54
grade D
2 days ago
glama

firewalla-mcp-server

A read-only MCP server that enables Claude to audit Firewalla network security configurations and monitor network activity. It provides tools to inspect devices, rules, alarms, and traffic flows without making any changes to the Firewalla system.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Known vulnerabilities in dependencies: 5 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
8 tools verified — handlers match their declared behaviour
8 read-only tools verified — handlers contain no write/delete/exec
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
🔐
You'll be asked for 1 credential: FIREWALLA_MSP_TOKEN
These are read from process.env at runtime. Make sure you trust where they’ll be sent.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configFIREWALLA_MSP_DOMAINYour MSP subdomain (no https://, no trailing slash) yourname.firewalla.net
🔐 secretFIREWALLA_MSP_TOKENPersonal access token from MSP Account Settings fwtoken_abc123...
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 4 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/productengineered-firewalla-mcp-82l0ih)](https://m8ven.ai/mcp/productengineered-firewalla-mcp-82l0ih)
commit: 60ed4df6244453cbf28d0577f677835df1ad04af
code hash: d529ac8c9038b52f168d239c1ade1a813976a0c902263f0aa90965927d64ab05
verified: 4/18/2026, 6:13:57 PM
view raw JSON →