If you’re at Google Cloud Next this week, you’ve already seen what Google Antigravity can do. An agent takes a natural language prompt, scaffolds an application, deploys it to Cloud Run, and hands you a working system - no manual CLI commands, no configuration archaeology. The demo is genuinely impressive.
Shipping code to production is only half the equation. The other half is the cloud infrastructure underneath it - the VPCs, IAM roles, compute, storage, and networking that every application depends on. And when you’re moving at agentic speed, the risk that materializes is that your infrastructure is misconfigured, your security policies weren’t checked, and a perfectly functional app just got deployed on top of a compliance violation you won’t find until an audit six months from now.
That’s the gap that StackGen closes. And at Google Cloud Next this week, we’re showing how our MCP server and Wiz integration work together inside Antigravity to give you infrastructure that deploys fast and deploys right.
Having the ability to connect Agents to MCP’s made one thing clear: agents become dramatically more useful when they can see beyond the codebase. The Firebase MCP server gives agents live access to your project’s data. The BigQuery connector gives them your analytics layer. Each integration made agents smarter by grounding them in context that actually matters.
Infrastructure is the next obvious frontier, and it’s the most consequential one. Your agent needs to know your existing VPC topology before it generates networking code. It needs to understand your tagging policies before it creates resources. It needs to know which Terraform modules are approved for production use and which have pending security violations. Without that context, the agent isn’t really provisioning your infrastructure;it will generate generic Terraform that you’ll spend hours reviewing, correcting, and re-running.
StackGen’s MCP server exposes over 25 tools that cover the complete infrastructure lifecycle available natively inside Antigravity through a single connection.
When you ask Antigravity to deploy a new microservice, the StackGen MCP server allows the agent to query your current infrastructure and project state first, giving visibility to Antigravity Agents and its human users into what is actually deployed.
Every application in StackGen is represented as an AppStack: a complete topology of the infrastructure being. Antigravity agents can now list or create appStacks, add, delete, or configure resources, get or restore snapshots
The MCP server supports provisioning across AWS, Azure, and GCP from a single conversational prompt inside Antigravity. Whether you’re deploying to Google Cloud Run, AWS Lambda, or Azure Container Apps, the agent understands your target environment and generates the right configuration.
Already have infrastructure running that wasn’t originally defined in code? StackGen has a unique capability called Cloud2Code which imports existing cloud resources and generates Terraform from the topology. Once properly normalized and rationalized, this enables the enterprise to bring legacy infrastructure into the IaC codebase without manual reverse engineering.
In most agentic infrastructure demos, speed and security usually take a backseat or are entirely omitted. The faster your agents provision infrastructure, the more opportunities there are for security misconfigurations to reach production.
IaC misconfiguration remains one of the top sources of cloud security incidents:
These errors occur when teams are moving fast, and security review is a gate at the end of the pipeline rather than a check at the beginning of it.
Wiz and StackGen share a similar approach to solving this problem: shift the security gate left, before any resource is provisioned.
StackGen joined the Wiz Integration Network (WIN) to bring enterprise-grade security scanning directly into the infrastructure development lifecycle - inside the same platform where your Antigravity agents are generating Terraform.
Here’s how it works. StackGen’s module catalog is where your organization’s approved Terraform modules live. When a platform engineer publishes a new module, the Wiz integration automatically scans it for IaC security violations - both at the code level and the variable level.
For developers working inside StackGen’s AppStack view - and now through Antigravity via the StackGen MCP server - the security context is automatic. When your agent queries available modules for a new service, it sees which modules are fully compliant and which have pending violations, with severity levels and Wiz’s remediation guidance surfaced inline. Your agent can ensure only compliant modules are included in the AppStack being provisioned without any additional prompting.
For platform engineers, the StackGen interface displays a security summary for each module in the catalog, with critical and high-severity violations prominently flagged. The configuration is zero-overhead: connect your Wiz account to StackGen, and your existing Wiz policies and compliance frameworks apply immediately. No new rules to write. No additional workflows to configure.
The practical outcome: security violations are caught at the development phase, by the same toolchain that’s generating the infrastructure code and not by a security team reviewing a production incident report weeks later.
Antigravity handles how you build applications. The StackGen MCP server gives Antigravity’s agents topology-aware, up-to-date, policy-compliant Terraform. And the Wiz integration ensures that every module your agents can reach has already been scanned against your organization’s security baseline - before a single resource is provisioned.
Come find us at Google Cloud Next for a live demo of the Antigravity + StackGen + Wiz workflow - real infrastructure, real security findings, real agents making real decisions. Book a live demo here.
Try StackGen: https://stackgen.com
Schedule a demo: https://stackgen.com/schedule-demo
StackGen + Wiz integration: https://stackgen.com/integrations/wiz
Read the docs: https://docs.stackgen.com