Terraform Cloud MCP Server (Official)

Official HashiCorp Terraform MCP server enabling AI agents to interact with Terraform Cloud and the Terraform Registry — querying workspace runs, reading resource state, accessing module documentation, and managing infrastructure workflows.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Repo ↗ Cloud Infrastructure terraform hashicorp iac mcp-server official infrastructure-as-code devops cloud
⚙ Agent Friendliness
83
/ 100
Can an agent use this?
🔒 Security
88
/ 100
Is it safe for agents?
⚡ Reliability
86
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
82
Documentation
88
Error Messages
82
Auth Simplicity
78
Rate Limits
80

🔒 Security

TLS Enforcement
100
Auth Strength
85
Scope Granularity
82
Dep. Hygiene
88
Secret Handling
88

HTTPS enforced. Team tokens with permission-based access. Infrastructure mutation requires careful scoping — read-only recommended for agents. SOC 2, ISO 27001.

⚡ Reliability

Uptime/SLA
88
Version Stability
88
Breaking Changes
85
Error Recovery
82
AF Security Reliability

Best When

An agent needs to interact with Terraform Cloud workspaces — checking run status, reading state, or triggering infrastructure operations.

Avoid When

You're using Pulumi, CDK, or Ansible — use those platforms' integrations.

Use Cases

  • Querying Terraform workspace run status from CI/CD agents
  • Accessing Terraform Registry module documentation for IaC generation agents
  • Reading workspace state to understand current infrastructure configuration
  • Triggering Terraform plan and apply runs from deployment agents
  • Querying workspace variables and outputs for configuration agents

Not For

  • Teams using Pulumi, CDK, or other IaC tools
  • Direct cloud provider resource creation (use cloud provider MCPs)
  • Teams without Terraform Cloud (Open TF/OpenTofu users need different approach)

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
Yes

Authentication

Methods: api_token team_token org_token
OAuth: No Scopes: Yes

User tokens for individual access; Team tokens for shared agents; Organization tokens for admin operations. Team tokens recommended for agents — scoped to team permissions.

Pricing

Model: per-seat
Free tier: Yes
Requires CC: No

Free tier is generous for small teams. API access included. MCP server is open source.

Agent Metadata

Pagination
cursor
Idempotent
Partial
Retry Guidance
Documented

Known Gotchas

  • Run operations are async — agents must poll for run completion
  • Organization name required for workspace queries — not just workspace name
  • Applying infrastructure changes via agent is high-risk — implement approval gates
  • Workspace variables can contain sensitive values — access control is critical
  • State files can be large — implement pagination for state reads
  • Terraform Registry access is separate from Terraform Cloud workspace access

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Terraform Cloud MCP Server (Official).

$99

Scores are editorial opinions as of 2026-03-06.

5182
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered