{"id":"serversideup-proftpd","name":"proftpd","homepage":"https://hub.docker.com/r/serversideup/proftpd","repo_url":"https://hub.docker.com/r/serversideup/proftpd","category":"storage","subcategories":[],"tags":["ftp","file-transfer","server","self-hosted","legacy-compatibility","networking"],"what_it_does":"ProFTPD (proftpd) is an open-source FTP server software that lets you run FTP services, configure virtual hosts/accounts, and manage file transfers over FTP (and typically FTP over TLS depending on configuration).","use_cases":["Self-hosted FTP for legacy clients and workflows","On-prem file transfer endpoints for applications/integrations that require FTP","Controlled upload/download access using local user accounts and directory permissions","Migration/compatibility deployments where SFTP/HTTPS are not viable"],"not_for":["Internet-facing deployments without strong network controls and secure transfer configuration","Modern systems that can use SFTP, FTPS with strict policy, or HTTPS APIs instead","Use cases requiring fine-grained API-level access control or audit/event streaming beyond FTP logs"],"best_when":"You need a classic FTP server for legacy compatibility and you can securely configure it (access restrictions, TLS where appropriate, least-privilege filesystem permissions).","avoid_when":"You need secure-by-default authentication/authorization flows for untrusted clients, or you cannot apply network hardening and TLS policy for credential protection.","alternatives":["SFTP servers (e.g., OpenSSH sftp-server)","FTPS variants (e.g., vsftpd with TLS)","Object storage + pre-signed URLs","Message-queue/webhook-based file transfer patterns (where applicable)","HTTP-based transfer (with auth) for modern integrations"],"af_score":23.0,"security_score":45.5,"reliability_score":33.8,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:35:50.591628+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["system/local user accounts"],"oauth":false,"scopes":false,"notes":"Authentication is typically via FTP login (often using system users or configured credentials), with authorization controlled via configuration and filesystem permissions. OAuth/scopes are not applicable."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Open-source; operational cost is infrastructure/admin time."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":23.0,"security_score":45.5,"reliability_score":33.8,"mcp_server_quality":0.0,"documentation_accuracy":30.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":60.0,"rate_limit_clarity":0.0,"tls_enforcement":35.0,"auth_strength":55.0,"scope_granularity":25.0,"dependency_hygiene":45.0,"secret_handling":65.0,"security_notes":"Security depends on configuration: FTP credentials are typically vulnerable if used without TLS/FTPS. If configured with TLS (FTPS), credentials and session can be protected, but least-privilege filesystem permissions and strict access controls remain critical. Scope-like fine-grained authorization is generally limited compared to modern API auth models.","uptime_documented":0.0,"version_stability":55.0,"breaking_changes_history":50.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["FTP is stateful and not designed for agentic/API-style workflows; agents may need to manage sessions, passive/active mode, and network traversal quirks.","Security posture depends heavily on server configuration (TLS/FTPS, allowed ciphers, permitted users, directory permissions).","Idempotency is not inherent to FTP operations; re-uploads/downloads may overwrite unless safeguards are configured."]}}