{"id":"agassiyzh-snell-server","name":"snell-server","homepage":"https://hub.docker.com/r/agassiyzh/snell-server","repo_url":"https://hub.docker.com/r/agassiyzh/snell-server","category":"infrastructure","subcategories":[],"tags":["infrastructure","networking","proxy","tunneling","self-hosted","privacy"],"what_it_does":"snell-server is a server implementation for the Snell (Snell's protocol) proxy protocol, typically used to run a network proxy endpoint (listener) that clients can connect to for tunneled traffic.","use_cases":["Running a Snell proxy server for tunneled outbound traffic","Providing a lightweight proxy endpoint for clients that support Snell","Self-hosted proxying for privacy/network egress control"],"not_for":["Providing a managed, turn-key SaaS proxy service with built-in monitoring and SLAs","Use cases requiring a first-class web API, SDKs, or enterprise IAM integration","Environments that cannot operate a custom network service (open ports, firewall rules, ops overhead)"],"best_when":"You want to self-host a Snell proxy server and you can manage network/service configuration (ports, TLS/keys, process supervision).","avoid_when":"You need a standardized REST/GraphQL/gRPC API for agent workflows or require strong enterprise security/compliance features out of the box.","alternatives":["sing-box","V2Ray/Xray (with appropriate protocols/configs)","Trojan-Go","WireGuard (as an alternative tunneling approach, not Snell protocol compatible)","Shadowsocks (with different threat model and protocol)"],"af_score":21.5,"security_score":45.2,"reliability_score":32.5,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:25:04.628406+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Snell protocol authentication (typically via configured credentials/keys in server config)"],"oauth":false,"scopes":false,"notes":"Auth method details (e.g., how keys/tokens are configured, rotation behavior) are not provided in the prompt, so this is assessed at a general level for Snell servers."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"This appears to be a self-hosted open-source/server package; pricing is not applicable based on the provided information."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":21.5,"security_score":45.2,"reliability_score":32.5,"mcp_server_quality":0.0,"documentation_accuracy":20.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":55.0,"rate_limit_clarity":0.0,"tls_enforcement":60.0,"auth_strength":55.0,"scope_granularity":10.0,"dependency_hygiene":50.0,"secret_handling":50.0,"security_notes":"Security depends heavily on server configuration (keys/credentials, network exposure, and transport security). No concrete evidence about TLS enforcement, credential handling, or dependency scanning is available from the provided prompt.","uptime_documented":0.0,"version_stability":50.0,"breaking_changes_history":50.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Network services require external connectivity (open ports/firewall/NAT) and careful configuration; agents cannot 'call' it like an API.","Without an explicit programmatic interface, agent integration is limited to provisioning/config generation and process management."]}}