Back to Home
CheckPointSW icon

mcp-servers

Verified Safe

by CheckPointSW

Overview

Provides AI assistants with capabilities for malware analysis, file scanning, and threat detection by integrating with Check Point's Threat Emulation and Anti-Virus cloud services.

Installation

Run Command
npx @chkp/threat-emulation-mcp

Environment Variables

  • API_KEY
  • TELEMETRY_DISABLED
  • TELEMETRY_URL
  • DEBUG

Security Notes

The system utilizes standard API key authentication (or OAuth for Spark Management, interactive prompts for Gaia) for Check Point services. Credentials are handled securely, either passed as API keys, exchanged for bearer tokens, or cached in-memory per session (Gaia). Interactive UI dialogs for authentication run a local HTTP server and open a browser to a localhost URL, with URL validation to prevent external access. Telemetry is opt-out and uses hashed machine IDs, without sensitive data. File path inputs (e.g., for `file_path` in `upload_file`) are processed using Node.js's `fs` module, which means the MCP server requires read access to the specified paths. The security risk here depends heavily on the privileges of the running MCP server process and the trustworthiness of the client invoking the AI. The `bundle-mcp.js` and `build-mcpb.js` scripts use `execSync` for build-time tasks (npm install, chmod, mcpb pack) but not in the runtime server logic. Regular expressions are heavily used in `cpinfo-analysis`, which could theoretically pose a ReDoS risk if applied to arbitrary untrusted input, but are generally applied to diagnostic log file content.

Similar Servers

Stats

Interest Score42
Security Score8
Cost ClassMedium
Avg Tokens1500
Stars28
Forks10
Last Update2026-01-19

Tags

Malware AnalysisThreat DetectionFile ScanningAnti-VirusCloud SecurityAI Automation