{"id":"unixfox-code-server","name":"code-server","homepage":"https://hub.docker.com/r/unixfox/code-server","repo_url":"https://hub.docker.com/r/unixfox/code-server","category":"devtools","subcategories":[],"tags":["devtools","web-ide","self-hosted","remote-development","browser-access"],"what_it_does":"code-server is a self-hosted, browser-accessible alternative to VS Code that runs locally or on a server and exposes a web UI for editing code, managing files, and using a remote development workflow.","use_cases":["Provide a web-based IDE for developers without installing local IDE tooling","Enable remote pair programming / collaborative development (with external auth/collaboration mechanisms)","Run consistent dev environments in VMs/containers on demand","Legacy or restricted environments where users can only access web apps"],"not_for":["Multi-tenant production deployments without careful security hardening and reverse-proxy controls","Use cases requiring a formal, documented REST/SDK API for programmatic automation","Environments that cannot provide HTTPS and appropriate access controls"],"best_when":"You can self-host behind a reverse proxy with HTTPS and strong authentication, and you want a web UI for interactive development.","avoid_when":"You cannot control network access, TLS, and authentication; or you need robust machine-to-machine APIs with stable contracts.","alternatives":["VS Code Server / Remote - SSH (official VS Code workflows)","Theia-based IDEs","Open WebUI-style dev environments (where applicable)","Web-based file editors and custom tooling (for limited use instead of a full IDE)"],"af_score":18.0,"security_score":47.8,"reliability_score":41.2,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:27:25.424522+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":["Web UI authentication (configured at deployment; commonly via configured credentials/reverse proxy)"],"oauth":false,"scopes":false,"notes":"Auth mechanisms are primarily configuration- and deployment-dependent; no explicit fine-grained OAuth scopes are indicated from the provided information."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Self-hosted open-source software model is typical; pricing depends on your hosting/infrastructure."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":18.0,"security_score":47.8,"reliability_score":41.2,"mcp_server_quality":0.0,"documentation_accuracy":35.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":40.0,"rate_limit_clarity":0.0,"tls_enforcement":70.0,"auth_strength":55.0,"scope_granularity":20.0,"dependency_hygiene":40.0,"secret_handling":50.0,"security_notes":"Security depends heavily on self-host deployment hardening (HTTPS via reverse proxy, least-privilege network access, and robust authentication). No evidence here of fine-grained authorization scopes or a documented secrets-handling model for automation.","uptime_documented":20.0,"version_stability":60.0,"breaking_changes_history":50.0,"error_recovery":35.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Interactive web UI is not a clean programmatic interface for an agent (screen-scraping/automation is fragile).","Security posture strongly depends on reverse proxy configuration and network exposure; agents should assume they must not rely on defaults for production."]}}