[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-skill-giancarloerra-codebase-exploration-en":3,"guides-for-giancarloerra-codebase-exploration":431,"similar-k17ef0p84b824e7e0ckjx2yw0n86nkyq-en":432},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":15,"identity":244,"isFallback":240,"parentExtension":249,"providers":310,"relations":314,"repo":315,"tags":428,"workflow":429},1778687361029.5283,"k17ef0p84b824e7e0ckjx2yw0n86nkyq",[],{"reviewCount":8},0,{"description":10,"installMethods":11,"name":13,"sourceUrl":14},"Explore and understand codebases using SocratiCode semantic search, dependency graphs, and context artifacts. Use when exploring code, understanding architecture, finding functions/types, analysing dependencies, searching database schemas or API specs, or when socraticode/codebase_search tools are available. Activates when the user asks about code structure, wants to find where a feature lives, or needs to understand how code is organised.",{"claudeCode":12},"giancarloerra/socraticode","codebase-exploration","https://github.com/giancarloerra/socraticode",{"_creationTime":16,"_id":17,"extensionId":5,"locale":18,"result":19,"trustSignals":224,"workflow":242},1778687427545.2761,"kn745k4a1seky498t8a5qm8jth86m66j","en",{"checks":20,"evaluatedAt":192,"extensionSummary":193,"features":194,"nonGoals":200,"promptVersionExtension":204,"promptVersionScoring":205,"purpose":206,"rationale":207,"score":208,"summary":209,"tags":210,"targetMarket":216,"tier":217,"useCases":218},[21,26,29,32,36,39,43,47,50,53,57,61,64,68,71,74,77,80,83,86,90,94,98,102,106,109,112,115,119,122,125,128,131,134,137,141,145,149,153,157,160,163,166,169,173,176,179,182,185,189],{"category":22,"check":23,"severity":24,"summary":25},"Practical Utility","Problem relevance","pass","The description clearly identifies the problem of exploring and understanding codebases, mentioning specific use cases like architecture exploration and dependency analysis.",{"category":22,"check":27,"severity":24,"summary":28},"Unique selling proposition","SocratiCode offers significant value over default LLM behavior by providing hybrid semantic search, dependency graphs, and context artifact search, which are not standard LLM capabilities.",{"category":22,"check":30,"severity":24,"summary":31},"Production readiness","The extension is production-ready, as indicated by its battle-tested nature on large repositories, robust indexing, and comprehensive toolset covering the complete lifecycle of code exploration.",{"category":33,"check":34,"severity":24,"summary":35},"Scope","Single responsibility principle","The extension focuses on code exploration and understanding through search, graphs, and context artifacts, with a clear and coherent domain.",{"category":33,"check":37,"severity":24,"summary":38},"Description quality","The displayed description accurately reflects the extension's capabilities, clearly outlining its purpose, use cases, and activation triggers.",{"category":40,"check":41,"severity":24,"summary":42},"Invocation","Scoped tools","The extension exposes a set of well-defined, narrow tools like `codebase_search`, `codebase_graph_query`, etc., rather than a single generalist command.",{"category":44,"check":45,"severity":24,"summary":46},"Documentation","Configuration & parameter reference","All tool parameters and configuration options are documented with defaults and clear explanations in the README and tool reference sections.",{"category":33,"check":48,"severity":24,"summary":49},"Tool naming","Tool names like `codebase_search`, `codebase_graph_query`, and `codebase_context` are descriptive, verb-noun specific, and adhere to kebab-case.",{"category":33,"check":51,"severity":24,"summary":52},"Minimal I/O surface","Tool parameters and response schemas appear minimal and focused on the specific task, returning structured data rather than diagnostic dumps.",{"category":54,"check":55,"severity":24,"summary":56},"License","License usability","The extension is licensed under AGPL-3.0, a permissive open-source license, clearly indicated in the LICENSE file and README.",{"category":58,"check":59,"severity":24,"summary":60},"Maintenance","Commit recency","The last commit was on May 12, 2026, well within the last 3 months, indicating recent maintenance.",{"category":58,"check":62,"severity":24,"summary":63},"Dependency Management","The extension uses standard Node.js dependencies managed via npm, and the presence of CI and lockfiles suggests good management practices.",{"category":65,"check":66,"severity":24,"summary":67},"Security","Secret Management","The extension runs locally with Docker and does not appear to handle or expose secrets. Configuration uses environment variables, which should be managed appropriately by the user.",{"category":65,"check":69,"severity":24,"summary":70},"Injection","The extension processes code and text locally, and the documentation emphasizes treating files as data, with no indications of remote code execution or untrusted content handling issues.",{"category":65,"check":72,"severity":24,"summary":73},"Transitive Supply-Chain Grenades","The extension runs locally within Docker and does not fetch external code or data at runtime, mitigating supply-chain risks.",{"category":65,"check":75,"severity":24,"summary":76},"Sandbox Isolation","The extension runs within Docker containers and operates on local project files, adhering to sandbox isolation principles.",{"category":65,"check":78,"severity":24,"summary":79},"Sandbox escape primitives","No detached process spawns or deny-retry loops were observed in the provided scripts or documentation.",{"category":65,"check":81,"severity":24,"summary":82},"Data Exfiltration","The extension operates locally by default and does not submit confidential data to third parties. Cloud provider configurations are opt-in and require explicit API keys.",{"category":65,"check":84,"severity":24,"summary":85},"Hidden Text Tricks","The bundled content and documentation appear free of hidden-steering tricks, control characters, or malicious Unicode sequences.",{"category":87,"check":88,"severity":24,"summary":89},"Hooks","Opaque code execution","The extension's scripts are provided in plain, readable source code format with no indications of obfuscation, base64 payloads, or runtime script fetching.",{"category":91,"check":92,"severity":24,"summary":93},"Portability","Structural Assumption","The extension relies on standard project structures and Git, with clear documentation on configuration and prerequisites. It handles multiple projects and worktrees effectively.",{"category":95,"check":96,"severity":24,"summary":97},"Trust","Issues Attention","0 issues opened and 21 closed in the last 90 days, with a high closure rate, indicates good maintainer responsiveness.",{"category":99,"check":100,"severity":24,"summary":101},"Versioning","Release Management","The extension has a `package.json` with a version number, and the README displays an npm version badge, indicating a clear versioning scheme.",{"category":103,"check":104,"severity":24,"summary":105},"Code Execution","Validation","While explicit schema validation libraries aren't detailed, the tools take structured parameters and the focus on local execution within Docker suggests robust internal handling.",{"category":65,"check":107,"severity":24,"summary":108},"Unguarded Destructive Operations","The extension is primarily analytical and read-only; destructive operations like index removal are guarded by explicit commands.",{"category":103,"check":110,"severity":24,"summary":111},"Error Handling","The documentation mentions graceful shutdown, error handling for Docker, and detailed logging, suggesting a robust error reporting mechanism.",{"category":103,"check":113,"severity":24,"summary":114},"Logging","The extension supports configurable logging via `SOCRATICODE_LOG_LEVEL` and `SOCRATICODE_LOG_FILE`, allowing for auditability.",{"category":116,"check":117,"severity":24,"summary":118},"Compliance","GDPR","The extension operates on local codebases and does not process personal data by default. User configuration for cloud providers would require their own GDPR compliance.",{"category":116,"check":120,"severity":24,"summary":121},"Target market","The extension is designed to work with any codebase regardless of geography and has no regional restrictions, defaulting to a global target market.",{"category":91,"check":123,"severity":24,"summary":124},"Runtime stability","The extension leverages Docker for its services and Node.js, ensuring multi-platform compatibility and graceful fallback mechanisms.",{"category":44,"check":126,"severity":24,"summary":127},"README","The README is extensive, well-structured, and clearly states the extension's purpose and capabilities.",{"category":33,"check":129,"severity":24,"summary":130},"Tool surface size","The extension exposes 21 tools, which is within the recommended range for a comprehensive skill.",{"category":40,"check":132,"severity":24,"summary":133},"Overlapping near-synonym tools","Tool names are distinct and cover specific functionalities, avoiding near-synonyms like `search`/`query` for the same purpose.",{"category":44,"check":135,"severity":24,"summary":136},"Phantom features","All features advertised in the README, such as hybrid search, dependency graphs, and context artifacts, have corresponding tools and documentation.",{"category":138,"check":139,"severity":24,"summary":140},"Install","Installation instruction","Installation instructions are clear, copy-pasteable, and cover multiple platforms (Claude Code, npx, VS Code, Zed) with detailed setup steps.",{"category":142,"check":143,"severity":24,"summary":144},"Errors","Actionable error messages","The documentation and error handling descriptions suggest that errors will be meaningful, with guidance on remediation steps.",{"category":146,"check":147,"severity":24,"summary":148},"Execution","Pinned dependencies","The extension uses npm and has a lockfile (`package-lock.json` inferred from `hasLockfile: true`), indicating pinned dependencies.",{"category":33,"check":150,"severity":151,"summary":152},"Dry-run preview","not_applicable","The extension is primarily analytical and read-only; there are no state-changing commands that would require a dry-run mode.",{"category":154,"check":155,"severity":24,"summary":156},"Protocol","Idempotent retry & timeouts","While explicit retry mechanisms for mutating operations aren't detailed, the focus on local execution and Docker implies robust handling, and the documentation mentions graceful shutdown.",{"category":116,"check":158,"severity":24,"summary":159},"Telemetry opt-in","The extension operates locally by default and does not emit telemetry. Cloud provider configurations are opt-in and managed by the user.",{"category":40,"check":161,"severity":24,"summary":162},"Precise Purpose","The description clearly states what the extension does (explores codebases using semantic search, dependency graphs, etc.) and when to use it (exploring code, understanding architecture, finding functions, etc.).",{"category":40,"check":164,"severity":24,"summary":165},"Concise Frontmatter","The frontmatter is concise, self-contained, and effectively summarizes the core capability and triggers.",{"category":44,"check":167,"severity":24,"summary":168},"Concise Body","The SKILL.md and README are comprehensive but well-structured, delegating deeper material to separate files and keeping the main instructions focused.",{"category":170,"check":171,"severity":24,"summary":172},"Context","Progressive Disclosure","Detailed information like tool references and configuration options are provided in separate files (references/, LICENSE, etc.), adhering to progressive disclosure.",{"category":170,"check":174,"severity":151,"summary":175},"Forked exploration","This skill is designed for exploration and analysis, not deep code review that would require a forked context; its output is typically summaries or specific data points.",{"category":22,"check":177,"severity":24,"summary":178},"Usage examples","The README and SKILL.md provide detailed example workflows and usage snippets for all major tools.",{"category":22,"check":180,"severity":24,"summary":181},"Edge cases","The documentation addresses potential issues like indexing failures, large codebases, and MCP host disconnects, providing recovery steps.",{"category":103,"check":183,"severity":151,"summary":184},"Tool Fallback","The extension is self-contained and does not rely on external MCP servers that would require fallback paths.",{"category":186,"check":187,"severity":24,"summary":188},"Safety","Halt on unexpected state","The documentation implies that operations will halt gracefully on errors or unexpected states, with clear instructions for cleanup and restart.",{"category":91,"check":190,"severity":24,"summary":191},"Cross-skill coupling","The skill is self-contained and does not implicitly rely on other skills; cross-project search is an explicit feature.",1778687427434,"SocratiCode provides advanced codebase exploration capabilities through hybrid semantic search, dependency graph analysis, and context artifact indexing, running locally via Docker.",[195,196,197,198,199],"Hybrid semantic + keyword code search","Polyglot code dependency graph with visualization","Symbol-level impact analysis and call flow tracing","Searchable context artifacts (schemas, API specs, infra configs)","Local, private, and zero-configuration Docker deployment",[201,202,203],"Replacing static analysis tools for linting or type checking","Executing arbitrary code within the user's environment","Providing code generation capabilities beyond search and analysis","3.0.0","4.4.0","To enable AI agents to deeply understand and navigate any codebase efficiently, reducing manual effort and improving code comprehension.","The extension demonstrates excellent quality across all evaluated aspects, including documentation, security, and practical utility. No critical or warning findings were identified. The score is positioned high within the verified tier due to the comprehensive nature of its implementation and documentation.",98,"A high-quality, production-ready skill for deep codebase exploration and understanding.",[211,212,213,214,215],"code-search","dependency-analysis","code-understanding","local-development","docker","global","verified",[219,220,221,222,223],"Exploring unfamiliar codebases","Understanding software architecture and dependencies","Finding specific functions, types, or files","Analysing impact before refactoring or deletion","Searching database schemas, API specs, or infrastructure configurations",{"codeQuality":225,"collectedAt":227,"documentation":228,"maintenance":231,"popularity":236,"security":238,"testCoverage":241},{"hasLockfile":226},true,1778687402757,{"descriptionLength":229,"readmeSize":230},443,95986,{"closedIssues90d":232,"forks":233,"hasChangelog":226,"openIssues90d":8,"pushedAt":234,"stars":235},21,342,1778593189000,2514,{"npmDownloads":237},20983,{"hasNpmPackage":226,"license":239,"smitheryVerified":240},"AGPL-3.0",false,{"hasCi":226,"hasTests":226},{"updatedAt":243},1778687427545,{"basePath":245,"githubOwner":246,"githubRepo":247,"locale":18,"slug":13,"type":248},"skills/codebase-exploration","giancarloerra","socraticode","skill",{"_creationTime":250,"_id":251,"community":252,"display":253,"identity":256,"parentExtension":259,"providers":293,"relations":305,"tags":306,"workflow":307},1778687361029.528,"k17f18e8cz9qh90z0vgxh9r8kd86mxx8",{"reviewCount":8},{"description":254,"installMethods":255,"name":247,"sourceUrl":14},"Codebase intelligence — semantic search workflows, dependency graph analysis, and context artifact exploration for SocratiCode",{"claudeCode":247},{"basePath":257,"githubOwner":246,"githubRepo":247,"locale":18,"slug":247,"type":258},"","plugin",{"_creationTime":260,"_id":261,"community":262,"display":263,"identity":266,"providers":268,"relations":286,"tags":288,"workflow":289},1778687361029.5278,"k17a6tjfs8x26pt762tjxft2zh86nnb6",{"reviewCount":8},{"description":264,"installMethods":265,"name":247,"sourceUrl":14},"SocratiCode — codebase intelligence plugin for Claude Code",{"claudeCode":12},{"basePath":257,"githubOwner":246,"githubRepo":247,"locale":18,"slug":247,"type":267},"marketplace",{"evaluate":269,"extract":280},{"promptVersionExtension":270,"promptVersionScoring":205,"score":271,"tags":272,"targetMarket":216,"tier":217},"3.1.0",100,[273,274,275,276,277,278,279],"code-intelligence","codebase-analysis","ai-assistant","search","dependency-graph","local-docker","lsp",{"commitSha":281,"marketplace":282,"plugin":284},"HEAD",{"name":247,"pluginCount":283},1,{"mcpCount":8,"provider":285,"skillCount":8},"classify",{"repoId":287},"kd76w3r9kxfskg0y8kxc68drnd86m8rk",[275,273,274,277,278,279,276],{"evaluatedAt":290,"extractAt":291,"updatedAt":292},1778687383326,1778687361029,1778687533262,{"evaluate":294,"extract":301},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":295,"targetMarket":216,"tier":217},[296,276,297,277,298,299,300,215],"codebase","indexing","semantic-search","mcp","intelligence",{"commitSha":281,"license":302,"plugin":303},"AGPL-3.0-only",{"mcpCount":8,"provider":285,"skillCount":304},2,{"parentExtensionId":261,"repoId":287},[296,277,215,297,300,299,276,298],{"evaluatedAt":308,"extractAt":291,"updatedAt":309},1778687402412,1778687533745,{"evaluate":311,"extract":313},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":312,"targetMarket":216,"tier":217},[211,212,213,214,215],{"commitSha":281},{"parentExtensionId":251,"repoId":287},{"_creationTime":316,"_id":287,"identity":317,"providers":318,"workflow":423},1778687355036.9502,{"githubOwner":246,"githubRepo":247,"sourceUrl":14},{"classify":319,"discover":398,"extract":401,"github":402,"npm":422},{"commitSha":281,"extensions":320},[321,334,357,365,374],{"basePath":257,"description":264,"displayName":247,"installMethods":322,"rationale":323,"selectedPaths":324,"source":333,"sourceLanguage":18,"type":267},{"claudeCode":12},"marketplace.json at .claude-plugin/marketplace.json",[325,328,330],{"path":326,"priority":327},".claude-plugin/marketplace.json","mandatory",{"path":329,"priority":327},"README.md",{"path":331,"priority":332},"LICENSE","high","rule",{"basePath":257,"description":254,"displayName":247,"installMethods":335,"license":302,"rationale":336,"selectedPaths":337,"source":333,"sourceLanguage":18,"type":258},{"claudeCode":247},"plugin manifest at .claude-plugin/plugin.json",[338,340,341,342,345,347,349,351,353,355],{"path":339,"priority":327},".claude-plugin/plugin.json",{"path":329,"priority":327},{"path":331,"priority":332},{"path":343,"priority":344},"skills/codebase-exploration/SKILL.md","medium",{"path":346,"priority":344},"skills/codebase-management/SKILL.md",{"path":348,"priority":327},".mcp.json",{"path":350,"priority":332},"agents/codebase-explorer.md",{"path":352,"priority":332},"hooks/hooks.json",{"path":354,"priority":332},".codex-plugin/plugin.json",{"path":356,"priority":332},".cursor-plugin/plugin.json",{"basePath":245,"description":10,"displayName":13,"installMethods":358,"rationale":359,"selectedPaths":360,"source":333,"sourceLanguage":18,"type":248},{"claudeCode":12},"SKILL.md frontmatter at skills/codebase-exploration/SKILL.md",[361,363],{"path":362,"priority":327},"SKILL.md",{"path":364,"priority":344},"references/tool-reference.md",{"basePath":366,"description":367,"displayName":368,"installMethods":369,"rationale":370,"selectedPaths":371,"source":333,"sourceLanguage":18,"type":248},"skills/codebase-management","Set up, index, and manage SocratiCode codebase indexing. Use when the user wants to index a project, check infrastructure health, start/stop file watching, configure context artifacts, troubleshoot indexing issues, manage the code graph, or any SocratiCode administrative task. Activates when the user mentions indexing, setting up search, SocratiCode infrastructure, or managing the codebase index.","codebase-management",{"claudeCode":12},"SKILL.md frontmatter at skills/codebase-management/SKILL.md",[372,373],{"path":362,"priority":327},{"path":364,"priority":344},{"basePath":257,"description":375,"displayName":247,"installMethods":376,"license":302,"rationale":377,"selectedPaths":378,"source":333,"sourceLanguage":18,"type":299},"SocratiCode — MCP server for local codebase indexing, semantic search, and code dependency graphs. All private, all local via Docker.",{"npm":247},"server.json with namespace/server name at server.json",[379,381,383,384,385,388,390,392,394,396],{"path":380,"priority":327},"server.json",{"path":382,"priority":327},"package.json",{"path":329,"priority":327},{"path":331,"priority":332},{"path":386,"priority":387},"src/index.ts","low",{"path":389,"priority":387},"src/tools/context-tools.ts",{"path":391,"priority":387},"src/tools/graph-tools.ts",{"path":393,"priority":387},"src/tools/index-tools.ts",{"path":395,"priority":387},"src/tools/manage-tools.ts",{"path":397,"priority":387},"src/tools/query-tools.ts",{"sources":399},[400],"manual",{"npmPackage":247},{"closedIssues90d":232,"description":403,"forks":233,"homepage":404,"license":239,"openIssues90d":8,"pushedAt":234,"readmeSize":230,"stars":235,"topics":405},"Enterprise-grade (40m+ LOC) codebase intelligence, zero-setup, local & private Plugin/Skill/Extension or MCP: hybrid semantic search, polyglot dependency graphs, symbol-level impact analysis & call-flow, interactive HTML viewer, cross-project & branch-aware search, DB/API/infra knowledge. 61% less tokens, 84% fewer calls, 37x faster. Cloud in beta.","https://socraticode.cloud",[406,275,407,299,408,409,410,411,412,413,215,414,415,416,417,418,298,419,420,421],"ai","embeddings","semantic","vector-database","vector-embeddings","vector-search","claude","codebase-intelligence","gemini","openai","qdrant","ast","code-graph","context-engine","gemini-cli-extension","claude-code",{"downloads":237},{"classifiedAt":424,"discoverAt":425,"extractAt":426,"githubAt":426,"npmAt":427,"updatedAt":424},1778687360763,1778687355037,1778687357876,1778687359603,[211,213,212,215,214],{"evaluatedAt":243,"extractAt":291,"updatedAt":430},1778687533912,[],[433,464,494,525,544,567],{"_creationTime":434,"_id":435,"community":436,"display":437,"identity":443,"providers":447,"relations":458,"tags":460,"workflow":461},1778695753353.6304,"k17eaz2hwvgye5nwmwskxjjhq186nffr",{"reviewCount":8},{"description":438,"installMethods":439,"name":441,"sourceUrl":442},"Automated vulnerability scanner for agent platforms. Performs dependency scanning (npm audit, pip-audit), multi-database CVE lookup (OSV, NVD, GitHub Advisory), SAST analysis (Semgrep, Bandit), and agent-specific DAST hook execution testing for OpenClaw hooks.",{"claudeCode":440},"prompt-security/clawsec","clawsec-scanner","https://github.com/prompt-security/clawsec",{"basePath":444,"githubOwner":445,"githubRepo":446,"locale":18,"slug":441,"type":248},"skills/clawsec-scanner","prompt-security","clawsec",{"evaluate":448,"extract":457},{"promptVersionExtension":204,"promptVersionScoring":205,"score":271,"tags":449,"targetMarket":216,"tier":217},[450,451,212,452,453,454,455,456],"security","vulnerability-scanning","sast","dast","agent-platform","npm","pip",{"commitSha":281},{"repoId":459},"kd72phsqkbk8w57ctvf7ac9nqs86n9t4",[454,453,212,455,456,452,450,451],{"evaluatedAt":462,"extractAt":463,"updatedAt":462},1778695848342,1778695753353,{"_creationTime":465,"_id":466,"community":467,"display":468,"identity":474,"providers":479,"relations":487,"tags":490,"workflow":491},1778695548458.3445,"k17efcm48b2g7a0r4sjg7rj5nn86ntd7",{"reviewCount":8},{"description":469,"installMethods":470,"name":472,"sourceUrl":473},"Containerize an R-based MCP (Model Context Protocol) server using Docker. Covers mcptools integration, port exposure, stdio vs HTTP transport, and connecting Claude Code to the containerized server. Use when deploying an R MCP server without requiring a local R installation, creating a reproducible MCP server environment, running MCP servers alongside other containerized services, or distributing an MCP server to other developers.\n",{"claudeCode":471},"pjt222/agent-almanac","Containerize MCP Server","https://github.com/pjt222/agent-almanac",{"basePath":475,"githubOwner":476,"githubRepo":477,"locale":18,"slug":478,"type":248},"skills/containerize-mcp-server","pjt222","agent-almanac","containerize-mcp-server",{"evaluate":480,"extract":485},{"promptVersionExtension":204,"promptVersionScoring":205,"score":271,"tags":481,"targetMarket":216,"tier":217},[215,299,482,483,484],"r","containerization","deployment",{"commitSha":281,"license":486},"MIT",{"parentExtensionId":488,"repoId":489},"k170h0janaa9kwn7cfgfz2ykss86mmh9","kd7aryv63z61j39n2td1aeqkvh86mh12",[483,484,215,299,482],{"evaluatedAt":492,"extractAt":493,"updatedAt":492},1778696981156,1778695548458,{"_creationTime":495,"_id":496,"community":497,"display":498,"identity":504,"providers":509,"relations":518,"tags":521,"workflow":522},1778693180473.1135,"k17de92egj55jy906n011tje2n86nev2",{"reviewCount":8},{"description":499,"installMethods":500,"name":502,"sourceUrl":503},"Azure Container Registry SDK for Python. Use for managing container images, artifacts, and repositories.\nTriggers: \"azure-containerregistry\", \"ContainerRegistryClient\", \"container images\", \"docker registry\", \"ACR\".\n",{"claudeCode":501},"microsoft/agent-skills","Azure Container Registry SDK for Python","https://github.com/microsoft/agent-skills",{"basePath":505,"githubOwner":506,"githubRepo":507,"locale":18,"slug":508,"type":248},".github/plugins/azure-sdk-python/skills/azure-containerregistry-py","microsoft","agent-skills","azure-containerregistry-py",{"evaluate":510,"extract":517},{"promptVersionExtension":204,"promptVersionScoring":205,"score":271,"tags":511,"targetMarket":216,"tier":217},[512,513,514,515,516,215],"azure","container-registry","sdk","python","devops",{"commitSha":281,"license":486},{"parentExtensionId":519,"repoId":520},"k171mfx6atvhq1bkhpky84v4b186n9qd","kd77czgnv00rfjm815pcc5xx5986n5t8",[512,513,516,215,515,514],{"evaluatedAt":523,"extractAt":524,"updatedAt":523},1778694832694,1778693180473,{"_creationTime":526,"_id":527,"community":528,"display":529,"identity":531,"providers":532,"relations":539,"tags":540,"workflow":541},1778687361029.5286,"k1790577a754jkr64wj3hptwrd86mr9y",{"reviewCount":8},{"description":367,"installMethods":530,"name":368,"sourceUrl":14},{"claudeCode":12},{"basePath":366,"githubOwner":246,"githubRepo":247,"locale":18,"slug":368,"type":248},{"evaluate":533,"extract":538},{"promptVersionExtension":204,"promptVersionScoring":205,"score":534,"tags":535,"targetMarket":216,"tier":217},99,[368,211,273,536,537],"developer-tools","ai-plugin",{"commitSha":281},{"parentExtensionId":251,"repoId":287},[537,273,211,368,536],{"evaluatedAt":542,"extractAt":291,"updatedAt":543},1778687454126,1778687534109,{"_creationTime":545,"_id":546,"community":547,"display":548,"identity":552,"providers":555,"relations":563,"tags":564,"workflow":565},1778695548458.3982,"k171x3rf153jaf2ymvdtgzmtm986mkq2",{"reviewCount":8},{"description":549,"installMethods":550,"name":551,"sourceUrl":473},"Configure container image registries including GitHub Container Registry (ghcr.io), Docker Hub, and Harbor with automated image scanning, tagging strategies, retention policies, and CI/CD integration for secure image distribution. Use when setting up a private container registry, migrating from Docker Hub to self-hosted registries, implementing vulnerability scanning in CI/CD pipelines, managing multi-architecture images, enforcing image signing, or configuring automatic cleanup and retention policies.\n",{"claudeCode":471},"Setup Container Registry",{"basePath":553,"githubOwner":476,"githubRepo":477,"locale":18,"slug":554,"type":248},"skills/setup-container-registry","setup-container-registry",{"evaluate":556,"extract":562},{"promptVersionExtension":204,"promptVersionScoring":205,"score":534,"tags":557,"targetMarket":216,"tier":217},[513,215,558,516,559,450,560,561],"kubernetes","ci-cd","harbor","ghcr",{"commitSha":281,"license":486},{"parentExtensionId":488,"repoId":489},[559,513,516,215,561,560,558,450],{"evaluatedAt":566,"extractAt":493,"updatedAt":566},1778701304642,{"_creationTime":568,"_id":569,"community":570,"display":571,"identity":575,"providers":577,"relations":584,"tags":585,"workflow":586},1778695548458.3801,"k172ksqz98xqznjy5qkbpv1yp586m3y4",{"reviewCount":8},{"description":572,"installMethods":573,"name":574,"sourceUrl":473},"Optimize Docker build times using layer caching, multi-stage builds, BuildKit features, and dependency-first copy patterns. Applicable to R, Node.js, and Python projects. Use when Docker builds are slow due to repeated package installations, when rebuilds reinstall all dependencies on every code change, when image sizes are unnecessarily large, or when CI/CD pipeline builds are a bottleneck.\n",{"claudeCode":471},"optimize-docker-build-cache",{"basePath":576,"githubOwner":476,"githubRepo":477,"locale":18,"slug":574,"type":248},"skills/optimize-docker-build-cache",{"evaluate":578,"extract":583},{"promptVersionExtension":204,"promptVersionScoring":205,"score":534,"tags":579,"targetMarket":216,"tier":217},[215,580,581,483,482,582,515],"optimization","build","node-js",{"commitSha":281},{"parentExtensionId":488,"repoId":489},[581,483,215,582,580,515,482],{"evaluatedAt":587,"extractAt":493,"updatedAt":587},1778699725818]