AI agent
Claude Code, Cursor, Codex-style agents, internal SRE bots, autonomous remediation agents.
"I need to change infrastructure."Interactive diagram showing where RecourseOS sits in the agent to MCP to cloud path.
Claude Code, Cursor, Codex-style agents, internal SRE bots, autonomous remediation agents.
"I need to change infrastructure."An engineer runs Terraform, shell, kubectl, AWS CLI, gcloud, or az commands locally.
recourse shell -- "aws rds delete..."GitHub Actions, GitLab, Jenkins, Atlantis, Spacelift, Azure DevOps, or Terraform Cloud-style pipelines.
terraform show -json tfplan > plan.jsonThe agent runtime discovers tools and decides whether to call RecourseOS before acting.
recourse_evaluate_terraform | _shell | _mcp_callManual checks, debugging, local reports, shell wrapping.
Exit codes, PR comments, merge gates, artifact uploads.
Shows recent reports, blocked actions, approval history, evidence, and explanations.
recourse uiFront door for agents. Exposes tools with descriptions that teach the agent to call before destructive work.
npx recourse-cli mcp serveTerraform plan, shell command, MCP tool call, kubectl/cloud CLI patterns.
Per-resource rules, cross-action pattern detection, classifier for unknowns.
The actual tools the agent wanted to call: Terraform, cloud APIs, Kubernetes, GitHub, CI, runbooks.
create · update · delete · rotate · revoke · applyplan, show JSON, apply, destroy, workspace changes.
aws, gcloud, az, kubectl, rm, chmod, psql, scripts.
AWS, GCP, Azure, Kubernetes, databases, buckets, secrets, IAM, networks, queues.
mutation happens here only after verdictOptional enrichment: snapshots, backup retention, object lock, versioning, deletion windows, IAM dependencies.
describe/list/read onlyLocal policy, team policy, human approval, exception tracking, audit history.
block | review | allowThis is the strongest architecture. The agent does not get direct access to dangerous infrastructure tools. It must call RecourseOS first, receive a consequence report, and only then receive permission to call the mutation tool.
Gateway mode is the product-grade version: RecourseOS is in the action path, not just beside it.
{
"tool": "recourse_evaluate_terraform",
"input": {
"plan_json": "{ ... terraform show -json output ... }"
},
"result": {
"decision": "block",
"recoverability": "unrecoverable",
"resource": "aws_db_instance.main",
"reason": "skip_final_snapshot=true, backup_retention_period=0",
"evidence": {
"deletion_protection": false,
"final_snapshot": false
}
}
}
// Available tools:
recourse_evaluate_terraform // Terraform plan JSON
recourse_evaluate_shell // Shell commands
recourse_evaluate_mcp_call // MCP tool calls
recourse_supported_resources // List coverage