kcp-shadowsocks-server

kcp-shadowsocks-server is a server implementation that combines KCP (a UDP-based transport designed to provide reliable, low-latency delivery) with the Shadowsocks proxy protocol, enabling proxying over KCP streams. Typically used to improve throughput/latency versus plain TCP in constrained networks while maintaining the Shadowsocks encryption/proxying model.

Evaluated Apr 04, 2026 (0d ago)
Homepage ↗ Repo ↗ Infrastructure networking proxy shadowsocks kcp udp self-hosted privacy server
⚙ Agent Friendliness
15
/ 100
Can an agent use this?
🔒 Security
12
/ 100
Is it safe for agents?
⚡ Reliability
0
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
0
Documentation
20
Error Messages
0
Auth Simplicity
40
Rate Limits
0

🔒 Security

TLS Enforcement
0
Auth Strength
50
Scope Granularity
0
Dep. Hygiene
0
Secret Handling
0

Security depends on Shadowsocks cryptographic configuration and server hardening (e.g., using strong ciphers/keys, secure config management, limiting exposure at the network layer). Because no repository code/config/log-handling details are provided here, concrete guarantees (TLS, scope controls, secret storage, dependency posture) cannot be verified.

⚡ Reliability

Uptime/SLA
0
Version Stability
0
Breaking Changes
0
Error Recovery
0
AF Security Reliability

Use Cases

  • Running a Shadowsocks proxy server over KCP to improve performance on high-latency or lossy networks
  • Building a self-hosted anonymizing/egress proxy for clients that support KCP+Shadowsocks
  • Circumventing network throttling/packet loss compared to conventional TCP-based approaches

Not For

  • API/service integration in typical agent workflows (it is a network server, not a request/response API)
  • Environments requiring formal compliance guarantees without additional auditing/config hardening
  • Use cases needing fine-grained, documented admin/auth APIs (unless the project documentation provides them, which is not provided here)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
No

Authentication

Methods: Shadowsocks password/secret-based configuration (commonly via a server-side config, e.g., method+password)
OAuth: No Scopes: No

No explicit API-style auth documented in the provided prompt. Assumes standard Shadowsocks server shared-secret authentication configured on the server.

Pricing

Free tier: No
Requires CC: No

Self-hosted open-source/service pricing not determinable from provided information.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • This is a network server (UDP-based) rather than an API; agents expecting HTTP/REST tooling will not be able to interact with it directly.
  • Correct operation depends heavily on network/firewall/UDP reachability and configuration parameters (ports, congestion control, keys).
  • Operational errors are typically surfaced in logs rather than structured API responses.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for kcp-shadowsocks-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-04-04.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered