Skip to main content

An AWS Labs Model Context Protocol (MCP) server for terraform

Reason this release was yanked:

Superceeded by https://github.com/hashicorp/terraform-mcp-server

Project description

⚠️ DEPRECATION NOTICE: This server is deprecated and will no longer receive updates. Please use HashiCorp's official Terraform MCP Server instead, which provides comprehensive Terraform Registry lookups, HCP Terraform workspace management, and enterprise-grade features. See the migration guide for a detailed mapping of tools and known gaps (Terragrunt, Checkov, AWSCC guidance).

AWS Terraform MCP Server

MCP server for Terraform on AWS best practices, infrastructure as code patterns, and security compliance with Checkov.

Features

  • Terraform Best Practices - Get prescriptive Terraform advice for building applications on AWS

    • AWS Well-Architected guidance for Terraform configurations
    • Security and compliance recommendations
    • AWSCC provider prioritization for consistent API behavior
  • Security-First Development Workflow - Follow a structured process for creating secure code

    • Step-by-step guidance for validation and security scanning
    • Integration of Checkov at the right stages of development
    • Clear handoff points between AI assistance and developer deployment
  • Checkov Integration - Work with Checkov for security and compliance scanning

    • Run security scans on Terraform code to identify vulnerabilities
    • Automatically fix identified security issues when possible
    • Get detailed remediation guidance for compliance issues
  • AWS Provider Documentation - Search for AWS and AWSCC provider resources

    • Find documentation for specific resources and attributes
    • Get example snippets and implementation guidance
    • Compare AWS and AWSCC provider capabilities
  • AWS-IA GenAI Modules - Access specialized modules for AI/ML workloads

    • Amazon Bedrock module for generative AI applications
    • OpenSearch Serverless for vector search capabilities
    • SageMaker endpoint deployment for ML model hosting
    • Serverless Streamlit application deployment for AI interfaces
  • Terraform Registry Module Analysis - Analyze Terraform Registry modules

    • Search for modules by URL or identifier
    • Extract input variables, output variables, and README content
    • Understand module usage and configuration options
    • Analyze module structure and dependencies
  • Terraform Workflow Execution - Run Terraform commands directly

    • Initialize, plan, validate, apply, and destroy operations
    • Pass variables and specify AWS regions
    • Get formatted command output for analysis
  • Terragrunt Workflow Execution - Run Terragrunt commands directly

    • Initialize, plan, validate, apply, run-all and destroy operations
    • Pass variables and specify AWS regions
    • Configure terragrunt-config and and include/exclude paths flags
    • Get formatted command output for analysis

Tools and Resources

  • Terraform Development Workflow: Follow security-focused development process via terraform://workflow_guide
  • AWS Best Practices: Access AWS-specific guidance via terraform://aws_best_practices
  • AWS Provider Resources: Access resource listings via terraform://aws_provider_resources_listing
  • AWSCC Provider Resources: Access resource listings via terraform://awscc_provider_resources_listing

Prerequisites

  1. Install uv from Astral or the GitHub README
  2. Install Python using uv python install 3.10
  3. Install Terraform CLI for workflow execution
  4. Install Checkov for security scanning

Installation

Kiro Cursor VS Code
Add to Kiro Install MCP Server Install on VS Code

Configure the MCP server in your MCP client configuration (e.g., for Kiro, edit ~/.kiro/settings/mcp.json):

{
  "mcpServers": {
    "awslabs.terraform-mcp-server": {
      "command": "uvx",
      "args": ["awslabs.terraform-mcp-server@latest"],
      "env": {
        "FASTMCP_LOG_LEVEL": "ERROR"
      },
      "disabled": false,
      "autoApprove": []
    }
  }
}

Windows Installation

For Windows users, the MCP server configuration format is slightly different:

{
  "mcpServers": {
    "awslabs.terraform-mcp-server": {
      "disabled": false,
      "timeout": 60,
      "type": "stdio",
      "command": "uv",
      "args": [
        "tool",
        "run",
        "--from",
        "awslabs.terraform-mcp-server@latest",
        "awslabs.terraform-mcp-server.exe"
      ],
      "env": {
        "FASTMCP_LOG_LEVEL": "ERROR",
        "AWS_PROFILE": "your-aws-profile",
        "AWS_REGION": "us-east-1"
      }
    }
  }
}

or docker after a successful docker build -t awslabs/terraform-mcp-server .:

  {
    "mcpServers": {
      "awslabs.terraform-mcp-server": {
        "command": "docker",
        "args": [
          "run",
          "--rm",
          "--interactive",
          "--env",
          "FASTMCP_LOG_LEVEL=ERROR",
          "awslabs/terraform-mcp-server:latest"
        ],
        "env": {},
        "disabled": false,
        "autoApprove": []
      }
    }
  }

Security Considerations

When using this MCP server, you should consider:

  • Following the structured development workflow that integrates validation and security scanning
  • Reviewing all Checkov warnings and errors manually
  • Fixing security issues rather than ignoring them whenever possible
  • Documenting clear justifications for any necessary exceptions
  • Using the RunCheckovScan tool regularly to verify security compliance
  • Preferring the AWSCC provider for its consistent API behavior and better security defaults

Before applying Terraform changes to production environments, you should conduct your own independent assessment to ensure that your infrastructure would comply with your own specific security and quality control practices and standards, as well as the local laws, rules, and regulations that govern you and your content.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

awslabs_terraform_mcp_server-1.0.18.tar.gz (394.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

awslabs_terraform_mcp_server-1.0.18-py3-none-any.whl (170.4 kB view details)

Uploaded Python 3

File details

Details for the file awslabs_terraform_mcp_server-1.0.18.tar.gz.

File metadata

File hashes

Hashes for awslabs_terraform_mcp_server-1.0.18.tar.gz
Algorithm Hash digest
SHA256 539a79665b7c429140babaaf2acc96411abd9164885434732ecc21d954b2991d
MD5 a57d79cb0974a54741c19e9707437e8f
BLAKE2b-256 047175ae91a8cea5c4d0bd77b3177ab99eefeb26c7ac85d08b0eaf63f2c54e9d

See more details on using hashes here.

Provenance

The following attestation bundles were made for awslabs_terraform_mcp_server-1.0.18.tar.gz:

Publisher: release.yml on awslabs/mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file awslabs_terraform_mcp_server-1.0.18-py3-none-any.whl.

File metadata

File hashes

Hashes for awslabs_terraform_mcp_server-1.0.18-py3-none-any.whl
Algorithm Hash digest
SHA256 281076fce0f2acc0c614c1adc62a86db92d3e8960c5b7f35e263e38413217192
MD5 79b4d3932d34b31d20ab3a56824b98f4
BLAKE2b-256 73d40a00208bdde3dd9fe6f35e2ec5da0a2a8f01e312a0a9e2a711f0b4eba039

See more details on using hashes here.

Provenance

The following attestation bundles were made for awslabs_terraform_mcp_server-1.0.18-py3-none-any.whl:

Publisher: release.yml on awslabs/mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page