Terragrunt Validator
Validates your Terragrunt configurations for syntax and best practices, ensuring infrastructure deployments are error-free and consistent.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add terragrunt-validator npx -- -y @trustedskills/terragrunt-validator
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"terragrunt-validator": {
"command": "npx",
"args": [
"-y",
"@trustedskills/terragrunt-validator"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The terragrunt-validator skill enables AI agents to programmatically validate Terragrunt configuration files before deployment. It ensures infrastructure-as-code integrity by checking for syntax errors, missing dependencies, and incorrect variable references within your Terraform ecosystem.
When to use it
- Before applying
terragrunt initorterragrunt applyin CI/CD pipelines to catch errors early. - During code reviews to automatically verify that new modules adhere to organizational standards.
- When refactoring existing infrastructure to ensure no broken links or invalid outputs are introduced.
- To integrate into automated testing suites that require strict compliance with Terraform best practices.
Key capabilities
- Validates
.terragrunt.hclfiles for syntax and structural correctness. - Checks for missing remote state configurations and output dependencies.
- Detects undefined variables and incorrect input parameter mappings.
- Reports specific line numbers and error messages for failed validations.
Example prompts
- "Validate my entire Terragrunt workspace at
/projects/infrastructureand list all configuration errors found." - "Run a validation check on the
aws-vpcmodule to ensure all required inputs are defined in the parent directory." - "Scan these
.terragrunt.hclfiles for missingdependency_blocksthat could cause runtime failures during apply."
Tips & gotchas
Ensure your Terragrunt version matches the one used in your target environment, as validation rules may vary between versions. Always run this skill in a clean working directory to avoid caching issues affecting dependency resolution.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.