Atlantis

Self-hosted pull request automation server for Terraform and OpenTofu. Atlantis listens for GitHub/GitLab/Bitbucket pull request events and automatically runs terraform plan on PRs with changes, posting plan output as PR comments. Reviewers can approve and trigger terraform apply by commenting 'atlantis apply' directly on the PR. Implements GitOps for infrastructure — the PR is the source of truth for what infrastructure changes will be made.

Evaluated Mar 06, 2026 (0d ago) v0.28+
Homepage ↗ Repo ↗ Developer Tools terraform gitops pull-request automation iac open-source self-hosted
⚙ Agent Friendliness
59
/ 100
Can an agent use this?
🔒 Security
77
/ 100
Is it safe for agents?
⚡ Reliability
76
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
--
Documentation
80
Error Messages
72
Auth Simplicity
85
Rate Limits
90

🔒 Security

TLS Enforcement
90
Auth Strength
75
Scope Granularity
62
Dep. Hygiene
82
Secret Handling
80

Apache 2.0, open source. Webhook secret for integrity. Cloud credentials on server are a security consideration — compromise of Atlantis server = compromise of cloud credentials. No fine-grained RBAC in OSS version. Allowlist repositories to restrict blast radius.

⚡ Reliability

Uptime/SLA
75
Version Stability
80
Breaking Changes
78
Error Recovery
72
AF Security Reliability

Best When

You want a simple, open-source GitOps workflow for Terraform where infrastructure changes require PR review and apply is triggered by PR comments, without a paid IaC platform.

Avoid When

You need enterprise RBAC, compliance reporting, cost estimation, drift detection, or policy enforcement — use Spacelift, env0, or Terraform Cloud/Enterprise.

Use Cases

  • Automatically run terraform plan on every PR touching Terraform files and post the plan output as a PR comment for reviewer visibility
  • Allow team members to approve and trigger infrastructure deployments by commenting 'atlantis apply' on reviewed PRs without direct cloud access
  • Implement GitOps workflow where all infrastructure changes go through PR review before being applied — auditability and change management
  • Lock Terraform workspaces during active deployments to prevent concurrent conflicting applies across team members
  • Route agent-triggered infrastructure changes through PR-based approval workflows for human-in-the-loop validation

Not For

  • Teams needing advanced RBAC, policy enforcement, or drift detection — Spacelift or env0 offer more enterprise features
  • Non-Terraform IaC tools (Ansible, Pulumi without Terraform backend) — Atlantis is Terraform/OpenTofu specific
  • Fully automated deployments without PR review — Atlantis is designed for human approval workflows

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
Yes

Authentication

Methods: webhook_secret api_key
OAuth: No Scopes: No

Atlantis uses a shared webhook secret to validate incoming PR events from GitHub/GitLab/Bitbucket. API token for accessing Atlantis server directly. Authorization is based on PR authorship and repository membership — whoever can merge PRs can apply. No fine-grained RBAC in open source version.

Pricing

Model: open_source
Free tier: Yes
Requires CC: No

Atlantis is Apache 2.0 licensed and free. You pay for your own hosting (small server, typically $20-50/month). No commercial offering from Atlantis maintainers.

Agent Metadata

Pagination
none
Idempotent
Partial
Retry Guidance
Not documented

Known Gotchas

  • Atlantis requires a publicly accessible webhook endpoint — agents triggering Atlantis must ensure PR events reach the Atlantis server
  • The primary interface is PR comments ('atlantis plan', 'atlantis apply') — there is no rich REST API for programmatic control beyond triggering via PRs
  • Workspace locking prevents concurrent applies — if a workspace is locked, subsequent apply attempts fail until explicitly unlocked
  • Atlantis requires cloud credentials mounted in the server environment — secret rotation requires server restart in some configurations
  • Automerge feature can automatically merge PRs after apply — agents must account for this when orchestrating multi-step PR workflows
  • Output is posted as PR comments — for large Terraform plans, GitHub API limits can truncate output; check for truncation in large deployments
  • Custom workflows (pre_workflow_hooks, post_workflow_hooks) run arbitrary commands — review server config before automating

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Atlantis.

$99

Scores are editorial opinions as of 2026-03-06.

5208
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered