8 boosters for "containers" — AI-graded, open source, ready to install
Essex is a Rust-based CLI tool that generates Docker project templates and Dockerfiles, designed to streamline containerization workflows for developers using Windsurf. It provides a ready-to-use boilerplate with best practices for Docker projects, including Makefiles and OCI compliance.
Automates cleanup of JupyterHub Docker environments by stopping containers and removing orphaned resources. Ideal for data scientists and ML engineers managing local Jupyter development platforms who need to free up disk space and reset their environments.
A Node.js MCP server that executes JavaScript code safely in isolated Docker containers with on-demand npm dependency installation. Developers and AI agents benefit from secure, sandboxed code execution capabilities integrated into Claude.
Copilot instructions for developers integrating Microcks Testcontainers into .NET applications, providing guidance on C# code generation and development workflows with OpenAPI and Kafka testing.
This MCP server enables Claude to manage Docker containers and services through Portainer, allowing developers to automate container operations directly from their AI assistant.
A specialized Docker agent that optimizes container images for security and performance, helping developers build lightweight, secure Dockerfiles and multi-stage deployments. Ideal for DevOps engineers and backend developers seeking container best practices.
A specialized Docker optimization agent that helps developers build secure, lightweight container images through Dockerfile optimization, security hardening, and multi-stage build design. Ideal for DevOps engineers and developers seeking to improve container deployment practices.
This booster enforces Podman-first container practices with rootless defaults and standardized naming conventions across Dockerfile, docker-compose, and container configuration files. It benefits developers and teams adopting Podman as a Docker alternative and seeking consistent, security-focused container workflows.