Secure AI-agent integrations
Local MCP Terraform reviewer.
Give your AI coding agent a Terraform/SOC 2 reviewer that runs locally and never uploads raw plans. The preview exposes readtheplan analysis to MCP clients over stdio, so plan JSON stays on your workstation or inside CI.
Use it when an agent opens a Terraform PR and needs a second set of deterministic checks: risky replacements, identity or network changes, control-review context, and an auditor-friendly summary before humans approve.
Placeholder inbox: pilot-contact@example.com. Replace the configured pilot handoff address before production use.
Install
Run the MCP server locally.
The MCP extra installs the optional runtime. Start the server from the repository or workspace where your MCP client should resolve local plan paths.
pip install "readtheplan[mcp]" readtheplan mcp
Tool surface today
Analyze and gate.
The preview exposes two MCP tools: analyze_plan and
agent_gate. Both accept a local plan_path.
analyze_plan returns the same JSON summary as
readtheplan analyze --format json plan.json, while
agent_gate returns the rtp-agent-gate-v1 contract
from readtheplan agent-gate plan.json.
The agent_gate contract includes decision
(proceed/warn/block), allowed_next_actions,
prohibited_next_actions, and pr_comment
— a pre-formatted Markdown summary that avoids raw plan JSON. Review
it before posting to public PRs because resource addresses can still
reveal environment details.
Evidence generation, signature verification, signing, framework selection,
customer rule overlays, and --no-rules stay in the CLI for now.
Client config examples
Use the same local command from your MCP client.
These blocks show common MCP stdio shape. They are configuration examples, not verified compatibility claims for every client version.
{"mcpServers":{"readtheplan":{"command":"readtheplan","args":["mcp"]}}}
Add under the client's MCP server configuration file.
{"readtheplan":{"command":"readtheplan","args":["mcp"]}}
Use the client's stdio MCP server settings.
{"readtheplan":{"command":"readtheplan","args":["mcp"]}}
Adapt to the current local MCP configuration shape.
command: readtheplan; args: ["mcp"]
Start a stdio server process in the workspace with the plan file.
Demo workflow
Review a Terraform PR without moving the plan.
- Generate plan JSON locally:
terraform plan -out=tfplan, thenterraform show -json tfplan > plan.json. - Start your MCP client with
readtheplan mcpconfigured as a local stdio server. - Ask the agent to call
agent_gateforplan.json. - Use proceed, warn, or block before approving, requesting changes, merging, or applying.
Agent gate result
Proceed, warn, or block.
The agent can stop on dangerous or irreversible changes, require reviewer evidence for warning-tier changes, and produce an auditor-friendly PR comment. The raw Terraform JSON remains local; the MCP preview does not add a backend, storage layer, cloud relay, or hosted plan analysis.
Demo prompts
Prompts for Terraform and SOC 2 review.
agent_gate on plan.json. Follow the allowed and prohibited next actions, then draft the PR comment for the Terraform author.
Custom MCP pilots
Productized integrations stay local-first.
Pilot setup can help an infra or compliance team connect a local MCP client to one Terraform repository, tune review prompts, and decide which workflows belong in CLI evidence rather than the preview MCP tool. Future adapters can normalize CloudFormation, Packer, Ansible, Kubernetes, Pulumi, AWS CDK, and Azure/GCP/Oracle IaC into the gate contract, but this preview is Terraform-first today.
Request pilot setupNo raw Terraform plan is attached or submitted.
- Custom engagement items can include auth design, least privilege, audit logs, deployment guidance, and support.
- The OSS preview does not include those production controls by default.
- No hosted MCP service. No hosted plan analysis. No raw Terraform plan upload, no accounts, and no billing.