Docker Hub API

The world's largest container image registry with a REST API for managing repositories, tags, and automated builds, enabling programmatic access to public and private Docker image repositories.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Other docker dockerhub container-registry images containers devops
⚙ Agent Friendliness
59
/ 100
Can an agent use this?
🔒 Security
83
/ 100
Is it safe for agents?
⚡ Reliability
84
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
--
Documentation
80
Error Messages
75
Auth Simplicity
80
Rate Limits
78

🔒 Security

TLS Enforcement
100
Auth Strength
80
Scope Granularity
75
Dep. Hygiene
82
Secret Handling
78

Docker Hub registry API. PAT with read/write/delete scopes. Private repo credentials are sensitive. Pull rate limits on free tier. Scan images for vulnerabilities before pulling.

⚡ Reliability

Uptime/SLA
88
Version Stability
85
Breaking Changes
82
Error Recovery
80
AF Security Reliability

Best When

You're working with public Docker images or need a simple registry for open-source projects, and want programmatic access to manage repositories and tags.

Avoid When

You're in an enterprise environment needing fine-grained RBAC, SLA-backed availability, or integration with cloud IAM systems — use AWS ECR, GCR, or Azure ACR instead.

Use Cases

  • Querying image tag availability and digest hashes for deployment pipeline automation
  • Triggering automated builds and checking build status via webhook
  • Managing repository visibility, teams, and access control programmatically
  • Pulling vulnerability scan results from Docker Hub's security scanning
  • Automating image retention policies and tag cleanup in CI/CD workflows

Not For

  • Enterprise container registry with advanced security features (use ECR, GCR, or Harbor)
  • Private registries required by regulated industries needing air-gapped environments
  • Organizations needing geo-replicated registries for global performance
  • High-volume pull scenarios — Docker Hub rate limits anonymous and free tier pulls heavily

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
Yes

Authentication

Methods: api_key basic_auth
OAuth: No Scopes: No

Personal Access Tokens (PATs) recommended over passwords. PATs support read-only or read-write permissions. Two-factor auth requires PATs. No fine-grained per-resource scoping.

Pricing

Model: freemium
Free tier: Yes
Requires CC: No

Free tier pull rate limits can break CI/CD pipelines significantly. Authenticated pulls get more headroom but paid tier removes limits.

Agent Metadata

Pagination
cursor
Idempotent
Partial
Retry Guidance
Not documented

Known Gotchas

  • Rate limits can silently break agent workflows — always authenticate even for public image pulls
  • The v1 and v2 API have different authentication flows — use v2 (hub.docker.com/v2) for modern access
  • Image digest is the stable identifier — tags are mutable and can point to different images over time
  • Webhook payloads don't include full image details — agents must follow up to fetch tag/digest info
  • Organizations and personal namespaces are accessed differently in the API path structure

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Docker Hub API.

$99

Scores are editorial opinions as of 2026-03-06.

5173
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered