{"id":"svlentink-code-server","name":"code-server","homepage":"https://hub.docker.com/r/svlentink/code-server","repo_url":"https://hub.docker.com/r/svlentink/code-server","category":"devtools","subcategories":[],"tags":["devtools","infrastructure","web-ide","self-hosted","remote-development"],"what_it_does":"code-server provides a self-hosted web interface for running VS Code in the browser (remote development) with access to a local workspace on the host system.","use_cases":["Browser-based IDE access to a developer’s machine or server","Remote development for teams without full desktop IDE access","Development environment for CI-adjacent/temporary compute instances","Lightweight self-hosted “VS Code in a box” for learning/training environments"],"not_for":["Multi-tenant environments without strong isolation","Situations requiring fine-grained, per-user authorization and audit trails out of the box","Security-critical deployments that cannot manage TLS, authentication, and network exposure carefully"],"best_when":"You can self-host behind a trusted network edge or with explicit reverse-proxy/TLS/auth configuration, and you want an interactive web IDE tied to a specific workspace.","avoid_when":"You can’t control authentication/TLS/network exposure or you need strict compliance/auditing guarantees with minimal operational effort.","alternatives":["VS Code Server/Remote - SSH (direct VS Code client)","JetBrains Gateway","Gitpod","AWS Cloud9","OpenVSCode Server","Theia-based IDE solutions"],"af_score":24.2,"security_score":47.5,"reliability_score":33.8,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:26:57.929851+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Built-in web authentication options (e.g., password) and/or reverse-proxy auth (commonly)"],"oauth":false,"scopes":false,"notes":"Auth approach depends on deployment configuration (often via environment variables and/or reverse proxy). No evidence here of OAuth2 scopes or standardized authorization model."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Typically self-hosted open-source; costs are infrastructure and operational overhead rather than per-request API pricing."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":24.2,"security_score":47.5,"reliability_score":33.8,"mcp_server_quality":0.0,"documentation_accuracy":25.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":55.0,"rate_limit_clarity":0.0,"tls_enforcement":60.0,"auth_strength":55.0,"scope_granularity":25.0,"dependency_hygiene":45.0,"secret_handling":50.0,"security_notes":"Security depends heavily on operator configuration (TLS termination, authentication, network exposure). As a self-hosted web IDE, it should be treated as a powerful interactive interface; ensure HTTPS, strong auth (preferably MFA via upstream), least-privilege filesystem access, and restrict access to trusted networks.","uptime_documented":0.0,"version_stability":50.0,"breaking_changes_history":40.0,"error_recovery":45.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["code-server is primarily an interactive web application; there is no documented MCP/agent-oriented API in this evaluation context.","Agents attempting to interact programmatically may need UI automation rather than clean API calls.","Security posture varies significantly by reverse-proxy configuration (TLS/auth)."]}}