{"id":"rustdesk-rustdesk-server","name":"rustdesk-server","homepage":"https://hub.docker.com/r/rustdesk/rustdesk-server","repo_url":"https://hub.docker.com/r/rustdesk/rustdesk-server","category":"infrastructure","subcategories":[],"tags":["remote-access","remote-desktop","self-hosted","rust"],"what_it_does":"rustdesk-server is a self-hosted RustDesk server component intended to support RustDesk remote access/remote support workflows (e.g., rendezvous/relay/brokering pieces) rather than a single-purpose API product.","use_cases":["Self-hosted remote desktop access infrastructure","Remote support within an organization without relying on third-party infrastructure","Running RustDesk-related server components for NAT traversal/connection brokering/relaying"],"not_for":["A developer-friendly SaaS API for building automation around remote desktops","Environments that require a documented REST/GraphQL interface with stable schemas","Use by agents expecting OAuth/API-key-based fine-grained scopes for specific operations"],"best_when":"You control the hosting environment and want to operate RustDesk server infrastructure as part of a remote access deployment.","avoid_when":"You need a well-documented public API surface (OpenAPI/SDK) or strict operational guarantees (SLA, documented retries/idempotency) aimed at programmatic agent use.","alternatives":["RustDesk deployment options that use official hosted infrastructure","Other self-hosted remote access stacks (e.g., self-hosted VNC/mesh VPN + remote tooling)","Commercial remote support platforms with documented APIs"],"af_score":14.8,"security_score":36.8,"reliability_score":30.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"high","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-03-30T13:34:08.841132+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"No explicit client authentication method details were provided in the available input; for an operational server, authentication/authorization is likely handled via configuration and RustDesk protocol mechanisms rather than a documented developer API auth scheme."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"As a self-hosted component, pricing is typically infrastructure/operator cost rather than per-request API billing."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":14.8,"security_score":36.8,"reliability_score":30.0,"mcp_server_quality":0.0,"documentation_accuracy":20.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":30.0,"rate_limit_clarity":0.0,"tls_enforcement":60.0,"auth_strength":35.0,"scope_granularity":20.0,"dependency_hygiene":40.0,"secret_handling":30.0,"security_notes":"Security posture cannot be fully assessed from the provided input alone. As a remote access server component, it likely supports sensitive connectivity paths; lack of observed developer-facing auth/scoping documentation reduces confidence in least-privilege and programmatic enforcement. TLS and secret-handling details were not provided in the prompt data.","uptime_documented":0.0,"version_stability":50.0,"breaking_changes_history":40.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["No agent-friendly API contract (REST/GraphQL/OpenAPI/MCP) is provided for automated workflows.","Operational behavior depends heavily on deployment configuration and network topology (NAT traversal/relay paths).","Connection-oriented remote access systems are not naturally idempotent like CRUD APIs."]}}