The Diligent One
API, Reimagined
72 AI-native tools across 9 GRC domains + 11 AI agents powered by Riskapture. Read risks, create audits, browse compliance standards, track issues — all through natural language.
Powered by Riskapture
The AI agents in this MCP server are powered by Riskapture's GRC Brain — a specialized knowledge graph that understands the full landscape of governance, risk, and compliance.
Architecture
DiligentMCP wraps the entire Diligent One platform behind a unified MCP interface. Claude (or any MCP client) speaks natural language — the server handles JSON:API, pagination, auth, rate limiting, and name resolution.
Quick Start
Clone & Install
git clone https://github.com/RiskaptureAI/DiligentMCP.git && cd DiligentMCP && npm install
Configure
Copy .env.example to .env and set your DILIGENT_API_TOKEN and DILIGENT_ORG_ID. Generate a token in Diligent One → Profile → Application Tokens.
Build
npm run build
Use with Claude
Open Claude Code from the project directory — the .mcp.json auto-registers the server. All 61 tools are immediately available.
Audit Agent Pack · 4 agents · STD-SOL-007
Full lifecycle audit intelligence. Classifies findings, plans risk-based audits, tracks remediation, and reviews workpapers against IIA standards. Built from the GRC Brain's 12-stage internal audit workflow.
Fetches all findings, controls, objectives, and compliance frameworks. Presents data for AI-powered root cause classification using an 8-category taxonomy, maps findings to control objectives, and identifies duplicates across engagements.
| Parameter | Type | Description | |
|---|---|---|---|
| issue_id | string | Specific issue ID to classify (omit for all open) | optional |
| project | string | Scope to a project (name or ID) | optional |
Aggregates the full risk landscape, prior findings history, control testing gaps, and historical project data. Structures everything for AI-generated audit planning: scope, procedures, timeline, and resource estimates.
| Parameter | Type | Description | |
|---|---|---|---|
| project | string | Existing project to plan for (name or ID) | optional |
| focus_area | string | Focus: SOX, IT General Controls, Financial Reporting, etc. | optional |
Builds a comprehensive remediation dashboard: overdue items ranked by days past due, stalled remediation detection, closure velocity metrics (avg/median/fastest/slowest), and a Severity x Overdue escalation matrix.
| Parameter | Type | Description | |
|---|---|---|---|
| project | string | Scope to a specific project (name or ID) | optional |
| severity_threshold | string | Minimum severity: low, medium, high, critical | optional |
Reviews each finding against the IIA 5-attribute quality standard. Scores completeness (condition, criteria, cause, effect, recommendation), identifies gaps, and provides detailed review of incomplete findings with suggested narrative improvements.
| Parameter | Type | Description | |
|---|---|---|---|
| issue_id | string | Specific issue to review (omit for all open) | optional |
| project | string | Scope to a project (name or ID) | optional |
Risk Agent Pack · 3 agents · STD-SOL-RSK
Enterprise risk intelligence combining audit risks and ERM assets. Classifies risks by taxonomy, monitors key risk indicators, and provides treatment recommendations with control mapping.
Combines audit risks, ERM risk assets, and control coverage into a comprehensive risk advisory analysis.
| Parameter | Type | Description | |
|---|---|---|---|
| risk_id | string | Specific risk ID (omit for all high-impact) | optional |
| include_erm | boolean | Include ERM risk assets (default: true) | optional |
Monitors the full ERM risk portfolio: 25 risks, 45 risk event assessments, 16 mitigations. Analyzes distribution, concentration, and coverage.
| Parameter | Type | Description | |
|---|---|---|---|
| No parameters — monitors the full portfolio. | |||
Combines audit and ERM risks into a unified view for classification. Detects duplicates across sources by keyword matching.
| Parameter | Type | Description | |
|---|---|---|---|
| risk_id | string | Specific risk ID (omit for all) | optional |
IT Risk Agent Pack · 2 agents · STD-SOL-ITRM
IT infrastructure risk analysis. Correlates IT assets with control coverage, identifies untested controls, and provides a prioritized remediation roadmap with design effectiveness scoring.
Fetches IT assets across 4 ERM asset types, correlates with controls and walkthroughs, and identifies exposure gaps.
| Parameter | Type | Description | |
|---|---|---|---|
| No parameters — analyzes the full IT asset landscape. | |||
Comprehensive IT risk assessment: control-walkthrough matrix, ERM control assessments, gap-to-risk mapping.
| Parameter | Type | Description | |
|---|---|---|---|
| objective_id | string | Focus on a specific objective (omit for all) | optional |
DORA Compliance Agent Pack · 2 agents · STD-SOL-DORA
DORA (EU Digital Operational Resilience Act) compliance intelligence. Classifies ICT risks against DORA articles, generates regulatory incident reports per Chapter III, and monitors third-party concentration risk per Chapter V.
Classifies all risks against DORA ICT risk categories and maps to specific articles. Cross-references the standards library.
| Parameter | Type | Description | |
|---|---|---|---|
| framework_filter | string | Filter standards: DORA, NIS2, ISO 27001 | optional |
Classifies issues as potential ICT incidents per DORA Art. 17-18, calculates reporting deadlines, generates draft regulatory notifications.
| Parameter | Type | Description | |
|---|---|---|---|
| project | string | Scope to a project (name or ID) | optional |
| severity_min | string | Minimum severity: low, medium, high, critical | optional |
Monitors third-party ICT providers from ERM assets. Analyzes concentration risk, IT asset dependencies, and generates a DORA Chapter V compliance scorecard.
| Parameter | Type | Description | |
|---|---|---|---|
| No parameters — monitors the full third-party landscape. | |||
Slash Commands
Pre-built workflows that chain multiple tools into comprehensive reports.
| Command | What It Does |
|---|---|
/audit-overview | Full dashboard of all projects — status, progress, issue counts, risk coverage |
/risk-matrix | Impact × Likelihood heat map with gap analysis across all projects |
/issue-tracker | Issue aging report, remediation pipeline, overdue tracking with days-past-due |
/control-assessment | Control coverage analysis, testing gaps, design effectiveness summary |
ERM Data Model
The ERM data layer uses a flexible schema where each asset type defines its own attributes. Here are the known types in the C-Labs environment:
inventory_2 Asset Types
| ID | Name | Category | Count | Attributes |
|---|---|---|---|---|
1604467 | Risk | risks | 25 | 35 |
1604468 | Control | controls | 49 | 28 |
1604465 | Objective | objectives | 10 | 18 |
1604466 | Process | processes | 10 | 20 |
1604458 | Third-party | assets | 1 | 36 |
1604453 | IT Asset – Software | assets | 2 | 30 |
1604454 | IT Asset – Cloud | assets | 2 | 29 |
1604455 | IT Asset – Info System | assets | 0 | 25 |
1604456 | IT Asset – Hardware | assets | 0 | 32 |
1604459 | Control Taxonomy | taxonomies | 0 | 17 |
1604460 | Risk Taxonomy | taxonomies | 0 | 17 |
1604461 | Organizational Unit | taxonomies | 0 | 17 |
description Record Types
| ID | Name | Count |
|---|---|---|
1604462 | Control Assessments | 7 |
1604463 | Risk Event Assessment | 45 |
1604464 | Risk Mitigation | 16 |
1604457 | Finding | 0 |
Safety & Limits
gavel Hard Rules
| Rule | Why |
|---|---|
| Never DELETE | Soft-delete is irreversible via API. No restore endpoint exists. |
| JSON:API v1.0 only | All requests use application/vnd.api+json content type |
| No server-side filtering | The filter param is not supported. All filtering is client-side. |
include supported | attribute_types, permissions, statuses.events work |
| Cursor pagination | Use base64 cursors from links.next, not page numbers |