Where the Terraform MCP server deliberately stops at documentation, Pulumi’s MCP server keeps going.
At a glance: 188 GitHub stars, 36 forks, last push Mar 2026 (no MCP server repo changes in April), ~779 npm downloads/week (continuing decline from ~4,100 — usage shifting to remote hosted endpoint), PulseMCP 46.8K all-time visitors (#629 globally, ~506 weekly — down from 575). Supported clients: Cursor, Claude Code, Claude Desktop, Windsurf, Kiro. Listed on AWS Marketplace (free). Part of our Cloud & Infrastructure MCP category.
The Pulumi MCP server connects AI coding assistants to Pulumi’s full ecosystem — the registry for resource schemas and code examples, the CLI for previewing and deploying infrastructure, Pulumi Cloud for searching deployed resources across stacks, and Pulumi Neo for delegating complex multi-step infrastructure tasks to an autonomous AI agent. As the original announcement put it: MCP brings “real-time resource information and infrastructure management directly into the development environment.” It doesn’t just tell you what an S3 bucket looks like — it can create one.
With 188 GitHub stars (nearly tripled since our original review) and a remote hosted endpoint at mcp.ai.pulumi.com/mcp, it’s the official MCP integration from the company that pioneered infrastructure-as-code in general-purpose programming languages. Pulumi serves 3,700+ customers including Snowflake, Nvidia, and BMW Group.
What It Does
The server operates in two modes with overlapping but distinct tool sets:
Local Mode (npm/Docker) — Registry + CLI:
| Tool | What it does |
|---|---|
pulumi-registry-list-resources |
Browse available resource types for a provider and module |
pulumi-registry-list-functions |
Explore available provider functions (data sources) |
pulumi-registry-get-resource |
Get documentation, properties, and code examples for a specific resource |
pulumi-registry-get-function |
Get function documentation and usage examples |
pulumi-registry-get-type |
Get JSON schema for complex resource properties |
pulumi-cli-preview |
Preview infrastructure changes without deploying |
pulumi-cli-up |
Deploy infrastructure changes to the cloud |
pulumi-cli-stack-output |
Retrieve stack outputs (URLs, resource IDs, kubeconfig) |
pulumi-cli-refresh |
Sync Pulumi state with actual cloud resources to detect drift |
pulumi-resource-search |
Search deployed infrastructure across providers using Lucene queries |
neo-task-launcher |
Launch tasks for Pulumi Neo |
Remote Mode (hosted endpoint) — Cloud + Neo:
| Tool | What it does |
|---|---|
get-stacks |
List all Pulumi stacks with descriptions, update times, resource counts |
resource-search |
Search cloud resources across all stacks using Lucene query syntax |
get-policy-violations |
Get policy violations detected by Pulumi’s policy-as-code engine |
get-users |
List organization members with roles |
get-type |
Get JSON schema for a specific type reference |
get-resource |
Get detailed resource info including properties, methods, examples |
get-function |
Get function/data source documentation |
list-resources |
List all resource types for a provider module |
list-functions |
List all functions for a provider module |
deploy-to-aws |
Analyze application files and generate Pulumi infrastructure code for AWS |
neo-bridge |
Launch a Pulumi Neo task — Neo plans, generates code, tests, and creates PRs |
neo-get-tasks |
List existing Neo tasks |
neo-continue-task |
Continue an in-progress Neo task |
neo-reset-conversation |
Reset a Neo conversation |
Plus prompts for common workflows: deploy-to-aws (deploy application code), convert-terraform-to-typescript (HCL to Pulumi TypeScript), cdk-migration-plan (AWS CDK to Pulumi migration), and additional CDK prompts (cdk-migration-automated, cdk-migration-manual, cdk-migration-troubleshoot) per the current docs.
Setup
Remote (recommended — no local install):
claude mcp add --transport http pulumi https://mcp.ai.pulumi.com/mcp
OAuth authentication opens a browser for Pulumi Access Token entry and organization selection. One-time setup — “no scattered credentials,” as Pulumi describes it.
Local (npm):
claude mcp add -s user pulumi -- npx @pulumi/mcp-server@latest stdio
Requires Pulumi CLI installed locally. No auth needed for registry-only usage.
Docker:
docker pull mcp/pulumi:latest
Setup difficulty: Low (remote) to Medium (local). The remote endpoint eliminates all local dependencies — just add a URL and authenticate. The local mode requires the Pulumi CLI, Node.js, and potentially cloud provider credentials. Registry lookups work without authentication in either mode.
What Works Well
Registry with code examples in real programming languages. Pulumi’s core advantage applies directly to its MCP server. When an agent looks up an aws.s3.Bucket, it gets code examples in TypeScript, Python, Go, C#, Java, and YAML — not HCL. If your team writes infrastructure in Python, the examples are in Python. The get-resource tool returns complete property schemas with input/output specifications, making type-safe code generation possible.
Resource search across all cloud infrastructure. The resource-search tool uses Lucene query syntax to search deployed resources across all stacks and cloud providers. Ask “show me all RDS databases without encryption enabled” and get real answers from your actual infrastructure. This is observability you can query conversationally, not just another dashboard.
Neo delegation for complex tasks — now with Plan Mode, CLI agent, and AGENTS.md. The neo-bridge tool is unique in the MCP ecosystem. Instead of an AI assistant trying to manage multi-step infrastructure changes through individual tool calls, it can delegate the entire task to Neo — Pulumi’s purpose-built infrastructure AI agent. Pulumi CEO Joe Duffy described the vision: “Things that used to take weeks can now confidently be done in minutes." Neo analyzes the request, creates an execution plan, generates code across multiple stacks, runs tests, and creates pull requests with explanations. Werner Enterprises reduced provisioning time from 3 days to 4 hours while maintaining SOC 2 compliance, and teams now ship features 75% faster. Since February 2026, Neo reads AGENTS.md files — the same open standard managed by the Agentic AI Foundation under the Linux Foundation, already adopted by Cursor, GitHub Copilot, Windsurf, and Zed across 60,000+ open source projects — so it automatically picks up project conventions without being told. Neo also introduced task sharing: any Neo task can be shared as a read-only view with anyone in your organization, preserving full context.
Neo Plan Mode (April 2026). Plan Mode adds a dedicated four-phase collaborative workflow: Discovery (Neo investigates existing infrastructure, code, and dependencies), Synthesis (Neo produces a detailed plan referencing specific findings), Refinement (users challenge assumptions and request alternatives through conversation), and Approval (execution begins with full discovered context). This makes upfront deliberation a first-class workflow — Neo focuses entirely on discovery until you explicitly approve. Available for all Pulumi Cloud organizations, Plan Mode works with any task mode and pairs thorough planning with whatever execution autonomy fits the situation.
Experimental pulumi neo CLI command (April 2026). Pulumi CLI v3.232.0 introduced an experimental pulumi neo command (behind PULUMI_EXPERIMENTAL flag) that runs Neo directly in the terminal. Built with bubbletea, the interactive TUI renders agent messages, tool calls, and streaming output alongside the Pulumi Console session. Neo’s edit filesystem tool now executes locally, matching the schema and response format of mcp-claude-code so the agent sees identical output whether running on Cloud or CLI. The TUI also handles user approval requests for sensitive actions.
The full IaC lifecycle. Unlike servers that stop at documentation, Pulumi MCP includes pulumi-cli-preview and pulumi-cli-up. An agent can write infrastructure code, preview what would change, deploy it, and retrieve the outputs — all without leaving the IDE. This is the execution capability that Terraform MCP deliberately omits.
Dual local/remote architecture. The remote endpoint at mcp.ai.pulumi.com/mcp eliminates version mismatches, dependency headaches, and “works on my machine” problems — requiring zero local setup. The local npm package remains available for offline work or environments where data can’t leave the network. Both modes get updates automatically (remote) or via npm (local).
170+ cloud providers. The Pulumi Registry covers AWS, Azure, Google Cloud, Kubernetes, and 150+ native providers (170+ total including community providers). Multi-cloud infrastructure gets first-class support — the same MCP server handles resources from any provider.
Policy violation detection — now with ESC environments and offline analysis. The get-policy-violations tool surfaces compliance issues detected by Pulumi’s policy-as-code engine. An agent can check whether proposed changes would violate organizational policies before deployment. Beta users report automated governance reduced policy violations by 90% on average. April 2026 brought two policy enhancements: Policy Packs can now reference Pulumi ESC environments for credentials and configuration, and the new pulumi policy analyze command evaluates existing stacks against policy packs without executing programs — useful for auditing infrastructure that’s already deployed.
Zero-downtime migration from five IaC platforms. Neo now handles automated, zero-downtime migration to Pulumi from AWS CDK, AWS CloudFormation, Terraform, CDKTF, and Azure ARM templates — not just the convert-terraform-to-typescript prompt. This removes a significant barrier for teams evaluating Pulumi.
Expanded client support and AWS Marketplace listing. The remote MCP server now officially supports Cursor, Claude Code, Claude Desktop, Windsurf, and Kiro. The server is also listed on AWS Marketplace (free, delivered as a Docker container, with Amazon Bedrock AgentCore support), making enterprise procurement easier. The OAuth-based authentication through Pulumi Cloud eliminates per-machine credential storage.
Bun runtime support (April 2026). Pulumi now supports Bun as a fully supported runtime, allowing TypeScript program execution without Node.js. This matters for MCP server users because deploy-to-aws and other code generation tools can now target Bun-based Pulumi programs — one fewer dependency in the toolchain.
Agent sprawl governance positioning. Pulumi is positioning its IaC platform as the governance answer to enterprise AI agent proliferation. With the Salesforce 2026 Connectivity Benchmark estimating the average enterprise has twelve agents today (projected 67% growth over two years), and the EU AI Act’s high-risk obligations taking effect August 2, 2026, the argument is that typed infrastructure graphs provide a better reasoning surface for agents than YAML or bash scripts. Neo operates on top of IaC, ESC, and policy features as guardrails, automatically respecting security rules and maintaining audit trails.
Previous provider version docs in registry (March 2026). The Pulumi Registry now serves documentation for previous provider versions, which helps Neo and other AI agents generate accurate code for teams pinned to older provider releases.
What Doesn’t Work Well
Stagnant community adoption and inactive MCP server repo. Stars have plateaued at 188 with no change in April, and npm downloads have dropped to ~779/week (continuing decline from ~4,100 in early March — usage shifting to the remote hosted endpoint). The MCP server repository itself has had no commits since approximately February/March 2026, even as the core Pulumi CLI has seen active development (three releases in April alone). Compare this to Terraform MCP’s 1,300+ stars or Kubernetes MCP’s 1,300+ stars. PulseMCP weekly visitors have dropped from 575 to 506, with global ranking slipping from #601 to #629. Community examples, troubleshooting guides, and third-party integrations remain sparser than Terraform MCP’s ecosystem.
Neo dependency for key features. The most compelling capability — autonomous multi-step infrastructure management — requires Pulumi Neo, which requires a Pulumi Cloud account with appropriate access. Neo’s autonomy modes (Review, Balanced, Auto) and the agent delegation pattern are powerful but add organizational complexity. Pulumi identified a “velocity trap” where AI dev tools accelerate app creation but infra teams can’t keep pace — Neo is their answer, but it requires full Pulumi Cloud adoption. If your organization hasn’t adopted Pulumi Cloud, a significant portion of the server’s value proposition is inaccessible.
Pulumi ecosystem lock-in. Just as Terraform MCP only works with Terraform, Pulumi MCP only works with Pulumi. The server doesn’t help you write CloudFormation, CDK, OpenTofu, or raw Terraform. If you’re evaluating IaC tools, this server doesn’t help you compare — it’s a commitment to the Pulumi ecosystem.
AI hallucination on complex scenarios. Users report that while the MCP server and Pulumi AI work well for simple infrastructure tasks, complex or custom scenarios can produce incorrect results. The documentation acknowledges this indirectly — complex scenarios “are not well described or may not even exist.” As Pulumi’s own 2026 predictions blog candidly noted: “We’re going to ship code that we’ve never read before.” When Neo gets it wrong on a multi-step autonomous task, debugging is harder than fixing a bad terraform plan.
SDK maturity varies by language. Pulumi supports TypeScript, Python, Go, C#, Java, and YAML, but not all provider SDKs are equally mature in every language. The MCP server inherits this limitation — code examples and schemas may be less complete for newer language bindings.
Steep learning curve for non-Pulumi users. If your team uses Terraform, the Terraform MCP server is immediately useful — it just looks up docs. Pulumi MCP assumes familiarity with Pulumi concepts: stacks, programs, state management, the Pulumi programming model. The cognitive overhead is higher.
Documentation gaps. Users report needing to study the Pulumi source code for complex SDK scenarios. The MCP server’s own documentation on third-party sites frequently shows “No documentation available.” For a v1.0.0 release, this is surprising.
deploy-to-aws is AWS-specific. Despite Pulumi’s multi-cloud strengths, the deployment prompt only targets AWS. There’s no deploy-to-azure or deploy-to-gcp. This feels like a missed opportunity and an unfinished feature set.
How It Compares
vs. Terraform MCP Server (4/5): The fundamental philosophical split. Terraform MCP is a documentation server that deliberately does not run terraform apply — safety by design. Pulumi MCP includes pulumi-cli-up and Neo delegation — execution by design. Terraform MCP has 1,300 stars and a larger user base. Pulumi MCP has code examples in real programming languages and multi-cloud resource search. Choose Terraform MCP for safe Terraform writing; choose Pulumi MCP if you want AI-driven infrastructure execution in general-purpose languages.
vs. AWS MCP Servers (4/5): AWS’s 66-server suite covers deep AWS service integration. Pulumi MCP is cloud-agnostic — one server covers AWS, Azure, GCP, and 170+ providers. AWS MCP gives you fine-grained control over specific AWS services; Pulumi MCP gives you cross-cloud infrastructure management. Complementary for AWS-heavy teams.
vs. Kubernetes MCP Server (4/5): Different layer. Kubernetes MCP manages running clusters; Pulumi MCP helps write and deploy the IaC that provisions those clusters. Pulumi MCP can deploy a Kubernetes cluster; Kubernetes MCP manages what runs on it. Use both.
vs. Docker MCP Server (3.5/5): Docker manages local containers; Pulumi manages cloud infrastructure declarations. The Pulumi MCP server is also available as a Docker image (mcp/pulumi), but the use cases are distinct.
vs. Community Pulumi MCP servers: punkpeye/mcp-server-11 provides Pulumi Automation API and Cloud API access with an experimental API. dogukanakkaya/pulumi-mcp-server is another community alternative. The official server is the one to use — it has Neo integration, the remote endpoint, and Pulumi’s backing.
The Bottom Line
Pulumi’s MCP server is the most ambitious IaC MCP server available. Where Terraform MCP stops at documentation and the others focus on specific runtime environments, Pulumi MCP spans the full lifecycle: look up resource schemas, write type-safe infrastructure code in your preferred language, preview changes, deploy them, search what’s running, check for policy violations, and delegate complex multi-step tasks to an autonomous AI agent.
The ambition is also its weakness. Neo delegation requires Pulumi Cloud adoption. The deploy-to-aws prompt covers only one cloud. Documentation is thin. Community adoption, while growing fast (66 → 188 stars), is still a fraction of Terraform MCP’s — and npm downloads have dropped to ~810/week as usage migrates to the remote endpoint. Constellation Research analyst Holger Mueller put it well: “Anything that can help platform engineers automate infrastructure management is not only welcome, but nowadays likely essential.” And the AI-driven execution model — where an agent can run pulumi up — is genuinely powerful but genuinely risky. A hallucinated Terraform resource fails at terraform plan; a hallucinated Pulumi resource might get deployed.
The April 2026 updates show Pulumi investing more in Neo than in the MCP server itself. Neo Plan Mode adds collaborative upfront planning, the experimental pulumi neo CLI brings the agent into the terminal, and three CLI releases (v3.230.0–v3.232.0) landed in April. But the MCP server repository has been quiet since February/March — no new tools, no new commits, no star growth. The energy is clearly in the CLI-native Neo experience rather than the MCP integration layer. Pulumi is also positioning IaC as the governance answer to agent sprawl, with EU AI Act compliance (August 2, 2026) as a tailwind. Beta users report 10x infrastructure delivery with existing teams.
For teams already using Pulumi, this is essential — it brings the full Pulumi ecosystem into your AI workflow. For teams evaluating IaC tools, the MCP server makes a strong case for Pulumi’s programming-language-first approach. For teams using Terraform, the Terraform MCP server remains the better fit — it has more community support, better documentation, and the safety of not executing anything.
Rating: 3.5 out of 5 — the most feature-complete IaC MCP server, with unique Neo agent delegation and real execution capabilities, held back by low community adoption, Pulumi ecosystem lock-in, documentation gaps, and the inherent risk of an AI agent that can actually deploy infrastructure.
| MCP Server | Pulumi MCP Server |
| Publisher | Pulumi (official) |
| Repository | pulumi/mcp-server |
| Stars | ~188 |
| Tools | 11+ (registry, CLI, resource search, Neo delegation) |
| Transport | stdio (local), HTTP (remote at mcp.ai.pulumi.com/mcp) |
| Language | TypeScript |
| License | Apache 2.0 |
| Pricing | Free (registry/CLI); Pulumi Cloud required for resource search, Neo |
| Our rating | 3.5/5 |
This review was researched and written by an AI agent (Claude Opus 4.6, Anthropic) based on publicly available documentation, GitHub data, and web sources. We have not tested this MCP server hands-on. Rob Nugen maintains editorial oversight. Last updated April 24, 2026.