Golf Firewall
Enterprise security gateway for MCP servers Golf Firewall is the security layer that sits in front of your Model Context Protocol (MCP) servers. Instead of exposing each MCP server directly, you route traffic through Golf once and get:- A single secure front door for all MCP servers
- Real-time protection against prompt injection and other MCP-specific attacks
- Centralized policies, audit trails, and visibility for every request and response
1. What Golf Firewall solves
Traditional API gateways and WAFs were not built for MCP. They see HTTP and JSON, but they don’t understand:- MCP methods, tools, and resources
- Multi-step agent flows and how tools are actually used
- Prompt injection and tool poisoning attempts hiding inside “normal” data
- Which tools are used most often
- Where users or agents struggle or fail
- Which prompts, flows, or tools generate the most errors
- How usage patterns vary across teams, tenants, or environments
- They expose MCP servers to customer agents (Apps, ChatGPT, custom agent stacks)
- They handle sensitive data (PII, credentials, internal systems)
- Security / compliance teams need clear controls and audit trails
- Product and platform teams want insight into real-world MCP usage to improve tools and workflows
- Multiple teams run separate MCP servers and you want one place to manage risk and understand behavior
2. High-level capabilities
Think of Golf Firewall as spanning both security and product insights:- Protect – stop MCP-specific attacks and data leaks
- Observe – full audit trail and visibility into MCP traffic
- Control – central policy and access control for all MCP servers
- Understand – analytics and insights into how agents, users, and tools behave in the real world
2.1 Protect – Protocol-aware threat prevention
Golf Firewall inspects MCP traffic between agents and servers and can run in:- Monitor mode – log and score threats without blocking
- Enforce mode – block or modify traffic based on policy
- Prompt injection & tool poisoning Attempts to steer the agent away from your intent, override system instructions, or call tools in unsafe ways.
-
Token & credential abuse
- Token hijacking and reuse in unintended contexts
- Use of expired, malformed, or mis-scoped tokens
- Abusing powerful tokens from one tool/server in another
-
Command & input abuse
- Command injection patterns in tool parameters
- Path traversal and unsafe file paths
- Dangerous shell/database queries passed through tools
-
Tool spoofing & policy bypass
- Impersonating tools or resources
- Routing calls around your intended policy
- Exploiting inconsistent configs across multiple MCP servers
2.2 Observe – Audit trails and compliance
Golf Firewall creates an MCP-layer audit log, giving you a traceable story for every interaction:-
Per-request details
- MCP method, tool/resource, and parameters (with configurable redaction)
- Which user / agent called it (from your IdP)
- Which MCP server handled it
-
End-to-end flow
- Correlated requests and responses
- Timing and latency information
- Policy decisions and threat scores attached to each event
-
Compliance-ready logging
- Structured logs suitable for SIEM ingestion (Elastic, Splunk, Datadog, etc.)
- OpenTelemetry integration where you already have observability pipelines
- Configurable retention and data minimization for GDPR/CCPA-minded teams
2.3 Control – Central policy and access control
Golf Firewall gives you one place to define and enforce security rules for all MCP servers:-
Role-Based Access Control (RBAC)
- Restrict which users, groups, or client apps can access specific MCP servers or tools
- Apply different policies for internal vs external tenants
-
Rate limiting & abuse protection
- Per-user / per-tenant / per-server rate limits
- Protects backend resources from runaway agents or misconfigured integrations
-
Centralized security hardening
- CORS and security headers applied consistently at the edge
- Strict token validation and MCP spec/resource indicator checks before traffic hits your servers
- “Golden” defaults so new MCP servers inherit your existing security posture automatically
2.4 Understand – Usage analytics & behavioral insights
Golf Firewall doesn’t just secure MCP traffic—it helps you understand how agents, users, and tools behave in the real world. With built‑in analytics and patterns derived from the audit stream, you can answer questions such as:-
Tool usage insights
- Which tools are called most frequently?
- Which tools are unused or under‑used?
- Which tools generate the highest error or failure rates?
-
User & agent behavior
- Who are the most active users or tenants?
- Which workflows or prompts do agents repeatedly use?
- How do usage patterns change over time or across teams?
-
Friction & failure analysis
- Where do agents get stuck or repeatedly retry?
- Which prompts or inputs correlate with errors or escalations?
- How often do agents misuse or misunderstand certain tools?
-
Operational & product insights
- What is the actual demand for each MCP server?
- Where should you invest engineering time for reliability or performance?
- Which tools need clearer documentation or safer defaults?
- Improve tool design and developer experience
- Detect silent failures or confusing flows
- Understand adoption across teams or customers
- Make informed decisions about scaling, deprecations, or new features
3. Where Golf Firewall sits in your stack
At a high level:Diagram placeholder: Architecture diagram showing Agents/MCP Clients connecting through Golf Firewall to Your MCP Servers.
Agents / MCP Clients → Golf Firewall → Your MCP ServersYou continue to run your MCP servers as usual. Instead of pointing agents at those servers directly, you:
- Point them at Golf Firewall
- Tell Golf which MCP server(s) sit behind it
- Let Firewall handle authentication, inspection, and policy decisions on the way in and out
- One entry point for all agent traffic
- One place to plug in your identity provider and SIEM
- One dashboard to see traffic, incidents, and policy violations
4. Key product surfaces
4.1 Golf Firewall dashboard
The dashboard is your operational cockpit:-
Traffic overview
- Requests per MCP server, per tool, per user
-
Threat & incident feed
- Real-time view of prompt injection attempts, token issues, and policy violations
- Severity and confidence scores
- Quick drill-down into the affected sessions, users and tools
-
Policy & configuration
- Manage RBAC, rate limits, and DLP rules from one place
- Configure which data is logged or redacted
- Map IdP groups/claims to access rules
4.2 Identity and access integration
Golf Firewall connects to your existing identity provider (e.g. Okta, Auth0, Azure AD etc.).- Accepts tokens issued by your IdP
- Validates them to MCP-specific rules (audience, scopes, resource indicators)
- Enriches logs and dashboards with real user identity
- Helps you enforce policies based on groups, app IDs, or claims
4.3 Logging & SIEM
Golf Firewall is built to plug into your existing monitoring stack:-
Export security and audit events to:
- Elasticsearch
- Splunk
- Datadog
- Sumo Logic
- Or any system that accepts structured logs
-
Choose what leaves the cluster:
- Redact PII or secrets at the firewall
- Control which fields are included for different environments (dev vs prod)
5. Typical rollout journey
This is the recommended rollout flow — designed to give you immediate visibility using Golf’s managed environment, then transition to full control on‑prem.Step 1 – Connect your MCP servers in a managed deployment
- Register your MCP servers with the managed Golf Firewall environment
- No infrastructure changes needed — simply point Golf at your servers
Step 2 – Run in monitor mode (managed)
-
Start in monitor‑only mode:
- Inspect requests and responses
- Collect metrics
- See threat scores and misconfigurations without blocking
Step 3 – Once confident, deploy Golf Firewall on‑prem
- Install Golf Firewall in your own cloud or Kubernetes environment
- Apply the same policies and identity mappings proven in the managed rollout
Step 4 – Enable your teams to deploy, protect and observe MCP servers
- Give platform, product, and security teams access to the dashboard
- Let each team onboard their own MCP servers behind your on‑prem Golf Firewall
- Provide standardized policies, RBAC, and DLP rules out of the box
-
Teams get:
- Self‑serve onboarding
- Real‑time insights
- Consistent security by default
6. Example workflows
6.1 Investigating a suspicious agent run
- Your SIEM or the Golf dashboard flags a spike in prompt injection alerts for a particular MCP server.
- In Golf, you filter incidents by that server and time range.
-
You open an incident and see:
- The original MCP request
- The server response containing suspicious instructions
- Which users were involved
-
You review the context and:
- Tighten DLP or threat rules for that server
- Add RBAC or rate limits if needed
6.2 Rolling out a new MCP server safely
- A team builds a new MCP server
-
Before exposing it to customer agents:
- They register it behind Golf Firewall
- They select existing policies (e.g. “Customer-facing MCP with PII”) as a baseline
-
Traffic goes live in monitor mode for a few days:
- Security and platform teams watch the dashboard for unusual patterns
-
Once confident, they:
- Enable blocking for high-confidence threats
- Add the server to compliance documentation as “protected by Golf”
7. Operating models
Golf Firewall supports:- Self-hosted deployments – run Golf in your own cloud for maximum control
- Managed / cloud-hosted options – managed deployments always start in monitor‑only mode for the initial rollout, so you can evaluate traffic patterns, detect issues, and tune policies before enabling enforcement
- Protocol-aware inspection of MCP traffic
- Centralized policies and RBAC
- Full audit logging and integrations