{"id":"supersandro2000-code-server","name":"code-server","homepage":"https://hub.docker.com/r/supersandro2000/code-server","repo_url":"https://hub.docker.com/r/supersandro2000/code-server","category":"devtools","subcategories":[],"tags":["web-ide","self-hosted","developer-tools","ide","browser-access","vscode"],"what_it_does":"code-server is a self-hosted way to run Visual Studio Code in the browser. It provides a web UI backed by a server process that connects to a filesystem/workspace and exposes editing, terminal, and related developer features over HTTP(S).","use_cases":["Provide browser-based access to a code editor for remote teams","Run lightweight IDE access on a server or within a VM/container","Enable quick development environments without local IDE installation","Educational/lab environments where students use a browser to edit code"],"not_for":["Multi-tenant production services without strong operational hardening","Scenarios requiring fine-grained authorization and audit trails out-of-the-box","Use cases needing a stable machine-to-machine REST/GraphQL API as the primary interface"],"best_when":"You can self-host in a controlled environment (network + auth proxy + TLS), and you want browser-based development with direct access to server resources.","avoid_when":"You need robust, documented programmatic APIs for automation, or you cannot enforce TLS/auth and network isolation.","alternatives":["OpenVSCode Server","VS Code Web (vscode.dev / browser-based variants where available)","JetBrains Gateway / cloud IDE solutions","Theia-based IDE servers"],"af_score":24.0,"security_score":50.2,"reliability_score":36.2,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:28:30.562356+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Browser session authentication (as configured by the deployment; often via built-in auth/password or behind a reverse proxy)"],"oauth":false,"scopes":false,"notes":"code-server deployments typically rely on configuration and/or a reverse proxy for access control; publicly available docs may vary by version, so exact auth modes and scope granularity should be verified for the specific deployment you run."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Self-hosted software; costs are infrastructure/hosting related rather than per-request API pricing."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":24.0,"security_score":50.2,"reliability_score":36.2,"mcp_server_quality":0.0,"documentation_accuracy":45.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":50.0,"rate_limit_clarity":0.0,"tls_enforcement":70.0,"auth_strength":55.0,"scope_granularity":25.0,"dependency_hygiene":50.0,"secret_handling":50.0,"security_notes":"Security largely comes from your deployment: enforce HTTPS/TLS, restrict network access, and ensure strong authentication. code-server can expose powerful filesystem and terminal capabilities, so misconfiguration (public exposure, weak auth, missing CSRF protections if applicable) can be high risk. Verify how secrets/tokens are handled in your chosen auth method and reverse proxy.","uptime_documented":0.0,"version_stability":60.0,"breaking_changes_history":45.0,"error_recovery":40.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Not designed primarily as an API surface for autonomous agents; interaction is typically via web UI and underlying editor protocols.","Server-side operations can have side effects (file writes, installs) that are not idempotent by default.","Security posture depends heavily on deployment configuration (auth, TLS, network exposure)."]}}