Business units submit firewall change requests as GitHub Issues — in plain language, with optional PDF attachments. Claude autonomously parses the intent, generates declarative YAML, writes configuration files via MCP tool, validates through Policy-as-Code, and deploys to Palo Alto Networks Strata Cloud Manager — with a full audit trail in Git.
FIREPILOT_ENV=demo.
Every non-trivial decision is documented as an ADR — including rejected alternatives and the conditions under which the decision should be revisited. 16 ADRs in total. Browse all →
write_config_file,
not through stdout regex extraction. Multi-rule support is native — Claude writes N files,
the workflow commits N files. YAML validation happens at write time inside the agentic loop,
not post-hoc in a workflow script.
firepilot-managed rules in Git
against the live SCM ruleset. Out-of-band changes — GUI edits, other automation — are
detected and reported as GitHub Issues. Push failures after merge trigger a
label-based retry workflow without re-running Gates 1–3.
firepilot.yaml is the single operator configuration file — SCM defaults,
zone topology, rule defaults. The system prompt and operator configuration are cached
with cache_control: ephemeral, eliminating repeated input token costs
across 10+ tool-use iterations per request.
# Level 1 — run all CI/CD gates against fixture config # no API key, no Docker required $ git clone https://github.com/t11z/firepilot.git && cd firepilot $ make demo → gate1 json-schema ✓ PASS → gate2 opa-policy ✓ PASS → gate3 scm-dry-run ✓ PASS (mock) → gate4 deploy ✓ PASS (demo) # Level 2 — AI-powered analysis (requires Anthropic API key) $ export ANTHROPIC_API_KEY=sk-ant-... $ make demo-orchestrator → connecting mcp-strata-cloud-manager (demo mode) → connecting mcp-itsm (demo mode) → loaded 14 tools (7 SCM + 5 ITSM + 2 config) → invoking claude agentic loop ... list_security_zones → 4 zones list_security_rules → 6 rules write_config_file → allow-web-to-app.yaml → proposal generated ✓ configuration files written to output dir