{"id":"wjqserver-ghproxy","name":"ghproxy","homepage":"https://hub.docker.com/r/wjqserver/ghproxy","repo_url":"https://hub.docker.com/r/wjqserver/ghproxy","category":"infrastructure","subcategories":[],"tags":["proxy","github","networking","caching","infrastructure","http"],"what_it_does":"ghproxy is a proxy service/tool intended to fetch content from GitHub through an alternate endpoint, typically to bypass direct access restrictions (e.g., CORS, corporate egress rules, or rate limiting) by relaying requests and returning GitHub responses.","use_cases":["Proxying GitHub resources from environments that cannot reach GitHub directly","Fetching raw files (e.g., READMEs, model assets, configuration files) via an alternate domain","Workarounds for browser CORS issues by routing through a same-origin proxy","Centralized caching/egress control for GitHub content in an internal network"],"not_for":["Sensitive production workloads that require strong integrity guarantees without additional verification","Use as a general-purpose auth gateway to protect GitHub credentials (it typically should not be tasked with secrets)","Guaranteeing deterministic content versions without pinning (proxying alone may not provide integrity/pinning)"],"best_when":"You need reliable access to publicly available GitHub content from constrained networks or from browsers where direct GitHub requests are blocked.","avoid_when":"You require cryptographic integrity verification of fetched content, fine-grained authZ, or strict compliance controls without implementing additional safeguards (e.g., allowlists, signature/hash verification).","alternatives":["Self-hosted GitHub Actions/Artifact mirroring","Using a CDN or caching layer for GitHub raw content (with integrity pinning)","Official GitHub APIs (where appropriate) instead of proxying HTML/raw endpoints","git submodules / sparse checkout to fetch code directly"],"af_score":26.0,"security_score":40.5,"reliability_score":25.0,"package_type":"mcp_server","discovery_source":["docker_mcp"],"priority":"low","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-04-04T21:34:00.010291+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"No explicit auth interface can be confirmed from the provided information. Many proxy tools accept requests without user auth or use simple configuration-based controls."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Pricing cannot be determined from the provided information (likely self-hosted/open-source proxy)."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":26.0,"security_score":40.5,"reliability_score":25.0,"mcp_server_quality":0.0,"documentation_accuracy":0.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":60.0,"rate_limit_clarity":5.0,"tls_enforcement":70.0,"auth_strength":20.0,"scope_granularity":10.0,"dependency_hygiene":50.0,"secret_handling":60.0,"security_notes":"As a proxy, the main risks typically include SSRF/path traversal if URL targets are not tightly validated, cache poisoning if caching is enabled without proper keying, and misuse as an open proxy. TLS enforcement depends on deployment configuration; auth/scoping are unknown. Dependency hygiene and secret handling cannot be verified from the provided information.","uptime_documented":0.0,"version_stability":40.0,"breaking_changes_history":30.0,"error_recovery":30.0,"idempotency_support":"false","idempotency_notes":null,"pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Proxy endpoints may require careful URL encoding and path handling to avoid incorrect upstream targets","Without explicit allowlists/validation, agents may inadvertently request unintended upstream resources","If implemented without caching or timeouts, long upstream fetches can lead to agent timeouts and inconsistent results","If rate limiting is not clearly documented, agents may trigger upstream throttling unpredictably"]}}