Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
TypeScript MCP server for AI-powered containerization workflows with Docker and Kubernetes support Containerization Assist MCP Server $1 $1 $1 $1 $1 $1 An AI-powered containerization assistant that helps you build, scan, and deploy Docker containers through VS Code and other MCP-compatible tools. Features Core Capabilities - 🐳 **Docker Integration**: Build, scan, and deploy container images - ☸️ **Kubernetes Support**: Generate manifests and deploy applications - 🤖 **AI-Powered**: Intelligent Dockerfile generati Published capability contract available. No trust telemetry is available yet. 35 GitHub stars reported by the source. Last updated 2/24/2026.
Freshness
Last checked 2/22/2026
Best For
Contract is available with explicit auth and schema references.
Not Ideal For
containerization-assist-mcp is not ideal for teams that need stronger public trust telemetry, lower setup complexity, or more explicit contract coverage before production rollout.
Evidence Sources Checked
editorial-content, capability-contract, runtime-metrics, public facts pack
TypeScript MCP server for AI-powered containerization workflows with Docker and Kubernetes support Containerization Assist MCP Server $1 $1 $1 $1 $1 $1 An AI-powered containerization assistant that helps you build, scan, and deploy Docker containers through VS Code and other MCP-compatible tools. Features Core Capabilities - 🐳 **Docker Integration**: Build, scan, and deploy container images - ☸️ **Kubernetes Support**: Generate manifests and deploy applications - 🤖 **AI-Powered**: Intelligent Dockerfile generati
Public facts
7
Change events
1
Artifacts
0
Freshness
Feb 22, 2026
Published capability contract available. No trust telemetry is available yet. 35 GitHub stars reported by the source. Last updated 2/24/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Feb 22, 2026
Vendor
Azure
Artifacts
0
Benchmarks
0
Last release
1.2.0
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Published capability contract available. No trust telemetry is available yet. 35 GitHub stars reported by the source. Last updated 2/24/2026.
Setup snapshot
git clone https://github.com/Azure/containerization-assist.gitSetup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Azure
Protocol compatibility
MCP
Auth modes
mcp, api_key
Machine-readable schemas
OpenAPI or schema references published
Adoption signal
35 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
json
{
"servers": {
"containerization-assist": {
"command": "npx",
"args": ["-y", "containerization-assist-mcp", "start"],
"env": {
"LOG_LEVEL": "info"
}
}
}
}typescript
import { analyzeRepo, buildImageContext, scanImage } from 'containerization-assist-mcp/sdk';
import { execSync } from 'child_process';
// Simple function calls - no MCP server needed
const analysis = await analyzeRepo({ repositoryPath: './myapp' });
if (analysis.ok) {
console.log('Detected:', analysis.value.modules);
}
// buildImageContext returns build context with security analysis and commands
const buildContext = await buildImageContext({ path: './myapp', imageName: 'myapp:v1', platform: 'linux/amd64' });
if (buildContext.ok) {
const { securityAnalysis, nextAction } = buildContext.value;
console.log('Security risk:', securityAnalysis.riskLevel);
// Execute the generated build command from the build context directory
execSync(nextAction.buildCommand.command, {
cwd: buildContext.value.context.buildContextPath,
env: { ...process.env, ...nextAction.buildCommand.environment }
});
}
const scan = await scanImage({ imageId: 'myapp:v1' });json
"DOCKER_SOCKET": "//./pipe/docker_engine"
text
"Analyze my Java application for containerization"
text
"Generate an optimized Dockerfile with security best practices" "Build a Docker image tagged myapp:v1.0.0" "Scan the image for vulnerabilities"
text
"Generate Kubernetes manifests for this application" "Prepare my cluster and deploy to the default namespace" "Verify the deployment is healthy"
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB MCP
Editorial quality
ready
TypeScript MCP server for AI-powered containerization workflows with Docker and Kubernetes support Containerization Assist MCP Server $1 $1 $1 $1 $1 $1 An AI-powered containerization assistant that helps you build, scan, and deploy Docker containers through VS Code and other MCP-compatible tools. Features Core Capabilities - 🐳 **Docker Integration**: Build, scan, and deploy container images - ☸️ **Kubernetes Support**: Generate manifests and deploy applications - 🤖 **AI-Powered**: Intelligent Dockerfile generati
An AI-powered containerization assistant that helps you build, scan, and deploy Docker containers through VS Code and other MCP-compatible tools.
Full control over containerization through Rego policies:
Example Policies Included:
See Policy Authoring Guide for details.
Add the following to your VS Code settings or create .vscode/mcp.json in your project:
{
"servers": {
"containerization-assist": {
"command": "npx",
"args": ["-y", "containerization-assist-mcp", "start"],
"env": {
"LOG_LEVEL": "info"
}
}
}
}
Restart VS Code to enable the MCP server in GitHub Copilot.
For direct tool usage without MCP protocol (e.g., VS Code extensions, programmatic access):
import { analyzeRepo, buildImageContext, scanImage } from 'containerization-assist-mcp/sdk';
import { execSync } from 'child_process';
// Simple function calls - no MCP server needed
const analysis = await analyzeRepo({ repositoryPath: './myapp' });
if (analysis.ok) {
console.log('Detected:', analysis.value.modules);
}
// buildImageContext returns build context with security analysis and commands
const buildContext = await buildImageContext({ path: './myapp', imageName: 'myapp:v1', platform: 'linux/amd64' });
if (buildContext.ok) {
const { securityAnalysis, nextAction } = buildContext.value;
console.log('Security risk:', securityAnalysis.riskLevel);
// Execute the generated build command from the build context directory
execSync(nextAction.buildCommand.command, {
cwd: buildContext.value.context.buildContextPath,
env: { ...process.env, ...nextAction.buildCommand.environment }
});
}
const scan = await scanImage({ imageId: 'myapp:v1' });
See CLAUDE.md for full SDK documentation.
For Windows, use the Windows Docker pipe:
"DOCKER_SOCKET": "//./pipe/docker_engine"
The easiest way to understand the containerization workflow is through an end-to-end example:
This MCP server guides you through a complete containerization workflow for a single application. The journey follows this sequence:
Before starting, ensure you have:
docker ps should work)
/var/run/docker.sock accessible//./pipe/docker_engine accessible~/.kube/configkubectl cluster-info should work)Once configured in your MCP client (VS Code Copilot, Claude Desktop, etc.), use natural language:
Starting the Journey:
"Analyze my Java application for containerization"
Building the Container:
"Generate an optimized Dockerfile with security best practices"
"Build a Docker image tagged myapp:v1.0.0"
"Scan the image for vulnerabilities"
Deploying to Kubernetes:
"Generate Kubernetes manifests for this application"
"Prepare my cluster and deploy to the default namespace"
"Verify the deployment is healthy"
This server is optimized for one engineer containerizing one application at a time. Key characteristics:
The server detects and supports monorepo structures with multiple independently deployable services:
analyze-repo identifies monorepo patterns (npm workspaces, services/, apps/ directories)generate-dockerfile and generate-k8s-manifests support multi-module workflowsMulti-Module Workflow Example:
1. "Analyze my monorepo at ./my-monorepo"
→ Detects 3 modules: api-gateway, user-service, notification-service
2. "Generate Dockerfiles"
→ Automatically creates Dockerfiles for all 3 modules:
- services/api-gateway/Dockerfile
- services/user-service/Dockerfile
- services/notification-service/Dockerfile
3. "Generate K8s manifests"
→ Automatically creates manifests for all 3 modules
4. Optional: "Generate Dockerfile for user-service module"
→ Creates module-specific deployment manifests
Detection Criteria:
The server provides 13 MCP tools organized by functionality:
| Tool | Description |
|------|-------------|
| analyze-repo | Analyze repository structure and detect technologies by parsing config files |
| Tool | Description |
|------|-------------|
| generate-dockerfile | Gather insights from knowledge base and return requirements for Dockerfile creation |
| fix-dockerfile | Analyze Dockerfile for issues including organizational policy validation and return knowledge-based fix recommendations |
| Tool | Description |
|------|-------------|
| build-image-context | Prepare Docker build context with security analysis and return build commands |
| scan-image | Scan Docker images for security vulnerabilities with remediation guidance (uses Trivy CLI) |
| tag-image | Tag Docker images with version and registry information |
| push-image | Push Docker images to a registry |
| Tool | Description |
|------|-------------|
| generate-k8s-manifests | Gather insights and return requirements for Kubernetes/Helm/ACA/Kustomize manifest creation |
| prepare-cluster | Prepare Kubernetes cluster for deployment |
| verify-deploy | Verify Kubernetes deployment status |
| Tool | Description |
|------|-------------|
| ops | Operational utilities for ping and server status |
The following environment variables control server behavior:
| Variable | Description | Default | Required |
|----------|-------------|---------|----------|
| DOCKER_SOCKET | Docker socket path | /var/run/docker.sock (Linux/Mac)<br>//./pipe/docker_engine (Windows) | Yes (for Docker features) |
| DOCKER_TIMEOUT | Docker operation timeout in milliseconds | 60000 (60s) | No |
| KUBECONFIG | Path to Kubernetes config file | ~/.kube/config | No |
| K8S_NAMESPACE | Default Kubernetes namespace | default | No |
| LOG_LEVEL | Logging level | info | No |
| WORKSPACE_DIR | Working directory for operations | Current directory | No |
| MCP_MODE | Enable MCP protocol mode (logs to stderr) | false | No |
| MCP_QUIET | Suppress non-essential output in MCP mode | false | No |
| CONTAINERIZATION_ASSIST_TOOL_LOGS_DIR_PATH | Directory path for tool execution logs (JSON format) | Disabled | No |
| CUSTOM_POLICY_PATH | Directory path for custom policies (highest priority) | Not set | No |
Progress Notifications: Long-running operations (build, deploy, scan-image) emit real-time progress updates via MCP notifications. MCP clients can subscribe to these notifications to display progress to users.
Enable detailed logging of all tool executions to JSON files for debugging and auditing:
export CONTAINERIZATION_ASSIST_TOOL_LOGS_DIR_PATH=/path/to/logs
Log File Format:
ca-tool-logs-${timestamp}.jsonlca-tool-logs-2025-10-13T14-30-15-123Z.jsonlLog Contents:
{
"timestamp": "2025-10-13T14:30:15.123Z",
"toolName": "analyze-repo",
"input": { "path": "/workspace/myapp" },
"output": { "language": "typescript", "framework": "express" },
"success": true,
"durationMs": 245,
"error": "Error message if failed",
"errorGuidance": {
"hint": "Suggested fix",
"resolution": "Step-by-step instructions"
}
}
The logging directory is validated at startup to ensure it's writable.
The policy system uses OPA Rego for security, quality, and compliance enforcement. Rego is the industry-standard policy language from Open Policy Agent, providing expressive rules with rich built-in functions.
Default Behavior (No Configuration Needed):
By default, all policies in the policies/ directory are automatically discovered and merged:
policies/security-baseline.rego - Essential security rules (root user prevention, secrets detection, privileged containers)policies/base-images.rego - Base image governance (Microsoft Azure Linux recommendation, no :latest tag, deprecated versions)policies/container-best-practices.rego - Docker best practices (HEALTHCHECK, multi-stage builds, layer optimization)This provides comprehensive out-of-the-box security and quality enforcement.
The policy system supports three priority-ordered search paths for easy customization:
Priority Order (highest to lowest):
CUSTOM_POLICY_PATH environment variable (NPM users)policies.user/ directory in your repository (source installation users)policies/ (baseline policies)Later policies override earlier policies during merging by package namespace.
# Copy example policy to policies.user/
mkdir -p policies.user
cp policies.user.examples/allow-all-registries.rego policies.user/
# Restart your MCP client (VS Code, Claude Desktop, etc.)
# 1. Create custom policy directory
mkdir -p ~/.config/containerization-assist/policies
# 2. Copy example policy
cp node_modules/containerization-assist-mcp/policies.user.examples/allow-all-registries.rego \
~/.config/containerization-assist/policies/
# 3. Configure environment variable in .vscode/mcp.json
{
"servers": {
"containerization-assist": {
"env": {
"CUSTOM_POLICY_PATH": "${env:HOME}/.config/containerization-assist/policies"
}
}
}
}
# 4. Restart VS Code
The policies.user.examples/ directory includes three ready-to-use examples:
| Example | Purpose | Use Case |
|---------|---------|----------|
| allow-all-registries.rego | Override MCR preference | Docker Hub, GCR, ECR, private registries |
| warn-only-mode.rego | Advisory-only enforcement | Testing, gradual adoption, dev environments |
| custom-organization-template.rego | Organization template | Custom labels, registries, compliance |
See policies.user.examples/README.md for detailed usage.
Three production-ready Rego policies are included by default:
policies/security-baseline.rego - Essential security rules (root user prevention, secrets detection, privileged containers)policies/base-images.rego - Base image governance (Microsoft Azure Linux recommendation, no :latest tag, deprecated versions)policies/container-best-practices.rego - Docker best practices (HEALTHCHECK, multi-stage builds, layer optimization)User policies override built-in policies by package namespace.
Policy File Format (Rego):
package containerization.custom_policy
# Blocking violations
violations contains result if {
input_type == "dockerfile"
regex.match(`FROM\s+[^:]+:latest`, input.content)
result := {
"rule": "block-latest-tag",
"category": "quality",
"priority": 80,
"severity": "block",
"message": "Using :latest tag is not allowed. Specify explicit version tags.",
"description": "Prevent :latest for reproducibility",
}
}
# Non-blocking warnings
warnings contains result if {
input_type == "dockerfile"
not regex.match(`HEALTHCHECK`, input.content)
result := {
"rule": "suggest-healthcheck",
"category": "quality",
"priority": 70,
"severity": "warn",
"message": "Consider adding HEALTHCHECK instruction for container monitoring",
"description": "HEALTHCHECK improves container lifecycle management",
}
}
# Policy decision
default allow := false
allow if count(violations) == 0
# Result structure
result := {
"allow": allow,
"violations": violations,
"warnings": warnings,
"suggestions": [],
"summary": {
"total_violations": count(violations),
"total_warnings": count(warnings),
"total_suggestions": 0,
},
}
Priority Levels:
Using Policies:
# List discovered policies
npx containerization-assist-mcp list-policies
# List policies and show merged result
npx containerization-assist-mcp list-policies --show-merged
# Validate Dockerfile with policies (automatic discovery)
npx containerization-assist-mcp fix-dockerfile --path ./Dockerfile
Creating Custom Policies:
See Policy Customization Guide and existing policies in policies/ for examples.
Testing Policies:
# Validate policy syntax
opa check policies.user/my-policy.rego
# Run policy tests
opa test policies.user/
# Test with MCP Inspector
npx @modelcontextprotocol/inspector containerization-assist-mcp start
npx @modelcontextprotocol/inspector containerization-assist-mcp start
# Check Docker is running
docker ps
# Check socket permissions (Linux/Mac)
ls -la /var/run/docker.sock
# For Windows, ensure Docker Desktop is running
# Test with MCP Inspector
npx @modelcontextprotocol/inspector containerization-assist-mcp start
# Check logs with debug level
npx -y containerization-assist-mcp start --log-level debug
The server performs fast-fail validation when Kubernetes tools are used. If you encounter Kubernetes errors:
Kubeconfig Not Found
# Check if kubeconfig exists
ls -la ~/.kube/config
# Verify kubectl can connect
kubectl cluster-info
# If using cloud providers, update kubeconfig:
# AWS EKS
aws eks update-kubeconfig --name <cluster-name> --region <region>
# Google GKE
gcloud container clusters get-credentials <cluster-name> --zone <zone>
# Azure AKS
az aks get-credentials --resource-group <rg> --name <cluster-name>
Connection Timeout or Refused
# Verify cluster is running
kubectl get nodes
# Check API server address
kubectl config view
# Test connectivity to API server
kubectl cluster-info dump
# Verify firewall rules allow connection to API server port (typically 6443)
Authentication or Authorization Errors
# Check current context and user
kubectl config current-context
kubectl config view --minify
# Test permissions
kubectl auth can-i create deployments --namespace default
kubectl auth can-i create services --namespace default
# If using cloud providers, refresh credentials:
# AWS EKS: re-run update-kubeconfig
# GKE: run gcloud auth login
# AKS: run az login
Invalid or Missing Context
# List available contexts
kubectl config get-contexts
# Set a context
kubectl config use-context <context-name>
# View current configuration
kubectl config view
MIT License - See LICENSE file for details.
See SUPPORT.md for information on how to get help with this project.
This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft’s Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party’s policies.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
ready
Auth
mcp, api_key
Streaming
No
Data region
global
Protocol support
Requires: mcp, lang:typescript
Forbidden: none
Guardrails
Operational confidence: medium
curl -s "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/contract"
curl -s "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "ready",
"authModes": [
"mcp",
"api_key"
],
"requires": [
"mcp",
"lang:typescript"
],
"forbidden": [],
"supportsMcp": true,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": "https://github.com/Azure/containerization-assist#input",
"outputSchemaRef": "https://github.com/Azure/containerization-assist#output",
"dataRegion": "global",
"contractUpdatedAt": "2026-02-24T19:46:03.343Z",
"sourceUpdatedAt": "2026-02-24T19:46:03.343Z",
"freshnessSeconds": 4433193
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_MCP",
"generatedAt": "2026-04-17T03:12:36.375Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "supported",
"confidenceSource": "contract",
"notes": "Confirmed by capability contract"
},
{
"key": "mcp",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "model-context-protocol",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "containerization",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "docker",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "kubernetes",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "ai-assisted",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "devops",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "java",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "spring-boot",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "maven",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "gradle",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "cli",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|supported|contract capability:mcp|supported|profile capability:model-context-protocol|supported|profile capability:containerization|supported|profile capability:docker|supported|profile capability:kubernetes|supported|profile capability:ai-assisted|supported|profile capability:devops|supported|profile capability:java|supported|profile capability:spring-boot|supported|profile capability:maven|supported|profile capability:gradle|supported|profile capability:cli|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:46:03.343Z",
"isPublic": true
},
{
"factKey": "auth_modes",
"category": "compatibility",
"label": "Auth modes",
"value": "mcp, api_key",
"href": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:46:03.343Z",
"isPublic": true
},
{
"factKey": "schema_refs",
"category": "artifact",
"label": "Machine-readable schemas",
"value": "OpenAPI or schema references published",
"href": "https://github.com/Azure/containerization-assist#input",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:46:03.343Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Azure",
"href": "https://github.com/azure/containerization-assist#readme",
"sourceUrl": "https://github.com/azure/containerization-assist#readme",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-24T19:43:14.176Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "35 GitHub stars",
"href": "https://github.com/Azure/containerization-assist",
"sourceUrl": "https://github.com/Azure/containerization-assist",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-24T19:43:14.176Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-azure-containerization-assist/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to containerization-assist-mcp and adjacent AI workflows.