{"id":"jumpserver-mysql","name":"mysql","homepage":"https://hub.docker.com/r/jumpserver/mysql","repo_url":"https://hub.docker.com/r/jumpserver/mysql","category":"databases","subcategories":[],"tags":["databases","mysql","sql","drivers","connectivity"],"what_it_does":"The mysql package typically provides a MySQL database client/driver for connecting to a MySQL server, executing SQL queries, and managing connections/cursors from an application.","use_cases":["Connecting an application service to a MySQL database","Running queries and migrations or administrative SQL","Building CRUD endpoints backed by MySQL","ETL/analytics jobs that read/write MySQL data"],"not_for":["Replacing a database server (it is a client/driver, not the database itself)","High-level business workflows without database access","Use in untrusted network environments without proper TLS and credential handling"],"best_when":"You need programmatic access to a MySQL database from your codebase (backend services, workers, scripts).","avoid_when":"You cannot securely manage database credentials or you require a managed, hosted SQL API with network-level access controls.","alternatives":["mysql2 (Node.js)","pg (for PostgreSQL)","mariadb (MySQL-compatible in some ecosystems)","SQLAlchemy/JDBC equivalents depending on language","Amazon RDS/Aurora MySQL via SDKs where applicable"],"af_score":31.0,"security_score":48.5,"reliability_score":35.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:34:04.046636+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":true,"sdk_languages":["unknown"],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Database username/password","(Optionally) TLS client auth depending on driver configuration","(Optionally) connection options such as auth plugin support depending on driver"],"oauth":false,"scopes":false,"notes":"Auth is handled via MySQL connection credentials/parameters configured at runtime; there is no OAuth/API-key model exposed by the package itself."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Open-source/community driver implied; cost is primarily your database hosting and infrastructure, not the package."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":31.0,"security_score":48.5,"reliability_score":35.0,"mcp_server_quality":0.0,"documentation_accuracy":35.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":45.0,"rate_limit_clarity":0.0,"tls_enforcement":60.0,"auth_strength":60.0,"scope_granularity":20.0,"dependency_hygiene":50.0,"secret_handling":50.0,"security_notes":"Security depends heavily on how you configure the client: ensure TLS/SSL is enabled where appropriate, use least-privilege MySQL users, and protect credentials (env vars/secret manager). Scope granularity is limited to MySQL user privileges rather than fine-grained OAuth scopes. Rate-limiting is not a package concern (it is typically enforced at DB/proxy/network levels).","uptime_documented":0.0,"version_stability":50.0,"breaking_changes_history":50.0,"error_recovery":40.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["SQL is stateful: retries can re-run non-idempotent statements (e.g., INSERT without idempotency/constraints)","Credential handling is on the integrator: avoid putting passwords in logs or prompts","Schema/connection configuration differences across MySQL versions (auth plugins, SSL modes, SQL modes) may cause runtime failures"]}}