{"id":"linuxserver-qemu-static","name":"qemu-static","homepage":"https://hub.docker.com/r/linuxserver/qemu-static","repo_url":"https://hub.docker.com/r/linuxserver/qemu-static","category":"infrastructure","subcategories":[],"tags":["emulation","qemu","cross-architecture","containers","binfmt_misc"],"what_it_does":"qemu-static provides static QEMU user-mode and system-mode binaries (e.g., qemu-*-static) intended to run foreign-architecture executables and systems without installing dynamic QEMU libraries on the target. It is commonly used in container/build contexts to emulate other CPU architectures via binfmt_misc and related tooling.","use_cases":["Running containers or binaries built for a different CPU architecture (cross-arch execution)","Building multi-arch images with emulation (CI/build pipelines)","Testing and running legacy or foreign-architecture executables","Cross-architecture debugging/troubleshooting using QEMU emulation"],"not_for":["Performance-critical workloads (emulation is slower than native)","Production workloads requiring near-native throughput or strict latency guarantees","Security-sensitive environments where emulated guest code increases attack surface beyond native execution"],"best_when":"You need quick, portable cross-architecture execution (often in containers/CI) and can accept the emulation overhead and operational considerations of QEMU.","avoid_when":"You cannot tolerate emulation overhead, or your threat model doesn’t allow executing untrusted guest binaries under emulation.","alternatives":["Native multi-architecture deployment (run on real ARM/x86 hardware)","Cloud/CI cross-architecture runners (native ARM runners)","Other emulation approaches (e.g., full-system virtualization with KVM on supported hosts)","Docker Buildx with native builders for each architecture"],"af_score":18.2,"security_score":46.0,"reliability_score":32.5,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:36:27.093786+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"No application-level authentication/API surface. Access is via executing local binaries (and optional binfmt_misc registration), typically controlled by OS permissions."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Open-source project; no service pricing identified from provided context."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":18.2,"security_score":46.0,"reliability_score":32.5,"mcp_server_quality":0.0,"documentation_accuracy":0.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":100.0,"rate_limit_clarity":0.0,"tls_enforcement":100.0,"auth_strength":0.0,"scope_granularity":0.0,"dependency_hygiene":40.0,"secret_handling":100.0,"security_notes":"No network/TLS/auth surface (local binaries). Main security considerations are operational: executing untrusted foreign-architecture code expands the attack surface; ensure binfmt_misc registration is controlled and avoid granting excessive host permissions to workloads using emulation. Dependency/security hygiene is not verifiable from the provided package info.","uptime_documented":0.0,"version_stability":55.0,"breaking_changes_history":45.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["This is not an API package; agents must interact via filesystem/command execution and OS configuration (e.g., binfmt_misc).","Emulation behavior depends heavily on host CPU, kernel/binfmt_misc configuration, and the guest architecture binaries.","Running untrusted binaries under emulation can have different security implications than native execution."]}}