kubefwd

CLI tool that bulk port-forwards Kubernetes services to your local workstation, assigning unique loopback IPs per service and updating /etc/hosts so you can access cluster services by name as if they were running locally. Includes TUI, REST API, and MCP server integration.

Evaluated Mar 06, 2026 (0d ago) v1.25.12
Homepage ↗ Repo ↗ Other kubernetes port-forwarding local-dev k8s services networking tui mcp
⚙ Agent Friendliness
64
/ 100
Can an agent use this?
🔒 Security
78
/ 100
Is it safe for agents?
⚡ Reliability
63
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
55
Documentation
70
Error Messages
0
Auth Simplicity
68
Rate Limits
60

🔒 Security

TLS Enforcement
88
Auth Strength
78
Scope Granularity
72
Dep. Hygiene
78
Secret Handling
72

Kubernetes port-forwarding tool. Uses kubeconfig auth. Creates local access to cluster services — tunnels bypass network security. Use for dev/debug only. Not for production agent use.

⚡ Reliability

Uptime/SLA
65
Version Stability
65
Breaking Changes
60
Error Recovery
62
AF Security Reliability

Best When

You need to develop locally against multiple Kubernetes services simultaneously and want them accessible by service name without manual port-forward setup.

Avoid When

You cannot run with sudo/root privileges, need production-grade networking, or prefer container-based local development (use Telepresence or Skaffold instead).

Use Cases

  • Accessing multiple Kubernetes services locally during development without individual port-forward commands
  • Testing microservice interactions locally with real cluster services
  • Eliminating environment-specific connection configuration during local development
  • Monitoring service traffic and pod logs through interactive TUI
  • Programmatic control of port forwarding via REST API

Not For

  • Production traffic routing or load balancing
  • Replacing service mesh solutions like Istio or Linkerd
  • Environments where sudo/root access is not available

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: kubeconfig
OAuth: No Scopes: No

Uses existing kubectl/kubeconfig for cluster authentication. Requires sudo/root privileges for /etc/hosts modification and network interface management.

Pricing

Model: open_source
Free tier: Yes
Requires CC: No

Apache 2.0 licensed. Available via Homebrew, apt/rpm, winget, scoop, and Docker.

Agent Metadata

Pagination
not_applicable
Idempotent
Yes
Retry Guidance
Not documented

Known Gotchas

  • Requires sudo/root privileges - agent cannot start kubefwd without elevated permissions
  • Modifies /etc/hosts which can conflict with other tools or DNS configurations
  • MCP integration appears to be a secondary feature - documentation depth is limited compared to CLI
  • Auto-reconnection means state can change between agent checks
  • CNCF Landscape listed and OpenSSF certified, indicating mature project governance

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for kubefwd.

$99

Scores are editorial opinions as of 2026-03-06.

5178
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered