MCP server for auditing Terraform state files for security misconfigurations
Project description
mcp-tfstate-reader
A local Model Context Protocol (MCP) server that parses Terraform .tfstate files and lets AI agents audit enterprise infrastructure for security misconfigurations — without requiring direct cloud credentials.
Why?
Terraform state files are the single source of truth for what's actually deployed in your cloud. Security teams need to audit them regularly, but the traditional workflow is manual: run CLI tools, parse terminal output, repeat.
mcp-tfstate-reader gives AI agents (like Claude) structured, read-only access to your Terraform state. Instead of copying JSON into a chat window, you ask a question and the agent calls the right tool automatically.
Features
| Tool | Description |
|---|---|
list_resources |
Parse a .tfstate file and list every managed resource with its address and type |
audit_security |
Scan for common misconfigurations (see below) |
get_resource_detail |
Dump the full attributes of a specific resource by address |
Security checks in audit_security
- S3 — buckets without server-side encryption; buckets without versioning enabled
- S3 ACL — bucket ACLs set to
public-readorpublic-read-write - Security Groups — ingress rules open to
0.0.0.0/0on sensitive ports: 22 (SSH), 3389 (RDP), 5432 (PostgreSQL) - IAM — policies with wildcard
*actions (full admin access) - RDS — instances without
storage_encrypted = true; publicly accessible instances - EBS — volumes without encryption
- EC2 — instances with
associate_public_ip_address = true - Lambda — functions not deployed in a VPC
- KMS — keys without automatic key rotation enabled
- ElastiCache — replication groups without transit encryption
- SNS — topics without KMS encryption
- SQS — queues without KMS encryption
- ALB/NLB — load balancers without access logs enabled
- CloudWatch — log groups without a retention policy
Quick Start
1. Install
pip install mcp-tfstate-reader
2. Configure Claude Desktop
Add this to your Claude Desktop MCP configuration file:
| OS | Path |
|---|---|
| macOS | ~/Library/Application Support/Claude/claude_desktop_config.json |
| Windows | %APPDATA%\Claude\claude_desktop_config.json |
Recommended — with uvx (no install required):
{
"mcpServers": {
"tfstate-reader": {
"command": "uvx",
"args": ["mcp-tfstate-reader"]
}
}
}
Note: Claude Desktop may not inherit your terminal's
$PATH. If the server fails to connect, use the absolute path touvx(find it withwhich uvxin your terminal):{ "mcpServers": { "tfstate-reader": { "command": "/full/path/to/uvx", "args": ["mcp-tfstate-reader"] } } }
Alternative — installed via pip:
{
"mcpServers": {
"tfstate-reader": {
"command": "mcp-tfstate-reader"
}
}
}
Alternative — from source (virtualenv):
{
"mcpServers": {
"tfstate-reader": {
"command": "/absolute/path/to/mcp-tfstate-reader/.venv/bin/python",
"args": ["-m", "mcp_tfstate_reader.server"]
}
}
}
3. Restart Claude Desktop
Fully quit (Cmd+Q on macOS) and reopen. Look for the tools icon to confirm the server is connected.
4. Ask a question
"Audit the Terraform state file at
/path/to/terraform.tfstatefor security issues."
Example interaction
Claude autonomously chains the tools — listing resources first, running the audit, then drilling into critical findings:
Found 17 finding(s):
[CRITICAL] aws_iam_policy.admin: IAM policy contains a wildcard (*) action — grants unrestricted permissions.
[HIGH] aws_s3_bucket.assets: S3 bucket has no server-side encryption configuration.
[HIGH] aws_s3_bucket_acl.assets: S3 bucket ACL is set to 'public-read' — allows public access.
[HIGH] aws_security_group.bastion: Security group allows 0.0.0.0/0 ingress on port 22.
[HIGH] aws_security_group.rdp_open: Security group allows 0.0.0.0/0 ingress on port 3389.
[HIGH] aws_db_instance.prod: RDS instance storage is not encrypted.
[HIGH] aws_db_instance.prod: RDS instance is publicly accessible.
[HIGH] aws_ebs_volume.data: EBS volume is not encrypted.
[HIGH] aws_elasticache_replication_group.sessions: ElastiCache replication group does not have transit encryption enabled.
[MEDIUM] aws_s3_bucket.assets: S3 bucket does not have versioning enabled.
[MEDIUM] aws_instance.web: EC2 instance has a public IP address assigned.
[MEDIUM] aws_lambda_function.processor: Lambda function is not deployed in a VPC.
[MEDIUM] aws_kms_key.app: KMS key does not have automatic key rotation enabled.
[MEDIUM] aws_sns_topic.alerts: SNS topic is not encrypted with a KMS key.
[MEDIUM] aws_sqs_queue.jobs: SQS queue is not encrypted with a KMS key.
[MEDIUM] aws_lb.frontend: Load balancer does not have access logs enabled.
[MEDIUM] aws_cloudwatch_log_group.app: CloudWatch log group has no retention policy (logs kept indefinitely).
Troubleshooting
Server not appearing in Claude Desktop
- Ensure Claude Desktop is fully restarted (quit with
Cmd+Q, not just close the window). - Check your config JSON is valid — a trailing comma or typo will silently break it.
- Use absolute paths if
uvxormcp-tfstate-readeraren't found.
"File not found" errors
The tool reads files from your local filesystem. Use the full absolute path (e.g. /Users/you/infra/terraform.tfstate), not relative paths.
This is Claude Desktop only
MCP servers work with the Claude Desktop app, not claude.ai in your browser. The web interface does not have access to local MCP servers or your filesystem.
Development
# Clone and set up
git clone https://github.com/berkayyildirim/mcp-tfstate-reader.git
cd mcp-tfstate-reader
make setup
# Run tests
make test
# Build distribution
make build
# Run the server locally (stdio)
make start
# Clean everything
make clean
License
MIT © Berkay Yildirim
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file mcp_tfstate_reader-0.2.0.tar.gz.
File metadata
- Download URL: mcp_tfstate_reader-0.2.0.tar.gz
- Upload date:
- Size: 12.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a3b0c71357ce2ed2fe73b0633c2ad49bf724f64d3e8b2a1fe9239cf8f570962a
|
|
| MD5 |
911f5623e92360c8a426ffec1c2fc0bb
|
|
| BLAKE2b-256 |
ebcc11354cefe928df6503d5be41e6fe29248272235b2dd38d3ed89faab0cdf6
|
Provenance
The following attestation bundles were made for mcp_tfstate_reader-0.2.0.tar.gz:
Publisher:
release.yml on berkayyildirim/mcp-tfstate-reader
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
mcp_tfstate_reader-0.2.0.tar.gz -
Subject digest:
a3b0c71357ce2ed2fe73b0633c2ad49bf724f64d3e8b2a1fe9239cf8f570962a - Sigstore transparency entry: 1033821697
- Sigstore integration time:
-
Permalink:
berkayyildirim/mcp-tfstate-reader@22d988ab861ed09f80b6bb9bab69ba54656aff3c -
Branch / Tag:
refs/heads/main - Owner: https://github.com/berkayyildirim
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@22d988ab861ed09f80b6bb9bab69ba54656aff3c -
Trigger Event:
push
-
Statement type:
File details
Details for the file mcp_tfstate_reader-0.2.0-py3-none-any.whl.
File metadata
- Download URL: mcp_tfstate_reader-0.2.0-py3-none-any.whl
- Upload date:
- Size: 8.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
fc89678f5f02eb4da5f110a9978a911759f7138d8f88a5b8b529959340e27537
|
|
| MD5 |
3d1b5e7a97f4346a7f184a407f971a35
|
|
| BLAKE2b-256 |
37fa125a81dbca2d3f1fa18b9fea4b172360ee9f61e8b9c518a52641c617242a
|
Provenance
The following attestation bundles were made for mcp_tfstate_reader-0.2.0-py3-none-any.whl:
Publisher:
release.yml on berkayyildirim/mcp-tfstate-reader
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
mcp_tfstate_reader-0.2.0-py3-none-any.whl -
Subject digest:
fc89678f5f02eb4da5f110a9978a911759f7138d8f88a5b8b529959340e27537 - Sigstore transparency entry: 1033821789
- Sigstore integration time:
-
Permalink:
berkayyildirim/mcp-tfstate-reader@22d988ab861ed09f80b6bb9bab69ba54656aff3c -
Branch / Tag:
refs/heads/main - Owner: https://github.com/berkayyildirim
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@22d988ab861ed09f80b6bb9bab69ba54656aff3c -
Trigger Event:
push
-
Statement type: