*
2227

23-
### Source → Destination Path Analysis
24-
Prompt: Can you check in my policy if a host or network can access the internet?
28+
### Risky Rule Discovery
29+
“Show all rules that allow any-to-any traffic. Highlight unused or disabled rules.”
30+
*→ Surfaces misconfigurations and expands your visibility.*
2531

26-
### Recommendation for rulebase optimization
27-
Prompt: Take a look at the internet-facing rules in my policy and suggest improvements. Identify any rules that should be strengthened or loosened. Consider both security risks and administrative overhead. In your recommendations, refer only to specific rules that can be changed or suggest adding new ones.
32+
### Path Analysis for Access
33+
“Can host 10.1.2.7 access the internet under current policy?”
34+
*→ Traces real access flows across Access, NAT, and interfaces.*
2835

29-
### Custom policy visualizations
30-
Prompt: Please create a visual report that shows which services are allowed in my network, under which conditions, and which services are strictly blocked.
36+
### Rulebase Optimization with AI
37+
“Review internet-facing rules and suggest which should be tightened or removed.”
38+
*→ Actionable insights that improve your security posture.*
3139

40+
### Visual Policy Mapping
41+
“Generate a report showing allowed and blocked services across my environment.”
42+
*→ Delivers structured data for dashboards, reports, and audits.*
3243
---
3344

3445
## Configuration Options

packages/infra/src/utils.ts

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -45,19 +45,21 @@ export async function getApiManager(): Promise<APIManagerBase> {
4545
* Call the management API
4646
*/
4747
export async function callManagementApi(
48-
method: string = 'POST',
49-
uri: string = '',
50-
params: Record<string, any> = {}
51-
): Promise<Record<string, any>> {
48+
method: string = "POST",
49+
uri: string = "",
50+
kwargs: Record<string, any> = {}
51+
): Promise<any> {
5252
const s1cManager = await getApiManager();
5353
const data: Record<string, any> = {};
5454

55-
// Convert snake_case to kebab-case for API parameters
56-
for (const [key, value] of Object.entries(params)) {
57-
if (value === null || value === '') {
55+
for (const [key, value] of Object.entries(kwargs)) {
56+
// Skip null, undefined, empty strings, and empty arrays
57+
if (value === null || value === undefined || value === "" ||
58+
(Array.isArray(value) && value.length === 0)) {
5859
continue;
5960
}
60-
const safeKey = key.replace(/_/g, '-');
61+
62+
const safeKey = key.replace(/_/g, "-");
6163
data[safeKey] = value;
6264
}
6365

packages/infra/tsconfig.tsbuildinfo

Lines changed: 0 additions & 1 deletion
This file was deleted.

packages/management/README.md

Lines changed: 24 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,17 @@
22

33
## What is MCP?
44

5-
The Model Context Protocol (MCP) is a standardized interface that allows AI agents and automation tools to interact programmatically with Check Point Quantum Management servers. Using MCP, you can:
5+
Model Context Protocol (MCP) servers expose a structured, machine-readable API for your enterprise data—designed for AI-powered automation, copilots, and decision engines. By delivering a clear, contextual slice of your security environment, MCP lets you query, analyze, and optimize complex systems without building custom SDKs or parsing raw exports.
6+
7+
## Why MCP for Security?
8+
9+
Security Policies often span hundreds of rules and thousands of objects across diverse enforcement points. Understanding, auditing, or optimizing these environments is slow and error-prone.
10+
MCP changes this: exposing security management data in a modular, context-rich format, ready for AI systems to consume. Enabling the AI to use your data with precision. Ask real-world questions, and get structured, actionable answers—instantly.
11+
12+
## Features
613

714
- Query and visualize installed policies, rulebases, and network topology
8-
- Retrieve and analyze access, NAT, and threat prevention rules
15+
- Retrieve and analyze access, NAT and VPN rules
916
- List and inspect objects such as hosts, networks, services, VPN communities, and more
1017

1118
## Demo
@@ -14,21 +21,25 @@ The Model Context Protocol (MCP) is a standardized interface that allows AI agen
1421

1522
## Example Use Cases
1623

17-
### Ensure regulatory compliance with industry standards
18-
Prompt: Check if my gateway configuration meets PCI-DSS/HIPAA/GDPR requirements.
19-
20-
### Find broad-definition rules
21-
Prompt: List all firewall rules that allow traffic from any source to any destination on any port. Highlight rules that are disabled or unused.
24+
### Regulatory Compliance Checks
25+
“Do my current gateways meet PCI-DSS, HIPAA, or GDPR standards?”
26+
*→ Returns a detailed gap analysis across your policy layers.*
2227

23-
### Source → Destination Path Analysis
24-
Prompt: Can you check in my policy if a host or network can access the internet?
28+
### Risky Rule Discovery
29+
“Show all rules that allow any-to-any traffic. Highlight unused or disabled rules.”
30+
*→ Surfaces misconfigurations and expands your visibility.*
2531

26-
### Recommendation for rulebase optimization
27-
Prompt: Take a look at the internet-facing rules in my policy and suggest improvements. Identify any rules that should be strengthened or loosened. Consider both security risks and administrative overhead. In your recommendations, refer only to specific rules that can be changed or suggest adding new ones.
32+
### Path Analysis for Access
33+
“Can host 10.1.2.7 access the internet under current policy?”
34+
*→ Traces real access flows across Access, NAT, and interfaces.*
2835

29-
### Custom policy visualizations
30-
Prompt: Please create a visual report that shows which services are allowed in my network, under which conditions, and which services are strictly blocked.
36+
### Rulebase Optimization with AI
37+
“Review internet-facing rules and suggest which should be tightened or removed.”
38+
*→ Actionable insights that improve your security posture.*
3139

40+
### Visual Policy Mapping
41+
“Generate a report showing allowed and blocked services across my environment.”
42+
*→ Delivers structured data for dashboards, reports, and audits.*
3243
---
3344

3445
## Configuration Options

0 commit comments

Comments
 (0)