Search Docker Hub images, inspect tags, view manifests, and manage repositories — AI-native container registry access.
Use with AI AssistantsMCP
Connect Claude, Cursor, or any MCP-compatible client — then call tools directly
① Add This MCP Server
Paste into your AI client config — then all its tools are available instantly.
{
"mcpServers": {
"docker": {
"url": "https://mcp.aerostack.dev/s/aerostack/mcp-docker",
"headers": {
"Authorization": "Bearer YOUR_AEROSTACK_TOKEN"
}
}
}
}Replace YOUR_AEROSTACK_TOKEN with your API token from the dashboard.
② Call a Tool
Ask your AI assistant to call a specific tool, or send raw JSON-RPC:
Natural Language Prompt
“Use the _ping tool to verify docker hub connectivity by fetching the authenticated user profile. used internally by aerostack to validate credentials”
Using a Workspace?
Add this MCP to your Workspace — your team shares one token, secrets are stored securely, and every AI agent in the workspace can call it without per-user setup.
Search Docker Hub images, inspect tags, view manifests, and manage repositories — AI-native container registry access.
Give your AI agents access to Docker Hub. Search millions of container images, compare tags and architectures, inspect vulnerability reports, view Dockerfiles, and manage your repositories — all through natural language.
Live endpoint: https://mcp.aerostack.dev/s/aerostack/mcp-docker
| Tool | Description |
|---|---|
_ping | Verify Docker Hub connectivity |
search_images | Search images by keyword with official/community filter |
get_repository | Get repo details — description, stars, pulls, last updated |
list_tags | List tags with digest, size, architecture, and OS info |
get_tag | Get tag details — multi-arch images, digests, timestamps |
list_repos | List repos for a user/org with pull counts |
get_dockerfile | View the Dockerfile for an image tag |
get_vulnerabilities | Vulnerability scan summary (critical/high/medium/low) |
| Variable | Required | Description | How to Get |
|---|---|---|---|
DOCKER_USERNAME | Yes | Docker Hub username | hub.docker.com → your username |
DOCKER_PASSWORD | Yes | Docker Hub password or Personal Access Token | hub.docker.com → Account Settings → Security → New Access Token (recommended over password) |
Best practice: Use a Personal Access Token instead of your password. Tokens can be scoped to read-only access.
DOCKER_USERNAME and DOCKER_PASSWORD under Project → Secrets"Search Docker Hub for the most popular Node.js images"
"Show me all tags for the official postgres image"
"What architectures are available for nginx:alpine?"
"List my Docker Hub repositories sorted by most pulled"
"Check vulnerabilities for python:3.12-slim"
"Show me the Dockerfile for node:22-alpine"
curl -X POST https://mcp.aerostack.dev/s/aerostack/mcp-docker \
-H 'Content-Type: application/json' \
-H 'X-Mcp-Secret-DOCKER-USERNAME: myuser' \
-H 'X-Mcp-Secret-DOCKER-PASSWORD: dckr_pat_xxxx' \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"search_images","arguments":{"query":"nginx","is_official":true}}}'
MIT
Live Endpoint
https://mcp.aerostack.dev/s/aerostack/mcp-docker
Sub-50ms globally · Zero cold start
@aerostack
Pre-built functions for the most common MCP tool patterns. Clone, extend, and deploy.
by @aerostack
Tasks, projects, sections, comments, teams, custom fields via Asana's official MCP
by @aerostack
Jira issues, sprints, Confluence pages via Atlassian's official MCP
by @aerostack
Cloudflare Workers, KV, R2, D1, Pages, DNS via Cloudflare's official MCP
by @aerostack
Dashboards, monitors, logs, metrics, incidents, SLOs, APM traces via Datadog's official MCP
by @aerostack
Files, frames, components, comments, variables via Figma's official MCP
by @aerostack
GitHub repos, PRs, issues, branches, code search via GitHub's official hosted MCP
Yes. get_vulnerabilities returns CVE data for a given image and tag using Docker Scout. Claude can block a deployment step if critical-severity vulnerabilities are found, without you manually running docker scout cves in a terminal.
list_tags returns all tags for a repository sorted by last-pushed date. Claude can filter out 'latest', 'edge', and date-stamped tags using pattern matching and return the highest semver tag — useful for pinning images in CI configs.
Yes. get_dockerfile returns the Dockerfile content for public images that have published source. Claude can scan for FROM directives, EXPOSE statements, and RUN commands to flag insecure patterns like running as root.
search_images accepts a query string and returns repository metadata including is_official and pull_count. Claude can filter results to only show Docker Official Images or Docker-Verified Publisher images to reduce supply-chain risk.