Skip to main content

MCP server for auditing Terraform state files for security misconfigurations

Project description

mcp-tfstate-reader

PyPI Version PyPI Downloads Python 3.10+ License: MIT

A local Model Context Protocol (MCP) server that parses Terraform .tfstate files and lets AI agents audit enterprise infrastructure for security misconfigurations — without requiring direct cloud credentials.


Why?

Terraform state files are the single source of truth for what's actually deployed in your cloud. Security teams need to audit them regularly, but the traditional workflow is manual: run CLI tools, parse terminal output, repeat.

mcp-tfstate-reader gives AI agents (like Claude) structured, read-only access to your Terraform state. Instead of copying JSON into a chat window, you ask a question and the agent calls the right tool automatically.


Features

Tool Description
list_resources Parse a .tfstate file and list every managed resource with its address and type
audit_security Scan for common misconfigurations (see below)
get_resource_detail Dump the full attributes of a specific resource by address

Security checks in audit_security

  • S3 — buckets without server-side encryption; buckets without versioning enabled
  • S3 ACL — bucket ACLs set to public-read or public-read-write
  • Security Groups — ingress rules open to 0.0.0.0/0 on sensitive ports: 22 (SSH), 3389 (RDP), 5432 (PostgreSQL)
  • IAM — policies with wildcard * actions (full admin access)
  • RDS — instances without storage_encrypted = true; publicly accessible instances
  • EBS — volumes without encryption
  • EC2 — instances with associate_public_ip_address = true
  • Lambda — functions not deployed in a VPC
  • KMS — keys without automatic key rotation enabled
  • ElastiCache — replication groups without transit encryption
  • SNS — topics without KMS encryption
  • SQS — queues without KMS encryption
  • ALB/NLB — load balancers without access logs enabled
  • CloudWatch — log groups without a retention policy

Quick Start

1. Install

pip install mcp-tfstate-reader

2. Configure Claude Desktop

Add this to your Claude Desktop MCP configuration file:

OS Path
macOS ~/Library/Application Support/Claude/claude_desktop_config.json
Windows %APPDATA%\Claude\claude_desktop_config.json

Recommended — with uvx (no install required):

{
  "mcpServers": {
    "tfstate-reader": {
      "command": "uvx",
      "args": ["mcp-tfstate-reader"]
    }
  }
}

Note: Claude Desktop may not inherit your terminal's $PATH. If the server fails to connect, use the absolute path to uvx (find it with which uvx in your terminal):

{
  "mcpServers": {
    "tfstate-reader": {
      "command": "/full/path/to/uvx",
      "args": ["mcp-tfstate-reader"]
    }
  }
}

Alternative — installed via pip:

{
  "mcpServers": {
    "tfstate-reader": {
      "command": "mcp-tfstate-reader"
    }
  }
}

Alternative — from source (virtualenv):

{
  "mcpServers": {
    "tfstate-reader": {
      "command": "/absolute/path/to/mcp-tfstate-reader/.venv/bin/python",
      "args": ["-m", "mcp_tfstate_reader.server"]
    }
  }
}

3. Restart Claude Desktop

Fully quit (Cmd+Q on macOS) and reopen. Look for the tools icon to confirm the server is connected.

4. Ask a question

"Audit the Terraform state file at /path/to/terraform.tfstate for security issues."


Example interaction

Claude autonomously chains the tools — listing resources first, running the audit, then drilling into critical findings:

Found 17 finding(s):

[CRITICAL] aws_iam_policy.admin: IAM policy contains a wildcard (*) action — grants unrestricted permissions.
[HIGH] aws_s3_bucket.assets: S3 bucket has no server-side encryption configuration.
[HIGH] aws_s3_bucket_acl.assets: S3 bucket ACL is set to 'public-read' — allows public access.
[HIGH] aws_security_group.bastion: Security group allows 0.0.0.0/0 ingress on port 22.
[HIGH] aws_security_group.rdp_open: Security group allows 0.0.0.0/0 ingress on port 3389.
[HIGH] aws_db_instance.prod: RDS instance storage is not encrypted.
[HIGH] aws_db_instance.prod: RDS instance is publicly accessible.
[HIGH] aws_ebs_volume.data: EBS volume is not encrypted.
[HIGH] aws_elasticache_replication_group.sessions: ElastiCache replication group does not have transit encryption enabled.
[MEDIUM] aws_s3_bucket.assets: S3 bucket does not have versioning enabled.
[MEDIUM] aws_instance.web: EC2 instance has a public IP address assigned.
[MEDIUM] aws_lambda_function.processor: Lambda function is not deployed in a VPC.
[MEDIUM] aws_kms_key.app: KMS key does not have automatic key rotation enabled.
[MEDIUM] aws_sns_topic.alerts: SNS topic is not encrypted with a KMS key.
[MEDIUM] aws_sqs_queue.jobs: SQS queue is not encrypted with a KMS key.
[MEDIUM] aws_lb.frontend: Load balancer does not have access logs enabled.
[MEDIUM] aws_cloudwatch_log_group.app: CloudWatch log group has no retention policy (logs kept indefinitely).

Troubleshooting

Server not appearing in Claude Desktop

  1. Ensure Claude Desktop is fully restarted (quit with Cmd+Q, not just close the window).
  2. Check your config JSON is valid — a trailing comma or typo will silently break it.
  3. Use absolute paths if uvx or mcp-tfstate-reader aren't found.

"File not found" errors

The tool reads files from your local filesystem. Use the full absolute path (e.g. /Users/you/infra/terraform.tfstate), not relative paths.

This is Claude Desktop only

MCP servers work with the Claude Desktop app, not claude.ai in your browser. The web interface does not have access to local MCP servers or your filesystem.


Development

# Clone and set up
git clone https://github.com/berkayyildirim/mcp-tfstate-reader.git
cd mcp-tfstate-reader
make setup

# Run tests
make test

# Build distribution
make build

# Run the server locally (stdio)
make start

# Clean everything
make clean

License

MIT © Berkay Yildirim

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mcp_tfstate_reader-0.2.0.tar.gz (12.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mcp_tfstate_reader-0.2.0-py3-none-any.whl (8.9 kB view details)

Uploaded Python 3

File details

Details for the file mcp_tfstate_reader-0.2.0.tar.gz.

File metadata

  • Download URL: mcp_tfstate_reader-0.2.0.tar.gz
  • Upload date:
  • Size: 12.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for mcp_tfstate_reader-0.2.0.tar.gz
Algorithm Hash digest
SHA256 a3b0c71357ce2ed2fe73b0633c2ad49bf724f64d3e8b2a1fe9239cf8f570962a
MD5 911f5623e92360c8a426ffec1c2fc0bb
BLAKE2b-256 ebcc11354cefe928df6503d5be41e6fe29248272235b2dd38d3ed89faab0cdf6

See more details on using hashes here.

Provenance

The following attestation bundles were made for mcp_tfstate_reader-0.2.0.tar.gz:

Publisher: release.yml on berkayyildirim/mcp-tfstate-reader

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file mcp_tfstate_reader-0.2.0-py3-none-any.whl.

File metadata

File hashes

Hashes for mcp_tfstate_reader-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 fc89678f5f02eb4da5f110a9978a911759f7138d8f88a5b8b529959340e27537
MD5 3d1b5e7a97f4346a7f184a407f971a35
BLAKE2b-256 37fa125a81dbca2d3f1fa18b9fea4b172360ee9f61e8b9c518a52641c617242a

See more details on using hashes here.

Provenance

The following attestation bundles were made for mcp_tfstate_reader-0.2.0-py3-none-any.whl:

Publisher: release.yml on berkayyildirim/mcp-tfstate-reader

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page