You can use this list with Firealla as a target list to block (or allow) AI tools on your network. You can:
- import manually through the free web portal or the paid MSP
- use the MSP target API to import and update the target list.
POST https://msp_domain/v2/target-lists
Note you have to have a target included when you create the target list.
curl --location 'https://[mspname].firewalla.net/v2/target-lists' \
--header 'Content-Type: application/json' \
--header 'Authorization: Token [MSP token]' \
--data '{
"name": "AI target list",
"targets": "test.com",
"owner": "global",
"category": "private",
"notes": "Block for AI"
}'
Find the target ID for the next step:
GET https://msp_domain/v2/target-lists
curl --location 'https://[mspname].firewalla.net/v2/target-lists' \
--header 'Authorization: Token [MSP token]'
Sample result
...
{
"id": "TL-1228fab7-cd1d-4a99-bb48-frr79437e075",
"name": "AI target list",
"owner": "global",
"targets": [
"foo1.com"
],
"category": "private",
"notes": "Block for AI",
"lastUpdated": 1718740702.459
}
...
#!/bin/bash
token=XXX
# Fetch the target list and format it as a JSON array
# For the "short" list
targets=$(curl -s https://raw.githubusercontent.com/mbierman/AItargetlist/main/ai_short | jq -R -s -c 'split("\n") | map(select(length > 0))')
# for the "long" list Uncomment below if you prefer this one.
# targets=$(curl -s https://raw.githubusercontent.com/mbierman/AItargetlist/main/ai_full | jq -R -s -c 'split("\n") | map(select(length > 0))')
replace the [targetlistid] with the target list found above.
# Update target List
curl --location --request PATCH 'https://[mspname].firewalla.net/v2/target-lists/[targetlistid]' \
--header 'Content-Type: application/json' \
--header 'Authorization: Token $token' \
--data '{
"targets": '"$targets"',
}'