The main purpose of this repository is to provide a ready-to-use environment for demonstrating the value of the Check Point MCP servers, while also providing a small framework for building a basic AI copilot for any Check Point environment.
It uses the OpenCode tool as the foundation for the chat interface and agent management, and it includes a Check Point-focused agent with a set of skills for interacting with the Check Point MCP servers and documentation.
It supports both traditional on-premises Check Point management servers and Smart-1 Cloud management.
Learning and lab use only. This repository is designed to support research, proof-of-concept work, and internal experimentation. It is not presented as production-ready software and does not by itself ensure legal compliance.
This environment works with:
- GitHub Codespaces
- Native Debian/Ubuntu machines, VMs or containers with Internet access and the ability to run the included startup scripts.
It starts the OpenCode Web UI, installs the Check Point MCP tools, provides a Check Point-focused agent and skill set, and runs a web server for HTML reports created by OpenCode agents.
See EU-AI-SOFTWARE-NOTICE.md for practical EU-facing guidance on responsible use, software/AI liability expectations, data handling, and escalation triggers.
The easiest way to use this repository for a demo is to use Check Point SmartConsole in "Demo Mode" with the public demo server.
- Open the latest version of Check Point SmartConsole and select "Demo Mode".
- Click "Next" to start a new demo session or use an existing one.
- Click "Login" to enter the demo environment.
- Once logged in, you can access the Check Point management server details from the middle of the dark bar at the bottom of SmartConsole by clicking "Cloud Demo Server". Then select "Demo Server Information" to copy the server IP address or DNS name.
- Note: We have seen issues using the DNS name in some environments, so the IP address is currently recommended.
- For simplicity, we will use the default demo credentials below, but you can also create a new user with an API key and publish the changes.
- Username:
admin - Password:
demo123
- Username:
WARNING! You can also use your own Check Point lab environment if you have one available, but the default setup in this environment will use free tools and models and may expose your data to the model provider. Please be careful before connecting any production environment or using personal data, customer data, incident data, or other sensitive material.
You will also need to create a free service account for the Check Point documentation tool to get the required client ID and secret key for documentation lookups.
Those same documentation portal credentials are also used by the Spark Management MCP server, so Spark support does not require any additional setup.
- Navigate to https://portal.checkpoint.com/ and log in with your account.
- Select an account/tenant where you are an administrator.
- Click the cog-wheel settings icon in the middle of the top bar.
- Select the "API Keys" menu.
- Click "New" → "New User API Key".
- Select your user, set an expiration time, add a description, and click "Create".
- Save the credentials: copy the generated
CLIENT_IDandSECRET_KEY.
More details can be found here: https://github.com/CheckPointSW/mcp-servers/tree/main/packages/documentation-tool
- If you want to use Codespaces secrets, add the required values before creating the Codespace, as explained below.
- If you do not know what Codespaces secrets are, read below, or enter the values during guided setup instead and skip this step.
- Create a new Codespace from this repository using the green "Use this template" button in the top-right corner, then click "Open in Codespaces".
- Wait 2–3 minutes for the Codespace to initialize.
- When the Codespace is ready, follow the instructions in INSTRUCTIONS.md, which are shown in the main Codespace view, for the next steps.
GitHub Codespaces supports encrypted secrets that can be used as environment variables in your Codespace. This is a good option if you want to avoid entering credentials during guided setup or if you want to keep them stored securely in GitHub.
You can create Codespaces secrets here: https://github.com/settings/codespaces/secrets/new
See the GitHub documentation for details: https://docs.github.com/en/codespaces/managing-your-codespaces/managing-your-account-specific-secrets-for-github-codespaces
Collect the required values first.
- Either:
CHECKPOINT_MGMT_HOSTfor on-premises management- or
CHECKPOINT_MGMT_URLfor Smart-1 Cloud
- Authentication:
- Smart-1 Cloud requires
CHECKPOINT_API_KEY - on-premises can use
CHECKPOINT_API_KEY - or
CHECKPOINT_USERNAME+CHECKPOINT_PASSWORD
- Smart-1 Cloud requires
CHECKPOINT_DOC_CLIENT_IDCHECKPOINT_DOC_SECRET_KEY
Optional values if you need to override defaults:
CHECKPOINT_MGMT_PORT(default443, on-premises only)CHECKPOINT_DOC_REGION(defaultEU)CHECKPOINT_DOC_AUTH_URLOPENCODE_SERVER_USERNAME(defaultopencode)OPENCODE_SERVER_PASSWORD(default blank, which disables OpenCode Web UI auth)OPENCODE_PORT(default4096)REPORTS_PORT(default8081)
Log into a Debian/Ubuntu machine with Internet access and follow the instructions below.
If Git is not already installed, see https://github.com/git-guides/install-git or https://git-scm.com/install/linux.
- Clone this repository onto a current Debian/Ubuntu machine.
git clone https://github.com/CheckPointSW-Community/cpcopilot-basic-template.git && cd cpcopilot-basic-template
- Run:
bash scripts/bootstrap-local-debian.sh - Complete the guided setup if prompted.
- Open the OpenCode URL printed by the script.
- Open the Reports URL printed by the script.
- In OpenCode, make sure to select the session and folder for this repository, even when not prompted.
- If the
CheckPoint-copilotagent is visible and active in the lower-left corner of the OpenCode Web UI, you are in the right folder and session. If not, open the folder list from the top-left...menu and select the session with the path to this repository.
- Ask the
CheckPoint-copilotagent questions or request reports about your Check Point environment, policies, logs, threat prevention, HTTPS inspection, and documentation, or just start with a simple "hey" to confirm that it's working. - See INSTRUCTIONS.md for example prompts and tips.
Outside Codespaces, the startup scripts prefer the machine's local network IP and fall back to localhost when needed.
- In guided setup, the first management prompt accepts either an on-premises DNS/IP value or a Smart-1 Cloud URL.
- If a Smart-1 Cloud URL is detected, setup requires
CHECKPOINT_API_KEYand skips the on-premises username/password and port prompts. - Example Smart-1 Cloud URL:
https://cloudinfra-gw-us.portal.checkpoint.com/your-tenant-id/web_api
- OpenCode Web UI on port
4096 - Reports server on port
8081 - Check Point MCP packages:
@chkp/quantum-management-mcp@chkp/spark-management-mcp@chkp/management-logs-mcp@chkp/threat-prevention-mcp@chkp/https-inspection-mcp@chkp/documentation-mcp
- default primary agent:
CheckPoint-copilot - default model:
opencode/big-pickle - project-local skills under
.opencode/skills/:checkpoint-copilotcheckpoint-brand-webui
- runtime environment values:
~/.config/opencode/checkpoint-secrets.env - runtime status:
~/.config/opencode/checkpoint-setup-status.json - global OpenCode config:
~/.config/opencode/opencode.json - project config:
opencode.json
No real credentials are stored in tracked files.
This repository is provided as a public template and helper environment for working with Check Point-related workflows.
- Check Point names, product names, and marks are trademarks or registered trademarks of their respective owner.
- Use any official logos, screenshots, or brand assets only with appropriate permission and in line with applicable brand guidelines.
- Before connecting any non-demo environment, review the privacy, security, data-handling, and liability implications for your organization.
- The MIT license for this repository does not by itself remove statutory liability or regulatory obligations that may apply under EU or Member State law.
- Nothing in this repository should be read as a claim of EU legal compliance, certification, CE marking, or legal guarantee.
- Review EU-AI-SOFTWARE-NOTICE.md and LAB-GOVERNANCE.md before production, customer-facing, or commercial use.
- Debian/Ubuntu bootstrap:
bash scripts/bootstrap-local-debian.sh - guided setup:
bash scripts/first-run-checkpoint-setup.sh - start OpenCode:
bash scripts/start-opencode-web.sh - start reports server:
bash scripts/start-report-server.sh - rerun welcome flow:
bash scripts/terminal-welcome.sh - validate environment:
bash scripts/validate-environment.sh
One or more required values are still missing.
Run:
bash scripts/first-run-checkpoint-setup.sh
Run:
bash scripts/start-opencode-web.sh
Then open the preferred URL printed in the terminal.
Run:
bash scripts/start-report-server.sh
Then open the preferred URL printed in the terminal.
The default model is opencode/big-pickle, but OpenCode Zen still needs to be connected.
Rerun:
bash scripts/setup-opencode.sh
or on Debian/Ubuntu:
bash scripts/bootstrap-local-debian.sh