{"id":"emilybache-vsftpd-server","name":"vsftpd-server","homepage":"https://hub.docker.com/r/emilybache/vsftpd-server","repo_url":"https://hub.docker.com/r/emilybache/vsftpd-server","category":"infrastructure","subcategories":[],"tags":["ftp","ftps","server","self-hosted","linux","file-transfer","authentication","tls"],"what_it_does":"vsftpd (Very Secure FTP Daemon) is an FTP server for hosting file transfers over the network, typically on Linux systems. It supports user authentication, chroot/jails, and common FTP features, with optional TLS/SSL for FTPS.","use_cases":["Self-hosted FTP/FTPS file transfer for legacy clients","Inbound/outbound file drop for internal teams or automations","Serving public or semi-public directories with controlled access","Migration/compatibility for systems that still require FTP"],"not_for":["Internet-facing FTP without strong TLS and hardened configuration","Modern application-to-application file transfer that can use SFTP/HTTPS instead","Use cases requiring fine-grained API-level access controls and audit-friendly webhooks"],"best_when":"You control the network environment (firewalls/VPN), need FTP/FTPS compatibility, and will harden vsftpd (TLS enabled, least-privilege users, restricted filesystem access).","avoid_when":"You need robust security guarantees for untrusted internet clients or you can use SFTP/HTTPS with better operational and security properties.","alternatives":["OpenSSH SFTP (sftp-server)","ProFTPD","Nginx/Apache with WebDAV or HTTPS-based uploads","Object storage with presigned URLs (e.g., S3-compatible)","Globus or managed file transfer tools"],"af_score":15.5,"security_score":52.8,"reliability_score":35.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T19:37:38.344702+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["FTP username/password (traditional FTP auth)","FTPS with TLS (implicit/explicit modes depending on config)","System users / PAM (depending on configuration)","Anonymous FTP (if enabled; discouraged for security-sensitive deployments)"],"oauth":false,"scopes":false,"notes":"Authentication is configuration-driven (system/PAM/virtual users), not API-token based. Authorization/scoping is typically handled via filesystem permissions and vsftpd configuration rather than OAuth-like scopes."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Open-source software; operational costs come from hosting and security hardening."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":15.5,"security_score":52.8,"reliability_score":35.0,"mcp_server_quality":0.0,"documentation_accuracy":0.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":35.0,"rate_limit_clarity":0.0,"tls_enforcement":55.0,"auth_strength":65.0,"scope_granularity":30.0,"dependency_hygiene":50.0,"secret_handling":60.0,"security_notes":"vsftpd can provide TLS via FTPS, but security is highly dependent on correct configuration (enable TLS, disable weak modes, restrict users/directories, use chroot where appropriate). FTP user credentials are sent over the protocol unless protected by TLS. Fine-grained authorization/scopes are typically filesystem- and config-driven rather than token-based. As a widely used daemon, it has a security track record, but the actual dependency/vulnerability hygiene cannot be verified from the provided data.","uptime_documented":0.0,"version_stability":60.0,"breaking_changes_history":50.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["No programmatic API surface for AI agents; interaction is via network protocols (FTP/FTPS).","FTP semantics are not REST/HTTP-like; retries and idempotency depend on transfer commands and server settings.","Security posture depends heavily on configuration (TLS, chroot/jails, allowed users, passive mode firewall rules)."]}}