HashiCorp Terraform MCP Server
HashiCorp's official MCP server for Terraform — gives agents access to the Terraform Registry to discover providers and modules, read documentation, and assist with infrastructure-as-code authoring.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
No credentials required for public registry access — minimal attack surface. HTTPS enforced. Official HashiCorp project with security practices appropriate for infrastructure tooling. Read-only access eliminates write-path risks.
⚡ Reliability
Best When
Your agent generates or reviews Terraform infrastructure code and needs accurate, current provider schema and module documentation. Prevents hallucinated resource attributes.
Avoid When
You need to actually run Terraform — this is documentation/discovery only. For execution, combine with terraform-cloud-api or local Terraform CLI.
Use Cases
- • Agents discovering and selecting Terraform providers for infrastructure requirements
- • Looking up Terraform module documentation and examples from the registry
- • Generating Terraform configurations with accurate provider schema knowledge
- • Browsing available resource types and their required arguments
- • Assisting with Terraform code generation with up-to-date API knowledge
Not For
- • Executing Terraform plans or applies (read-only registry access)
- • Managing Terraform Cloud workspaces (use terraform-cloud-api)
- • Real-time infrastructure state inspection (use Terraform state files)
Interface
Authentication
No authentication required for registry read access. Terraform Registry is publicly accessible. Optional token for private module registries or higher rate limits.
Pricing
MIT licensed, free. Terraform Registry public API is free. HashiCorp Business Source License applies to Terraform itself, but this MCP server is MIT.
Agent Metadata
Known Gotchas
- ⚠ Registry data is cached — very recent provider versions may not appear immediately
- ⚠ Provider documentation quality varies significantly by provider/community maintenance
- ⚠ Module schema and resource attributes can be complex — agents may need to query sub-resources
- ⚠ Not a Terraform executor — cannot validate or apply configurations
- ⚠ Official server covers registry access only; actual Terraform execution requires separate tooling
Alternatives
Full Evaluation Report
Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for HashiCorp Terraform MCP Server.
Scores are editorial opinions as of 2026-03-06.