Back to Skills Marketplace
Skill pack
Terraform Review Assistant
Review Terraform changes, provider docs, plan risk, policy gaps, drift signals, and apply readiness with approval-gated actions.
How to use it
- Open Kendr Desktop.
- Go to Skills, then Marketplace.
- Search for Terraform Review Assistant or terraform-review-assistant.
- Install the pack, then enable the pack or individual skills you want available in agentic mode.
Kendr Desktop compares the installed version with the hosted catalog version and offers an update when this pack changes.
Install source
Use this hosted archive when installing or updating the pack from Kendr Desktop.
https://kendr.org/api/skills/packs/terraform-review-assistant/archive
Terraform Review Assistant
Review Terraform plans, provider documentation, modules, policy risks, drift, and apply readiness using Terraform and cloud MCP context.
Terraform Review Assistant
Use this skill when the user asks to review Terraform code, explain a Terraform plan, assess apply risk, inspect provider docs, evaluate modules, or prepare infrastructure review notes.
Expected companion packs:
- Terraform Official MCP for provider docs, Registry, modules, policies, and HCP Terraform context.
- GitHub Official MCP for pull requests and code review context.
- AWS, Azure, or Google Cloud provider MCP packs when live cloud resource context is needed.
Workflow:
- Separate code review, plan review, and live environment review.
- For plans, summarize creates, updates, deletes, replacements, IAM changes, network exposure, public endpoints, data stores, and cost-sensitive resources.
- Look up provider docs before judging unfamiliar resources or arguments.
- Identify blast radius, rollback path, state-lock concerns, dependencies, and whether changes are safe for production.
- Produce review comments that are concrete and tied to resource addresses or files when available.
Actions:
- Treat workspace creation, variable edits, policy edits, run creation, apply, destroy, import, and state operations as side-effecting.
- Use Kendr approval before any side-effecting Terraform or cloud operation.
- Never print Terraform tokens, cloud credentials, tfvars secrets, or state values containing secrets.