tfmcp
A Rust-based MCP tool providing AI assistants with 31 structured tools to manage Terraform environments, including plan analysis with risk scoring, state drift detection, workspace management, and security scanning.
Score Breakdown
⚙ Agent Friendliness
🔒 Security
Terraform MCP server. Uses Terraform Cloud tokens or local credentials. Infrastructure provisioning = high blast radius. Use read-only tokens for planning, separate write tokens for apply.
⚡ Reliability
Best When
Your team uses Terraform and wants AI assistants to help analyze plans, inspect state, and manage workspaces safely with built-in guardrails against destructive operations.
Avoid When
You need fully automated apply/destroy without human oversight, or your infrastructure tooling is not Terraform-based.
Use Cases
- • AI-assisted Terraform plan review with automated risk scoring before applying changes
- • Natural language infrastructure queries (e.g., 'show me drifted resources in production')
- • Workspace management and state inspection for multi-environment Terraform setups
- • Security scanning of Terraform configs for secrets and dangerous patterns
- • Dependency graph visualization and module health analysis
Not For
- • Teams using Pulumi, CDK, or other non-Terraform IaC tools
- • Fully automated unattended apply workflows without human review (dangerous ops disabled by default)
- • Air-gapped environments without Terraform CLI installed
Interface
Authentication
Uses Terraform's own credential chain (env vars, ~/.terraform.d/credentials.tfrc.json, etc.). TFMCP_ALLOW_DANGEROUS_OPS, TFMCP_MAX_RESOURCES, and TFMCP_AUDIT_ENABLED control safety behavior.
Pricing
Open source. Terraform CLI and any cloud provider costs apply separately.
Agent Metadata
Known Gotchas
- ⚠ Dangerous operations (apply/destroy) disabled by default via TFMCP_ALLOW_DANGEROUS_OPS=false - must be explicitly enabled
- ⚠ Requires Terraform CLI to be installed and accessible in PATH
- ⚠ Requires Rust 1.85.0+ (edition 2024) to build from source
- ⚠ Resource limit of 50 by default (TFMCP_MAX_RESOURCES) may be too low for large state files
- ⚠ Sensitive file pattern blocking (prod*, secret*) is heuristic-based and may produce false positives
Alternatives
Full Evaluation Report
Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for tfmcp.
AI-powered analysis · PDF + markdown · Delivered within 30 minutes
Package Brief
Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.
Delivered within 10 minutes
Score Monitoring
Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.
Continuous monitoring
Scores are editorial opinions as of 2026-03-07.