[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-skill-giancarloerra-codebase-exploration-zh-CN":3,"guides-for-giancarloerra-codebase-exploration":435,"similar-k170p3jwcw5mh6r8r5wqa8kj0s86nesr-zh-CN":436},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":15,"identity":243,"isFallback":239,"parentExtension":249,"providers":312,"relations":316,"repo":318,"tags":432,"workflow":433},1778687509000.056,"k170p3jwcw5mh6r8r5wqa8kj0s86nesr",[],{"reviewCount":8},0,{"description":10,"installMethods":11,"name":13,"sourceUrl":14},"使用 SocratiCode 语义搜索、依赖图和上下文工件来探索和理解代码库。在探索代码、理解架构、查找函数/类型、分析依赖项、搜索数据库 schema 或 API 规范时使用，或者当 socraticode/codebase_search 工具可用时使用。当用户询问代码结构、想知道某个功能在哪里，或需要理解代码组织方式时激活。",{"claudeCode":12},"giancarloerra/socraticode","SocratiCode 代码库探索","https://github.com/giancarloerra/socraticode",{"_creationTime":16,"_id":17,"extensionId":5,"locale":18,"result":19,"trustSignals":223,"workflow":241},1778687509000.0562,"kn73y9hf46tf7vh6n30axfa89586mybe","zh-CN",{"checks":20,"evaluatedAt":192,"extensionSummary":193,"features":194,"nonGoals":200,"promptVersionExtension":204,"promptVersionScoring":205,"purpose":206,"rationale":207,"score":208,"summary":209,"tags":210,"tier":216,"useCases":217},[21,26,29,32,36,39,43,47,50,53,57,61,64,68,71,74,77,80,83,86,90,94,98,102,106,109,112,115,119,122,125,128,131,134,137,141,145,149,153,157,160,163,166,169,173,176,179,182,185,189],{"category":22,"check":23,"severity":24,"summary":25},"Practical Utility","Problem relevance","pass","描述清楚地指出了探索和理解代码库的问题，提到了架构探索和依赖分析等具体用例。",{"category":22,"check":27,"severity":24,"summary":28},"Unique selling proposition","SocratiCode 通过提供混合语义搜索、依赖图和上下文工件搜索，在默认 LLM 行为之上提供了显著的价值，这些都不是标准的 LLM 功能。",{"category":22,"check":30,"severity":24,"summary":31},"Production readiness","该扩展已为生产做好准备，其在大型代码库上经过实战检验、强大的索引以及涵盖代码探索完整生命周期的全面工具集证明了这一点。",{"category":33,"check":34,"severity":24,"summary":35},"Scope","Single responsibility principle","该扩展专注于通过搜索、图和上下文工件进行代码探索和理解，拥有清晰连贯的领域。",{"category":33,"check":37,"severity":24,"summary":38},"Description quality","显示的描述准确地反映了扩展的功能，清楚地概述了其目的、用例和激活触发器。",{"category":40,"check":41,"severity":24,"summary":42},"Invocation","Scoped tools","该扩展公开了一组定义良好、范围狭窄的工具，如 `codebase_search`、`codebase_graph_query` 等，而不是单个通用命令。",{"category":44,"check":45,"severity":24,"summary":46},"Documentation","Configuration & parameter reference","所有工具参数和配置选项都在 README 和工具参考部分进行了文档记录，并附有默认值和清晰的解释。",{"category":33,"check":48,"severity":24,"summary":49},"Tool naming","像 `codebase_search`、`codebase_graph_query` 和 `codebase_context` 这样的工具名称具有描述性，是动词-名词式的，并遵循 kebab-case 格式。",{"category":33,"check":51,"severity":24,"summary":52},"Minimal I/O surface","工具参数和响应模式似乎都很简洁，专注于特定任务，返回结构化数据而不是诊断转储。",{"category":54,"check":55,"severity":24,"summary":56},"License","License usability","该扩展根据 AGPL-3.0 许可证授权，这是一个宽松的开源许可证，在 LICENSE 文件和 README 中有明确说明。",{"category":58,"check":59,"severity":24,"summary":60},"Maintenance","Commit recency","最后一次提交是在 2026 年 5 月 12 日，远在过去 3 个月内，表明最近有维护。",{"category":58,"check":62,"severity":24,"summary":63},"Dependency Management","该扩展使用通过 npm 管理的标准 Node.js 依赖项，并且 CI 和 lockfiles 的存在暗示了良好的管理实践。",{"category":65,"check":66,"severity":24,"summary":67},"Security","Secret Management","该扩展在本地使用 Docker 运行，并且不处理或暴露机密。配置使用环境变量，应由用户适当管理。",{"category":65,"check":69,"severity":24,"summary":70},"Injection","该扩展在本地处理代码和文本，并且文档强调将文件视为数据，没有远程代码执行或不可信内容处理问题的迹象。",{"category":65,"check":72,"severity":24,"summary":73},"Transitive Supply-Chain Grenades","该扩展在 Docker 内部本地运行，并且在运行时不获取外部代码或数据，从而降低了供应链风险。",{"category":65,"check":75,"severity":24,"summary":76},"Sandbox Isolation","该扩展在 Docker 容器内运行，并在本地项目文件上操作，遵循沙盒隔离原则。",{"category":65,"check":78,"severity":24,"summary":79},"Sandbox escape primitives","在提供的脚本或文档中未观察到分离的进程生成或拒绝重试循环。",{"category":65,"check":81,"severity":24,"summary":82},"Data Exfiltration","该扩展默认在本地运行，不向第三方提交机密数据。云提供商配置是选择性的，需要显式的 API 密钥。",{"category":65,"check":84,"severity":24,"summary":85},"Hidden Text Tricks","捆绑的内容和文档似乎没有隐藏的操纵技巧、控制字符或恶意 Unicode 序列。",{"category":87,"check":88,"severity":24,"summary":89},"Hooks","Opaque code execution","该扩展的脚本以纯粹、可读的源代码格式提供，没有混淆、base64 负载或运行时脚本获取的迹象。",{"category":91,"check":92,"severity":24,"summary":93},"Portability","Structural Assumption","该扩展依赖于标准项目结构和 Git，并提供有关配置和先决条件的清晰文档。它有效处理多个项目和 worktrees。",{"category":95,"check":96,"severity":24,"summary":97},"Trust","Issues Attention","过去 90 天内打开了 0 个问题，关闭了 21 个问题，关闭率很高，表明维护者响应良好。",{"category":99,"check":100,"severity":24,"summary":101},"Versioning","Release Management","该扩展有一个带有版本号的 `package.json`，并且 README 显示了 npm 版本徽章，表明了清晰的版本控制方案。",{"category":103,"check":104,"severity":24,"summary":105},"Code Execution","Validation","虽然没有详细介绍显式的 schema 验证库，但该工具接受结构化参数，并且在 Docker 中进行本地执行的重点表明了强大的内部处理能力。",{"category":65,"check":107,"severity":24,"summary":108},"Unguarded Destructive Operations","该扩展主要是分析性和只读的；像索引删除这样的破坏性操作受到显式命令的保护。",{"category":103,"check":110,"severity":24,"summary":111},"Error Handling","文档提到了优雅关闭、Docker 的错误处理和详细日志记录，这表明有一个健壮的错误报告机制。",{"category":103,"check":113,"severity":24,"summary":114},"Logging","该扩展通过 `SOCRATICODE_LOG_LEVEL` 和 `SOCRATICODE_LOG_FILE` 支持可配置的日志记录，允许进行审计。",{"category":116,"check":117,"severity":24,"summary":118},"Compliance","GDPR","该扩展默认在本地代码库上运行，不处理个人数据。云提供商的配置需要用户自行遵守 GDPR。",{"category":116,"check":120,"severity":24,"summary":121},"Target market","该扩展旨在与任何代码库一起使用，无论地理位置如何，并且没有区域限制，默认面向全球市场。",{"category":91,"check":123,"severity":24,"summary":124},"Runtime stability","该扩展利用 Docker 来运行其服务和 Node.js，确保了多平台兼容性和优雅的回退机制。",{"category":44,"check":126,"severity":24,"summary":127},"README","README 内容丰富，结构良好，清楚地说明了扩展的目的和功能。",{"category":33,"check":129,"severity":24,"summary":130},"Tool surface size","该扩展公开了 21 个工具，这在推荐的全面技能范围内。",{"category":40,"check":132,"severity":24,"summary":133},"Overlapping near-synonym tools","工具名称是独立的，并且涵盖了特定的功能，避免了同类用途的近义词，如 `search`/`query`。",{"category":44,"check":135,"severity":24,"summary":136},"Phantom features","README 中宣传的所有功能，如混合搜索、依赖图和上下文工件，都有相应的工具和文档。",{"category":138,"check":139,"severity":24,"summary":140},"Install","Installation instruction","安装说明清晰，可复制粘贴，并涵盖了多个平台（Claude Code、npx、VS Code、Zed），并附有详细的设置步骤。",{"category":142,"check":143,"severity":24,"summary":144},"Errors","Actionable error messages","文档和错误处理描述表明，错误将是有意义的，并提供补救措施的指导。",{"category":146,"check":147,"severity":24,"summary":148},"Execution","Pinned dependencies","该扩展使用 npm 并具有 lockfile (`package-lock.json`，根据 `hasLockfile: true` 推断)，表明已固定依赖项。",{"category":33,"check":150,"severity":151,"summary":152},"Dry-run preview","not_applicable","该扩展主要是分析性和只读的；没有需要干运行模式的状态更改命令。",{"category":154,"check":155,"severity":24,"summary":156},"Protocol","Idempotent retry & timeouts","虽然没有详细介绍针对可变操作的显式重试机制，但其本地执行和 Docker 的重点暗示了强大的处理能力，并且文档提到了优雅关闭。",{"category":116,"check":158,"severity":24,"summary":159},"Telemetry opt-in","该扩展默认在本地运行，不发送遥测数据。云提供商配置是选择性的，由用户管理。",{"category":40,"check":161,"severity":24,"summary":162},"Precise Purpose","描述清楚地说明了该扩展的作用（使用语义搜索、依赖图等探索代码库）以及何时使用它（探索代码、理解架构、查找函数等）。",{"category":40,"check":164,"severity":24,"summary":165},"Concise Frontmatter","Frontmatter 简洁、自包含，并有效总结了核心功能和触发器。",{"category":44,"check":167,"severity":24,"summary":168},"Concise Body","SKILL.md 和 README 内容丰富但结构良好，将更深入的内容委托给单独的文件，使主要说明保持专注。",{"category":170,"check":171,"severity":24,"summary":172},"Context","Progressive Disclosure","详细信息，如工具参考和配置选项，都提供在单独的文件中（references/、LICENSE 等），遵循了渐进式披露原则。",{"category":170,"check":174,"severity":151,"summary":175},"Forked exploration","此技能旨在进行探索和分析，而不是需要分支上下文的深度代码审查；其输出通常是摘要或特定数据点。",{"category":22,"check":177,"severity":24,"summary":178},"Usage examples","README 和 SKILL.md 提供了所有主要工具的详细示例工作流程和用法片段。",{"category":22,"check":180,"severity":24,"summary":181},"Edge cases","文档处理了潜在问题，如索引失败、大型代码库和 MCP 主机断开连接，并提供了恢复步骤。",{"category":103,"check":183,"severity":151,"summary":184},"Tool Fallback","该扩展是独立的，不依赖需要回退路径的外部 MCP 服务器。",{"category":186,"check":187,"severity":24,"summary":188},"Safety","Halt on unexpected state","文档暗示操作将在错误或意外状态下优雅地停止，并提供有关清理和重新启动的明确说明。",{"category":91,"check":190,"severity":24,"summary":191},"Cross-skill coupling","该技能是独立的，不隐式依赖其他技能；跨项目搜索是一项显式功能。",1778687427434,"SocratiCode 通过混合语义搜索、依赖图分析和上下文工件索引提供高级代码库探索功能，通过 Docker 在本地运行。",[195,196,197,198,199],"混合语义+关键字代码搜索","支持可视化的多语言代码依赖图","符号级影响分析和调用流跟踪","可搜索的上下文工件（schema、API 规范、基础设施配置）","本地、私有、零配置的 Docker 部署",[201,202,203],"替换用于 linting 或类型检查的静态分析工具","在用户环境中执行任意代码","提供超出搜索和分析范围的代码生成功能","3.0.0","4.4.0","使 AI 代理能够高效地深入理解和导航任何代码库，减少手动工作并提高代码理解能力。","该扩展在所有评估方面都展现出卓越的质量，包括文档、安全性和实际效用。未发现任何关键或警告级别的发现。由于其全面的实现和文档，该分数在已验证的类别中处于高位。",98,"一个高质量、生产就绪的用于深度代码库探索和理解的技能。",[211,212,213,214,215],"code-search","dependency-analysis","code-understanding","local-development","docker","verified",[218,219,220,221,222],"探索不熟悉的代码库","理解软件架构和依赖关系","查找特定的函数、类型或文件","在重构或删除之前进行影响分析","搜索数据库 schema、API 规范或基础设施配置",{"codeQuality":224,"collectedAt":226,"documentation":227,"maintenance":230,"popularity":235,"security":237,"testCoverage":240},{"hasLockfile":225},true,1778687402757,{"descriptionLength":228,"readmeSize":229},443,95986,{"closedIssues90d":231,"forks":232,"hasChangelog":225,"openIssues90d":8,"pushedAt":233,"stars":234},21,342,1778593189000,2514,{"npmDownloads":236},20983,{"hasNpmPackage":225,"license":238,"smitheryVerified":239},"AGPL-3.0",false,{"hasCi":225,"hasTests":225},{"updatedAt":242},1778687509000,{"basePath":244,"githubOwner":245,"githubRepo":246,"locale":18,"slug":247,"type":248},"skills/codebase-exploration","giancarloerra","socraticode","codebase-exploration","skill",{"_creationTime":250,"_id":251,"community":252,"display":253,"identity":256,"parentExtension":260,"providers":295,"relations":307,"tags":308,"workflow":309},1778687361029.528,"k17f18e8cz9qh90z0vgxh9r8kd86mxx8",{"reviewCount":8},{"description":254,"installMethods":255,"name":246,"sourceUrl":14},"Codebase intelligence — semantic search workflows, dependency graph analysis, and context artifact exploration for SocratiCode",{"claudeCode":246},{"basePath":257,"githubOwner":245,"githubRepo":246,"locale":258,"slug":246,"type":259},"","en","plugin",{"_creationTime":261,"_id":262,"community":263,"display":264,"identity":267,"providers":269,"relations":288,"tags":290,"workflow":291},1778687361029.5278,"k17a6tjfs8x26pt762tjxft2zh86nnb6",{"reviewCount":8},{"description":265,"installMethods":266,"name":246,"sourceUrl":14},"SocratiCode — codebase intelligence plugin for Claude Code",{"claudeCode":12},{"basePath":257,"githubOwner":245,"githubRepo":246,"locale":258,"slug":246,"type":268},"marketplace",{"evaluate":270,"extract":282},{"promptVersionExtension":271,"promptVersionScoring":205,"score":272,"tags":273,"targetMarket":281,"tier":216},"3.1.0",100,[274,275,276,277,278,279,280],"code-intelligence","codebase-analysis","ai-assistant","search","dependency-graph","local-docker","lsp","global",{"commitSha":283,"marketplace":284,"plugin":286},"HEAD",{"name":246,"pluginCount":285},1,{"mcpCount":8,"provider":287,"skillCount":8},"classify",{"repoId":289},"kd76w3r9kxfskg0y8kxc68drnd86m8rk",[276,274,275,278,279,280,277],{"evaluatedAt":292,"extractAt":293,"updatedAt":294},1778687383326,1778687361029,1778687533262,{"evaluate":296,"extract":303},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":297,"targetMarket":281,"tier":216},[298,277,299,278,300,301,302,215],"codebase","indexing","semantic-search","mcp","intelligence",{"commitSha":283,"license":304,"plugin":305},"AGPL-3.0-only",{"mcpCount":8,"provider":287,"skillCount":306},2,{"parentExtensionId":262,"repoId":289},[298,278,215,299,302,301,277,300],{"evaluatedAt":310,"extractAt":293,"updatedAt":311},1778687402412,1778687533745,{"evaluate":313,"extract":315},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":314,"targetMarket":281,"tier":216},[211,212,213,214,215],{"commitSha":283},{"parentExtensionId":251,"repoId":289,"translatedFrom":317},"k17ef0p84b824e7e0ckjx2yw0n86nkyq",{"_creationTime":319,"_id":289,"identity":320,"providers":321,"workflow":427},1778687355036.9502,{"githubOwner":245,"githubRepo":246,"sourceUrl":14},{"classify":322,"discover":402,"extract":405,"github":406,"npm":426},{"commitSha":283,"extensions":323},[324,337,360,369,378],{"basePath":257,"description":265,"displayName":246,"installMethods":325,"rationale":326,"selectedPaths":327,"source":336,"sourceLanguage":258,"type":268},{"claudeCode":12},"marketplace.json at .claude-plugin/marketplace.json",[328,331,333],{"path":329,"priority":330},".claude-plugin/marketplace.json","mandatory",{"path":332,"priority":330},"README.md",{"path":334,"priority":335},"LICENSE","high","rule",{"basePath":257,"description":254,"displayName":246,"installMethods":338,"license":304,"rationale":339,"selectedPaths":340,"source":336,"sourceLanguage":258,"type":259},{"claudeCode":246},"plugin manifest at .claude-plugin/plugin.json",[341,343,344,345,348,350,352,354,356,358],{"path":342,"priority":330},".claude-plugin/plugin.json",{"path":332,"priority":330},{"path":334,"priority":335},{"path":346,"priority":347},"skills/codebase-exploration/SKILL.md","medium",{"path":349,"priority":347},"skills/codebase-management/SKILL.md",{"path":351,"priority":330},".mcp.json",{"path":353,"priority":335},"agents/codebase-explorer.md",{"path":355,"priority":335},"hooks/hooks.json",{"path":357,"priority":335},".codex-plugin/plugin.json",{"path":359,"priority":335},".cursor-plugin/plugin.json",{"basePath":244,"description":361,"displayName":247,"installMethods":362,"rationale":363,"selectedPaths":364,"source":336,"sourceLanguage":258,"type":248},"Explore and understand codebases using SocratiCode semantic search, dependency graphs, and context artifacts. Use when exploring code, understanding architecture, finding functions/types, analysing dependencies, searching database schemas or API specs, or when socraticode/codebase_search tools are available. Activates when the user asks about code structure, wants to find where a feature lives, or needs to understand how code is organised.",{"claudeCode":12},"SKILL.md frontmatter at skills/codebase-exploration/SKILL.md",[365,367],{"path":366,"priority":330},"SKILL.md",{"path":368,"priority":347},"references/tool-reference.md",{"basePath":370,"description":371,"displayName":372,"installMethods":373,"rationale":374,"selectedPaths":375,"source":336,"sourceLanguage":258,"type":248},"skills/codebase-management","Set up, index, and manage SocratiCode codebase indexing. Use when the user wants to index a project, check infrastructure health, start/stop file watching, configure context artifacts, troubleshoot indexing issues, manage the code graph, or any SocratiCode administrative task. Activates when the user mentions indexing, setting up search, SocratiCode infrastructure, or managing the codebase index.","codebase-management",{"claudeCode":12},"SKILL.md frontmatter at skills/codebase-management/SKILL.md",[376,377],{"path":366,"priority":330},{"path":368,"priority":347},{"basePath":257,"description":379,"displayName":246,"installMethods":380,"license":304,"rationale":381,"selectedPaths":382,"source":336,"sourceLanguage":258,"type":301},"SocratiCode — MCP server for local codebase indexing, semantic search, and code dependency graphs. All private, all local via Docker.",{"npm":246},"server.json with namespace/server name at server.json",[383,385,387,388,389,392,394,396,398,400],{"path":384,"priority":330},"server.json",{"path":386,"priority":330},"package.json",{"path":332,"priority":330},{"path":334,"priority":335},{"path":390,"priority":391},"src/index.ts","low",{"path":393,"priority":391},"src/tools/context-tools.ts",{"path":395,"priority":391},"src/tools/graph-tools.ts",{"path":397,"priority":391},"src/tools/index-tools.ts",{"path":399,"priority":391},"src/tools/manage-tools.ts",{"path":401,"priority":391},"src/tools/query-tools.ts",{"sources":403},[404],"manual",{"npmPackage":246},{"closedIssues90d":231,"description":407,"forks":232,"homepage":408,"license":238,"openIssues90d":8,"pushedAt":233,"readmeSize":229,"stars":234,"topics":409},"Enterprise-grade (40m+ LOC) codebase intelligence, zero-setup, local & private Plugin/Skill/Extension or MCP: hybrid semantic search, polyglot dependency graphs, symbol-level impact analysis & call-flow, interactive HTML viewer, cross-project & branch-aware search, DB/API/infra knowledge. 61% less tokens, 84% fewer calls, 37x faster. Cloud in beta.","https://socraticode.cloud",[410,276,411,301,412,413,414,415,416,417,215,418,419,420,421,422,300,423,424,425],"ai","embeddings","semantic","vector-database","vector-embeddings","vector-search","claude","codebase-intelligence","gemini","openai","qdrant","ast","code-graph","context-engine","gemini-cli-extension","claude-code",{"downloads":236},{"classifiedAt":428,"discoverAt":429,"extractAt":430,"githubAt":430,"npmAt":431,"updatedAt":428},1778687360763,1778687355037,1778687357876,1778687359603,[211,213,212,215,214],{"evaluatedAt":434,"extractAt":293,"updatedAt":242},1778687427545,[],[437,468,498,529,550,573],{"_creationTime":438,"_id":439,"community":440,"display":441,"identity":447,"providers":451,"relations":462,"tags":464,"workflow":465},1778695753353.6304,"k17eaz2hwvgye5nwmwskxjjhq186nffr",{"reviewCount":8},{"description":442,"installMethods":443,"name":445,"sourceUrl":446},"Automated vulnerability scanner for agent platforms. Performs dependency scanning (npm audit, pip-audit), multi-database CVE lookup (OSV, NVD, GitHub Advisory), SAST analysis (Semgrep, Bandit), and agent-specific DAST hook execution testing for OpenClaw hooks.",{"claudeCode":444},"prompt-security/clawsec","clawsec-scanner","https://github.com/prompt-security/clawsec",{"basePath":448,"githubOwner":449,"githubRepo":450,"locale":258,"slug":445,"type":248},"skills/clawsec-scanner","prompt-security","clawsec",{"evaluate":452,"extract":461},{"promptVersionExtension":204,"promptVersionScoring":205,"score":272,"tags":453,"targetMarket":281,"tier":216},[454,455,212,456,457,458,459,460],"security","vulnerability-scanning","sast","dast","agent-platform","npm","pip",{"commitSha":283},{"repoId":463},"kd72phsqkbk8w57ctvf7ac9nqs86n9t4",[458,457,212,459,460,456,454,455],{"evaluatedAt":466,"extractAt":467,"updatedAt":466},1778695848342,1778695753353,{"_creationTime":469,"_id":470,"community":471,"display":472,"identity":478,"providers":483,"relations":491,"tags":494,"workflow":495},1778695548458.3445,"k17efcm48b2g7a0r4sjg7rj5nn86ntd7",{"reviewCount":8},{"description":473,"installMethods":474,"name":476,"sourceUrl":477},"Containerize an R-based MCP (Model Context Protocol) server using Docker. Covers mcptools integration, port exposure, stdio vs HTTP transport, and connecting Claude Code to the containerized server. Use when deploying an R MCP server without requiring a local R installation, creating a reproducible MCP server environment, running MCP servers alongside other containerized services, or distributing an MCP server to other developers.\n",{"claudeCode":475},"pjt222/agent-almanac","Containerize MCP Server","https://github.com/pjt222/agent-almanac",{"basePath":479,"githubOwner":480,"githubRepo":481,"locale":258,"slug":482,"type":248},"skills/containerize-mcp-server","pjt222","agent-almanac","containerize-mcp-server",{"evaluate":484,"extract":489},{"promptVersionExtension":204,"promptVersionScoring":205,"score":272,"tags":485,"targetMarket":281,"tier":216},[215,301,486,487,488],"r","containerization","deployment",{"commitSha":283,"license":490},"MIT",{"parentExtensionId":492,"repoId":493},"k170h0janaa9kwn7cfgfz2ykss86mmh9","kd7aryv63z61j39n2td1aeqkvh86mh12",[487,488,215,301,486],{"evaluatedAt":496,"extractAt":497,"updatedAt":496},1778696981156,1778695548458,{"_creationTime":499,"_id":500,"community":501,"display":502,"identity":508,"providers":513,"relations":522,"tags":525,"workflow":526},1778693180473.1135,"k17de92egj55jy906n011tje2n86nev2",{"reviewCount":8},{"description":503,"installMethods":504,"name":506,"sourceUrl":507},"Azure Container Registry SDK for Python. Use for managing container images, artifacts, and repositories.\nTriggers: \"azure-containerregistry\", \"ContainerRegistryClient\", \"container images\", \"docker registry\", \"ACR\".\n",{"claudeCode":505},"microsoft/agent-skills","Azure Container Registry SDK for Python","https://github.com/microsoft/agent-skills",{"basePath":509,"githubOwner":510,"githubRepo":511,"locale":258,"slug":512,"type":248},".github/plugins/azure-sdk-python/skills/azure-containerregistry-py","microsoft","agent-skills","azure-containerregistry-py",{"evaluate":514,"extract":521},{"promptVersionExtension":204,"promptVersionScoring":205,"score":272,"tags":515,"targetMarket":281,"tier":216},[516,517,518,519,520,215],"azure","container-registry","sdk","python","devops",{"commitSha":283,"license":490},{"parentExtensionId":523,"repoId":524},"k171mfx6atvhq1bkhpky84v4b186n9qd","kd77czgnv00rfjm815pcc5xx5986n5t8",[516,517,520,215,519,518],{"evaluatedAt":527,"extractAt":528,"updatedAt":527},1778694832694,1778693180473,{"_creationTime":530,"_id":531,"community":532,"display":533,"identity":536,"providers":537,"relations":544,"tags":546,"workflow":547},1778687523237.1125,"k171bq36mxs2rjzxbh5raev3cd86nc91",{"reviewCount":8},{"description":534,"installMethods":535,"name":372,"sourceUrl":14},"设置、索引和管理 SocratiCode 代码库索引。当用户想要索引项目、检查基础设施运行状况、启动/停止文件监视、配置上下文构件、排除索引问题、管理代码图或进行任何 SocratiCode 管理任务时使用。当用户提及索引、设置搜索、SocratiCode 基础设施或管理代码库索引时激活。",{"claudeCode":12},{"basePath":370,"githubOwner":245,"githubRepo":246,"locale":18,"slug":372,"type":248},{"evaluate":538,"extract":543},{"promptVersionExtension":204,"promptVersionScoring":205,"score":539,"tags":540,"targetMarket":281,"tier":216},99,[372,211,274,541,542],"developer-tools","ai-plugin",{"commitSha":283},{"parentExtensionId":251,"repoId":289,"translatedFrom":545},"k1790577a754jkr64wj3hptwrd86mr9y",[542,274,211,372,541],{"evaluatedAt":548,"extractAt":293,"updatedAt":549},1778687454126,1778687523237,{"_creationTime":551,"_id":552,"community":553,"display":554,"identity":558,"providers":561,"relations":569,"tags":570,"workflow":571},1778695548458.3982,"k171x3rf153jaf2ymvdtgzmtm986mkq2",{"reviewCount":8},{"description":555,"installMethods":556,"name":557,"sourceUrl":477},"Configure container image registries including GitHub Container Registry (ghcr.io), Docker Hub, and Harbor with automated image scanning, tagging strategies, retention policies, and CI/CD integration for secure image distribution. Use when setting up a private container registry, migrating from Docker Hub to self-hosted registries, implementing vulnerability scanning in CI/CD pipelines, managing multi-architecture images, enforcing image signing, or configuring automatic cleanup and retention policies.\n",{"claudeCode":475},"Setup Container Registry",{"basePath":559,"githubOwner":480,"githubRepo":481,"locale":258,"slug":560,"type":248},"skills/setup-container-registry","setup-container-registry",{"evaluate":562,"extract":568},{"promptVersionExtension":204,"promptVersionScoring":205,"score":539,"tags":563,"targetMarket":281,"tier":216},[517,215,564,520,565,454,566,567],"kubernetes","ci-cd","harbor","ghcr",{"commitSha":283,"license":490},{"parentExtensionId":492,"repoId":493},[565,517,520,215,567,566,564,454],{"evaluatedAt":572,"extractAt":497,"updatedAt":572},1778701304642,{"_creationTime":574,"_id":575,"community":576,"display":577,"identity":581,"providers":583,"relations":590,"tags":591,"workflow":592},1778695548458.3801,"k172ksqz98xqznjy5qkbpv1yp586m3y4",{"reviewCount":8},{"description":578,"installMethods":579,"name":580,"sourceUrl":477},"Optimize Docker build times using layer caching, multi-stage builds, BuildKit features, and dependency-first copy patterns. Applicable to R, Node.js, and Python projects. Use when Docker builds are slow due to repeated package installations, when rebuilds reinstall all dependencies on every code change, when image sizes are unnecessarily large, or when CI/CD pipeline builds are a bottleneck.\n",{"claudeCode":475},"optimize-docker-build-cache",{"basePath":582,"githubOwner":480,"githubRepo":481,"locale":258,"slug":580,"type":248},"skills/optimize-docker-build-cache",{"evaluate":584,"extract":589},{"promptVersionExtension":204,"promptVersionScoring":205,"score":539,"tags":585,"targetMarket":281,"tier":216},[215,586,587,487,486,588,519],"optimization","build","node-js",{"commitSha":283},{"parentExtensionId":492,"repoId":493},[587,487,215,588,586,519,486],{"evaluatedAt":593,"extractAt":497,"updatedAt":593},1778699725818]