<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Alden Weaver</title>
    <description>The latest articles on Forem by Alden Weaver (@aldenweaver).</description>
    <link>https://forem.com/aldenweaver</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3298519%2Fd72991a0-29f7-494e-94d9-cb788159756a.png</url>
      <title>Forem: Alden Weaver</title>
      <link>https://forem.com/aldenweaver</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/aldenweaver"/>
    <language>en</language>
    <item>
      <title>Six Enterprise AI Adoption Challenges and How Docker's Latest Tools Address Them</title>
      <dc:creator>Alden Weaver</dc:creator>
      <pubDate>Thu, 26 Feb 2026 10:02:58 +0000</pubDate>
      <link>https://forem.com/aldenweaver/six-enterprise-ai-adoption-challenges-and-how-dockers-latest-tools-address-them-iib</link>
      <guid>https://forem.com/aldenweaver/six-enterprise-ai-adoption-challenges-and-how-dockers-latest-tools-address-them-iib</guid>
      <description>&lt;p&gt;AI isn't coming to your software teams. It's already there. Developers are running local models, pulling AI-optimized images, connecting autonomous agents to codebases and cloud APIs, and integrating AI tools into every stage of the development lifecycle. The question for security, platform, and executive leadership isn't whether to allow it. It's whether you govern it or pretend it isn't happening.&lt;/p&gt;

&lt;p&gt;The risks are well-documented: unpredictable inference costs, unvetted images and tools entering the supply chain, autonomous agents with write access to production systems, and no audit trail across any of it. Without a deliberate architecture, this becomes Shadow AI.&lt;/p&gt;

&lt;p&gt;Docker's recent AI-focused releases address these challenges directly. Here's how they map to the concerns platform and security teams are navigating right now.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Challenges (and What Addresses Them)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. "AI inference costs are unpredictable and growing fast."
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Docker Model Runner + Remocal/MVM + Docker Offload&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Docker's "Remocal" approach pairs local-first development with Minimum Viable Models (MVMs), the smallest models that get the job done. (&lt;a href="https://www.docker.com/blog/remocal-minimum-viable-models-ai/" rel="noopener noreferrer"&gt;Docker, "Remocal + Minimum Viable Models"&lt;/a&gt;) Docker Model Runner executes these locally through standard APIs (OpenAI-compatible and Ollama-compatible) with three inference engines. (&lt;a href="https://docs.docker.com/ai/model-runner/" rel="noopener noreferrer"&gt;Docker Docs, "Model Runner"&lt;/a&gt;) Developers iterate locally at zero marginal token cost and only hit cloud APIs when they need to.&lt;/p&gt;

&lt;p&gt;When local hardware isn't enough, Docker Offload extends the same workflow to cloud infrastructure (L4 GPU currently in beta) without changing a single command. (&lt;a href="https://www.docker.com/products/docker-offload/" rel="noopener noreferrer"&gt;Docker, "Docker Offload"&lt;/a&gt;) The cost lever is clear: local by default, cloud when justified.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. "Autonomous agents with write access terrify our security team."
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Docker Sandboxes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is the answer to the "but what if the agent goes rogue" conversation. Each sandbox runs in a dedicated microVM with its own kernel, filesystem, and private Docker daemon. The agent can build, install, test, and run containers, all without any access to the host environment. Only the project workspace is mounted. When you tear down the sandbox, everything inside it is deleted. (&lt;a href="https://docs.docker.com/ai/sandboxes/architecture/" rel="noopener noreferrer"&gt;Docker Docs, "Sandboxes Architecture"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This is hypervisor-level isolation, not container-level. Sandboxes already support Claude Code, Codex, Copilot, Gemini, cagent, Kiro, OpenCode, and custom shell. (&lt;a href="https://docs.docker.com/ai/sandboxes/agents/" rel="noopener noreferrer"&gt;Docker Docs, "Sandbox Agents"&lt;/a&gt;) For standard (non-agent) containers, Enhanced Container Isolation (ECI) provides complementary protection using Linux user namespaces. (&lt;a href="https://docs.docker.com/enterprise/security/hardened-desktop/enhanced-container-isolation/" rel="noopener noreferrer"&gt;Docker Docs, "Enhanced Container Isolation"&lt;/a&gt;)&lt;/p&gt;

&lt;h3&gt;
  
  
  3. "Developers are connecting agents to GitHub, Jira, and databases with no oversight."
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;MCP Gateway + MCP Catalog&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The open-source MCP Gateway runs every tool server in an isolated container with restricted privileges, network controls, and resource limits. It manages credential injection (so API keys don't live in developer configs), and it includes built-in logging and call tracing. Every tool invocation is recorded. (&lt;a href="https://docs.docker.com/ai/mcp-catalog-and-toolkit/mcp-gateway/" rel="noopener noreferrer"&gt;Docker Docs, "MCP Gateway"&lt;/a&gt;; &lt;a href="https://www.docker.com/blog/docker-mcp-gateway-secure-infrastructure-for-agentic-ai/" rel="noopener noreferrer"&gt;Docker, "MCP Gateway: Secure Infrastructure for Agentic AI"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;The MCP Catalog provides 300+ curated, verified tool servers packaged as Docker images. Organizations can create custom catalogs scoped to their approved servers, turning "find a random MCP server on the internet" into "pick from the approved list." Docker is also applying automated trust measures including structured review of incoming changes. (&lt;a href="https://docs.docker.com/ai/mcp-catalog-and-toolkit/catalog/" rel="noopener noreferrer"&gt;Docker Docs, "MCP Catalog"&lt;/a&gt;)&lt;/p&gt;

&lt;h3&gt;
  
  
  4. "We can't control what our developers are pulling and running."
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Docker Hardened Images + Registry Access Management + Image Access Management&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Docker Hardened Images (DHI) are distroless, minimal base images stripped of shells, package managers, and unnecessary components. Every image ships with an SBOM, SLSA Build Level 3 provenance, and transparent CVE data. (&lt;a href="https://www.docker.com/blog/introducing-docker-hardened-images/" rel="noopener noreferrer"&gt;Docker, "Introducing Docker Hardened Images"&lt;/a&gt;) DHI is now free and open source (Apache 2.0) with over 1,000 images available, which removes the "it's too expensive to do the right thing" objection. (&lt;a href="https://www.docker.com/press-release/docker-makes-hardened-images-free-open-and-transparent-for-everyone/" rel="noopener noreferrer"&gt;Docker Press Release, December 17, 2025&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Registry Access Management (RAM) provides DNS-level filtering to control which registries developers can access through Docker Desktop. (&lt;a href="https://docs.docker.com/enterprise/security/hardened-desktop/registry-access-management/" rel="noopener noreferrer"&gt;Docker Docs, "Registry Access Management"&lt;/a&gt;) Image Access Management adds controls over which &lt;em&gt;types&lt;/em&gt; of Docker Hub images are permitted. (&lt;a href="https://docs.docker.com/enterprise/security/hardened-desktop/image-access-management/" rel="noopener noreferrer"&gt;Docker Docs, "Image Access Management"&lt;/a&gt;) Together, they let your platform team enforce approved sources without slowing anyone down.&lt;/p&gt;

&lt;p&gt;This isn't just for application images. Docker is actively extending hardening to MCP server images, the tools AI agents use to interact with external systems. (&lt;a href="https://www.docker.com/blog/docker-hardened-images-for-every-developer/" rel="noopener noreferrer"&gt;Docker, "Hardened Images for Everyone"&lt;/a&gt;)&lt;/p&gt;

&lt;h3&gt;
  
  
  5. "We need an audit trail and we need it yesterday."
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Docker Scout + MCP Gateway logging&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Docker Scout provides continuous SBOM and vulnerability analysis across container images in the stack: DHI base images, application images, and MCP server images. (&lt;a href="https://docs.docker.com/scout/" rel="noopener noreferrer"&gt;Docker Docs, "Docker Scout"&lt;/a&gt;) MCP Gateway logging captures tool-call details with support for signature verification (checking image provenance before use) and secret blocking (scanning payloads for exposed credentials). (&lt;a href="https://www.docker.com/blog/docker-mcp-gateway-secure-infrastructure-for-agentic-ai/" rel="noopener noreferrer"&gt;Docker, "MCP Gateway: Secure Infrastructure for Agentic AI"&lt;/a&gt;; &lt;a href="https://github.com/docker/mcp-gateway" rel="noopener noreferrer"&gt;GitHub, docker/mcp-gateway&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Together, these answer the three questions auditors will ask: &lt;em&gt;What's running? Is it safe? What did the agent do?&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  6. "We can't enforce any of this without knowing who's who."
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;SSO + SCIM&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Identity is the layer that makes all the others enforceable. RAM policies only activate when developers sign in with organization credentials. Image Access Management is scoped to authenticated users. Audit trails are meaningless without verified identities attached.&lt;/p&gt;

&lt;p&gt;SSO authenticates via your existing identity provider. SCIM automates provisioning and deprovisioning. When someone joins or leaves, their Docker access updates automatically. (&lt;a href="https://docs.docker.com/enterprise/security/single-sign-on/" rel="noopener noreferrer"&gt;Docker Docs, "Single Sign-On"&lt;/a&gt;)&lt;/p&gt;




&lt;h2&gt;
  
  
  What This Looks Like Composed
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Outcome&lt;/th&gt;
&lt;th&gt;Docker Tool(s)&lt;/th&gt;
&lt;th&gt;Why It Matters&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Lower AI spend + faster iteration&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Model Runner + Remocal/MVM + Docker Offload&lt;/td&gt;
&lt;td&gt;Run more of the dev loop locally to reduce paid API calls and latency during iteration.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Safe autonomy for agents&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Sandboxes&lt;/td&gt;
&lt;td&gt;MicroVM isolation + fast reset reduces host risk and cleanup time when agents misbehave.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Governed tool access&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker's MCP Catalog + Toolkit (including MCP Gateway)&lt;/td&gt;
&lt;td&gt;Centralize tool servers, apply restrictions, and capture logs/traces for visibility.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Stronger supply-chain posture&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Hardened Images + RAM + Image Access Management&lt;/td&gt;
&lt;td&gt;Standardize hardened bases and prevent pulling from unapproved sources.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Fewer vuln/audit fire drills&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Scout + MCP Gateway logging&lt;/td&gt;
&lt;td&gt;Continuous SBOM and CVE visibility + tool-call logs improves triage and audit readiness.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Identity-based policy enforcement&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SSO + SCIM&lt;/td&gt;
&lt;td&gt;Tie governance controls and audit trails to verified, managed identities across every layer.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Faster CI + hardened non-agent containers&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Build Cloud + Enhanced Container Isolation (ECI)&lt;/td&gt;
&lt;td&gt;Reduce build bottlenecks and strengthen isolation for everyday containers.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  The Seven-Layer Architecture
&lt;/h2&gt;

&lt;p&gt;For teams ready to go deeper, here is a reference architecture that weaves these capabilities into seven concurrent layers to solve the problems mentioned above.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Layer&lt;/th&gt;
&lt;th&gt;Docker Tool(s)&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Foundation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Hardened Images + RAM + Image Access Management&lt;/td&gt;
&lt;td&gt;Hardened/minimal base images; registry allowlisting and image-type controls&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Definition&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;cagent&lt;/td&gt;
&lt;td&gt;Declarative YAML agent configs with root/sub-agent orchestration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inference&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Model Runner + Remocal/MVM&lt;/td&gt;
&lt;td&gt;Local-first model execution with Minimum Viable Models; Docker Offload for cloud burst&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Execution&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Sandboxes&lt;/td&gt;
&lt;td&gt;MicroVM isolation with a private Docker daemon per agent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;External Access&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;MCP Gateway + MCP Catalog&lt;/td&gt;
&lt;td&gt;Governed, containerized tool servers with credential injection and call tracing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Observability&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Scout + MCP Gateway logging&lt;/td&gt;
&lt;td&gt;Continuous SBOM/CVE analysis; tool-call audit trails&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Identity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SSO + SCIM&lt;/td&gt;
&lt;td&gt;Authentication, user provisioning, and identity-based policy enforcement&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;For the full architecture walkthrough, including how each layer connects, read the companion overview: &lt;a href="https://dev.to/aldenweaver/from-shadow-ai-to-enterprise-asset-a-seven-layer-reference-architecture-for-dockers-ai-stack-58oh"&gt;From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack&lt;/a&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  How I Wrote This Article
&lt;/h3&gt;

&lt;p&gt;This post was produced through a multi-stage process combining human research and writing with AI tools. I spent a week studying Docker's AI-focused releases, built the architectural framework, then used AI tools (Gemini, ChatGPT, and Claude) iteratively for drafting, fact-checking, and structural review. For the full methodology, see the "How I Wrote This" section of my deep dive into these concepts: &lt;a href="https://dev.to/aldenweaver/from-shadow-ai-to-enterprise-asset-a-seven-layer-reference-architecture-for-dockers-ai-stack--39f7"&gt;From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>docker</category>
      <category>security</category>
      <category>ai</category>
      <category>agents</category>
    </item>
    <item>
      <title>From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack</title>
      <dc:creator>Alden Weaver</dc:creator>
      <pubDate>Thu, 26 Feb 2026 09:00:53 +0000</pubDate>
      <link>https://forem.com/aldenweaver/from-shadow-ai-to-enterprise-asset-a-seven-layer-reference-architecture-for-dockers-ai-stack-58oh</link>
      <guid>https://forem.com/aldenweaver/from-shadow-ai-to-enterprise-asset-a-seven-layer-reference-architecture-for-dockers-ai-stack-58oh</guid>
      <description>&lt;p&gt;Most organizations are already using AI agents in their development workflows. The question is whether those agents are governed or fall under the category of "shadow AI". Docker's recent AI-focused releases can be composed into a single architecture that reduces developer friction while giving platform and security teams isolation, visibility, and policy enforcement at each layer.&lt;/p&gt;

&lt;p&gt;Here's the full stack in seven layers.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Note: For a deep dive into these concepts, see &lt;a href="https://dev.to/aldenweaver/from-shadow-ai-to-enterprise-asset-a-seven-layer-reference-architecture-for-dockers-ai-stack--39f7"&gt;From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The Seven Layers
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Layer&lt;/th&gt;
&lt;th&gt;Docker Tool(s)&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Foundation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Hardened Images + Registry Access Management + Image Access Management&lt;/td&gt;
&lt;td&gt;Hardened/minimal base images; registry allowlisting (RAM) and Docker Hub image-type controls (IAM) to reduce exposure to unapproved sources&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Definition&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;cagent&lt;/td&gt;
&lt;td&gt;Declarative YAML agent configs with root/sub-agent orchestration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inference&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Model Runner + Remocal/MVM&lt;/td&gt;
&lt;td&gt;Local-first model execution using Minimum Viable Models (MVMs) via a local model runtime (Model Runner); optional remote workload execution with Docker Offload when you need to scale beyond local resources&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Execution&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Sandboxes&lt;/td&gt;
&lt;td&gt;MicroVM isolation: each sandbox gets its own VM with a private Docker daemon; the agent can build/run/test without access to the host Docker environment&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;External Access&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;MCP Gateway + MCP Catalog/Toolkit&lt;/td&gt;
&lt;td&gt;Gateway-managed MCP tool servers run in isolated containers with restricted privileges/network/resources, plus built-in logging and call tracing for governance; the Catalog provides curated MCP servers packaged as Docker images&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Observability&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Scout + MCP Gateway logging&lt;/td&gt;
&lt;td&gt;Continuous Software Bill of Materials (SBOM) and Common Vulnerabilities and Exposures (CVE) visibility across images (Docker Scout) + tool-call logs and traces from MCP Gateway for visibility and governance&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Identity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SSO + SCIM&lt;/td&gt;
&lt;td&gt;Authentication and user provisioning to support identity-based access control at scale&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Two additional Docker Business capabilities complement these layers:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Capability&lt;/th&gt;
&lt;th&gt;Docker Tool(s)&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Build Acceleration&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Build Cloud&lt;/td&gt;
&lt;td&gt;Offloads image builds to cloud infrastructure to reduce build times and improve CI/CD feedback loops&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Standard Container Isolation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Enhanced Container Isolation (ECI)&lt;/td&gt;
&lt;td&gt;Strengthens isolation for standard containers using Linux user namespaces (limiting impact of malicious containers by reducing effective privileges)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Executive Snapshot: What each layer buys you (ROI + controls)
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Outcome&lt;/th&gt;
&lt;th&gt;Docker Tool(s)&lt;/th&gt;
&lt;th&gt;Why It Matters&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Lower AI spend + faster iteration&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Model Runner + Remocal/MVM&lt;/td&gt;
&lt;td&gt;Run more of the dev loop locally to reduce paid API calls and latency during iteration.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Safe autonomy for agents&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Sandboxes&lt;/td&gt;
&lt;td&gt;MicroVM isolation + fast reset reduces host risk and cleanup time when agents misbehave.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Governed tool access&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker’s MCP Catalog + Toolkit (including MCP Gateway)&lt;/td&gt;
&lt;td&gt;Centralize tool servers, apply restrictions, and capture logs/traces for visibility.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Stronger supply-chain posture&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Hardened Images + Registry Access Management + Image Access Management&lt;/td&gt;
&lt;td&gt;Standardize hardened bases and prevent pulling from unapproved sources.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Fewer vuln/audit fire drills&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Scout + MCP Gateway logging&lt;/td&gt;
&lt;td&gt;Continuous SBOM and CVE visibility across images + tool-call logs/traces improves triage and audit readiness.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Faster CI + hardened non-agent containers&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Build Cloud + Enhanced Container Isolation (ECI)&lt;/td&gt;
&lt;td&gt;Reduce build bottlenecks and strengthen isolation for everyday (non-agent) containers.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Layer by Layer
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. Foundation — DHI + RAM + Image Access Management&lt;/strong&gt;&lt;br&gt;
Docker Hardened Images provide distroless, minimal base images with every image including an SBOM, SLSA Build Level 3 provenance, and transparent CVE data. Now free and open source under Apache 2.0, with a catalog of over 1,000 images and Helm charts on Alpine and Debian. This foundation applies broadly across the architecture. DHI base images underpin the application containers developers build and the MCP server containers that agents call through the Gateway. Registry Access Management (RAM) adds DNS-level registry allowlisting, and Image Access Management controls which types of Docker Hub images are permitted. Together they enforce the foundation at the organizational level. (&lt;a href="https://docs.docker.com/dhi/core-concepts/distroless/" rel="noopener noreferrer"&gt;DHI Docs&lt;/a&gt;; &lt;a href="https://docs.docker.com/enterprise/security/hardened-desktop/registry-access-management/" rel="noopener noreferrer"&gt;RAM Docs&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Definition — cagent&lt;/strong&gt;&lt;br&gt;
Agents defined as declarative YAML, not ad-hoc scripts. Root agent delegates to sub-agents, each with its own model, tools, and instructions. Bundled in Docker Desktop 4.49+, packaged as OCI artifacts, shareable via Docker Hub. Swap models by changing one line instead of rewriting the workflow. (&lt;a href="https://docs.docker.com/ai/cagent/" rel="noopener noreferrer"&gt;Docs&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Inference — Docker Model Runner + Remocal&lt;/strong&gt;&lt;br&gt;
Reduces cost and iteration time during development. Docker Model Runner uses local-first model execution via OpenAI-compatible and Ollama-compatible APIs. Three inference engines: llama.cpp (all platforms), vLLM (NVIDIA GPUs), and Diffusers (image generation). Docker's "Remocal" philosophy: use the smallest effective model locally during development, scale to cloud only when needed. Docker Offload provides GPU cloud compute (L4 in beta, broader GPU in 2026) as a drop-in replacement. (&lt;a href="https://docs.docker.com/ai/model-runner/" rel="noopener noreferrer"&gt;Docs&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Execution — Docker Sandboxes&lt;/strong&gt;&lt;br&gt;
When agents need autonomy for tasks such as editing files or installing packages, Docker Sandboxes provide microVM isolation with a private Docker daemon. Hypervisor-level boundary: separate kernel, workspace-only mount, no host Docker access. This layer wraps agent definition and inference together in an isolated environment. Currently supports Claude Code, Codex, Copilot, Gemini, cagent, Kiro, OpenCode, and custom shell. For standard (non-agent) containers, Enhanced Container Isolation (ECI) provides complementary protection via Linux user namespaces. (&lt;a href="https://docs.docker.com/ai/sandboxes/architecture/" rel="noopener noreferrer"&gt;Docs&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. External Access — MCP Gateway + MCP Catalog&lt;/strong&gt;&lt;br&gt;
Governs all agent interactions with external systems (such as GitHub, Jira, databases) throughout the workflow. The open-source MCP Gateway runs MCP servers in isolated containers with restricted privileges, credential injection, and built-in logging/call tracing. The MCP Catalog provides 300+ verified, curated servers as Docker images. Organizations can create custom catalogs to scope approved tools. (&lt;a href="https://docs.docker.com/ai/mcp-catalog-and-toolkit/mcp-gateway/" rel="noopener noreferrer"&gt;Docs&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Observability — Docker Scout + Gateway logging&lt;/strong&gt;&lt;br&gt;
Docker Scout provides continuous SBOM and vulnerability analysis across container images in the architecture: DHI base images, application images, and MCP server images. MCP Gateway logging and call tracing captures tool invocations with support for signature verification and secret blocking interceptors. Together they answer: "what's running, is it safe, and what did the agent do." (&lt;a href="https://docs.docker.com/scout/" rel="noopener noreferrer"&gt;Scout Docs&lt;/a&gt;; &lt;a href="https://github.com/docker/mcp-gateway" rel="noopener noreferrer"&gt;Gateway GitHub&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. Identity — SSO + SCIM&lt;/strong&gt;&lt;br&gt;
The layer that binds everything together. SSO authenticates developers via the organization's identity provider; SCIM automates user provisioning and deprovisioning. RAM policies only take effect when users sign in, Image Access Management controls are scoped to authenticated users, and audit trails only have meaning when tied to verified identities. Without this layer, the other six can't enforce governance. (&lt;a href="https://docs.docker.com/enterprise/security/single-sign-on/" rel="noopener noreferrer"&gt;Docs&lt;/a&gt;)&lt;/p&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Composed together, these seven layers form a governed architecture for AI agent workflows: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Foundation&lt;/strong&gt; standardizes trusted images and limits unapproved sources (Docker Hardened Images + RAM/IAM)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Definition&lt;/strong&gt; makes agent behavior reproducible (cagent)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Inference&lt;/strong&gt; enables local-first model execution economics (Docker Model Runner + Remocal/MVM)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Execution&lt;/strong&gt; isolates autonomous work in microVM sandboxes&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;External Access&lt;/strong&gt; centralizes and governs tool use through &lt;strong&gt;MCP Gateway&lt;/strong&gt; (with curated servers via the Catalog)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Observability&lt;/strong&gt; combines supply-chain visibility (Docker Scout) with tool-call logs/traces (MCP Gateway)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Identity&lt;/strong&gt; (SSO/SCIM) supports consistent access and lifecycle control at scale.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Two additional Docker Business capabilities complement these layers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Build Acceleration&lt;/strong&gt; improves developer and CI throughput by offloading image builds to cloud infrastructure (Docker Build Cloud).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Standard Container Isolation&lt;/strong&gt; strengthens isolation for everyday (non-agent) containers using Linux user namespaces, reducing effective privileges and limiting blast radius (Enhanced Container Isolation / ECI).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The net effect is a path from unmanaged “shadow AI" to a governed architecture that reduces developer friction, provides isolation and visibility at each layer, and gives platform teams the controls to enforce policy without slowing delivery.&lt;/p&gt;




&lt;h3&gt;
  
  
  How I Wrote This Article
&lt;/h3&gt;

&lt;p&gt;This post was produced through a multi-stage process combining human research and writing with AI tools. I spent a week studying Docker's AI-focused releases, built the architectural framework, then used AI tools (Gemini, ChatGPT, and Claude) iteratively for drafting, fact-checking, and structural review. For the full methodology, see the deep dive's "How I Wrote This" section.&lt;/p&gt;

</description>
      <category>docker</category>
      <category>security</category>
      <category>ai</category>
      <category>containers</category>
    </item>
    <item>
      <title>From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack - The Deep Dive</title>
      <dc:creator>Alden Weaver</dc:creator>
      <pubDate>Thu, 26 Feb 2026 08:58:46 +0000</pubDate>
      <link>https://forem.com/aldenweaver/from-shadow-ai-to-enterprise-asset-a-seven-layer-reference-architecture-for-dockers-ai-stack--39f7</link>
      <guid>https://forem.com/aldenweaver/from-shadow-ai-to-enterprise-asset-a-seven-layer-reference-architecture-for-dockers-ai-stack--39f7</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Most organizations are already using AI agents in their development workflows. The question is whether those agents are governed or fall under the category of 'shadow AI'. Without a strategic architecture, teams end up with unmanaged tool sprawl, inconsistent configurations, unclear security boundaries, and unpredictable cloud-inference bills. Docker's newer AI-focused building blocks can be composed into a repeatable, governed developer workflow that reduces developer friction while giving platform and security teams isolation, visibility, and policy enforcement at each layer.&lt;/p&gt;

&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;p&gt;The tables are a good place to start; from there, you can decide where to dive deeper.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Note: For a high level summary of this blog post, see &lt;a href="https://dev.to/aldenweaver/from-shadow-ai-to-enterprise-asset-a-seven-layer-reference-architecture-for-dockers-ai-stack-58oh"&gt;From Shadow AI to Enterprise Asset: A Seven-Layer Reference Architecture for Docker's AI Stack&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Who This Is For
&lt;/h2&gt;

&lt;p&gt;This article is for platform engineering, developers, security, and DevEx leaders who need a practical way to move AI agents and tools from a “cool experiment” to a governed, repeatable workflow. You’ll get a 7-layer architecture that maps Docker’s AI tools to real enterprise concerns (identity, supply chain, isolation, observability, and tool governance), plus clear “where it fits” guidance for each layer. This isn’t a full implementation guide or a product pitch; it’s a mental model and blueprint you can use to align teams, pick controls, and reduce Shadow AI drift.&lt;/p&gt;

&lt;p&gt;This post walks through the architecture in the order a developer typically encounters each capability. In practice, several of these layers operate concurrently.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Seven Layers
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Layer&lt;/th&gt;
&lt;th&gt;Docker Tool(s)&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Foundation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Hardened Images + Registry Access Management + Image Access Management&lt;/td&gt;
&lt;td&gt;Hardened/minimal base images; registry allowlisting (RAM) and Docker Hub image-type controls (IAM) to reduce exposure to unapproved sources&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Definition&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;cagent&lt;/td&gt;
&lt;td&gt;Declarative YAML agent configs with root/sub-agent orchestration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inference&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Model Runner + Remocal/MVM&lt;/td&gt;
&lt;td&gt;Local-first model execution using Minimum Viable Models (MVMs) via a local model runtime (Model Runner); optional remote workload execution with Docker Offload when you need to scale beyond local resources&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Execution&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Sandboxes&lt;/td&gt;
&lt;td&gt;MicroVM isolation: each sandbox gets its own VM with a private Docker daemon; the agent can build/run/test without access to the host Docker environment&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;External Access&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;MCP Gateway + MCP Catalog/Toolkit&lt;/td&gt;
&lt;td&gt;Gateway-managed MCP tool servers run in isolated containers with restricted privileges/network/resources, plus built-in logging and call tracing for governance; the Catalog provides curated MCP servers packaged as Docker images&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Observability&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Scout + MCP Gateway logging&lt;/td&gt;
&lt;td&gt;Continuous Software Bill of Materials (SBOM) and Common Vulnerabilities and Exposures (CVE) visibility across images (Docker Scout) + tool-call logs and traces from MCP Gateway for visibility and governance&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Identity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SSO + SCIM&lt;/td&gt;
&lt;td&gt;Authentication and user provisioning to support identity-based access control at scale&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Two additional Docker Business capabilities complement these layers:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Capability&lt;/th&gt;
&lt;th&gt;Docker Tool(s)&lt;/th&gt;
&lt;th&gt;What It Does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Build Acceleration&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Build Cloud&lt;/td&gt;
&lt;td&gt;Offloads image builds to cloud infrastructure to reduce build times and improve CI/CD feedback loops&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Standard Container Isolation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Enhanced Container Isolation (ECI)&lt;/td&gt;
&lt;td&gt;Strengthens isolation for standard containers using Linux user namespaces (limiting impact of malicious containers by reducing effective privileges)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Executive Snapshot: What each layer buys you (ROI + controls)
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Outcome&lt;/th&gt;
&lt;th&gt;Docker Tool(s)&lt;/th&gt;
&lt;th&gt;Why It Matters&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Lower AI spend + faster iteration&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Model Runner + Remocal/MVM&lt;/td&gt;
&lt;td&gt;Run more of the dev loop locally to reduce paid API calls and latency during iteration.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Safe autonomy for agents&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Sandboxes&lt;/td&gt;
&lt;td&gt;MicroVM isolation + fast reset reduces host risk and cleanup time when agents misbehave.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Governed tool access&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker’s MCP Catalog + Toolkit (including MCP Gateway)&lt;/td&gt;
&lt;td&gt;Centralize tool servers, apply restrictions, and capture logs/traces for visibility.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Stronger supply-chain posture&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Hardened Images + Registry Access Management + Image Access Management&lt;/td&gt;
&lt;td&gt;Standardize hardened bases and prevent pulling from unapproved sources.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Fewer vuln/audit fire drills&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Scout + MCP Gateway logging&lt;/td&gt;
&lt;td&gt;Continuous SBOM and CVE visibility across images + tool-call logs/traces improves triage and audit readiness.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Faster CI + hardened non-agent containers&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Docker Build Cloud + Enhanced Container Isolation (ECI)&lt;/td&gt;
&lt;td&gt;Reduce build bottlenecks and strengthen isolation for everyday (non-agent) containers.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  The Architecture: Layer by Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1) Foundation — Approved images and hardened supply chain (Docker Hardened Images + Registry Access Management + Image Access Management)
&lt;/h3&gt;

&lt;p&gt;Before any agent runs, the platform engineering team establishes a secure foundation that underpins the entire pipeline. Docker Hardened Images (DHI) follow a distroless philosophy, stripping unnecessary components like shells, package managers, and debugging tools to dramatically reduce attack surface and improve vulnerability posture through curated maintenance and transparent CVE reporting. (&lt;a href="https://www.docker.com/blog/introducing-docker-hardened-images/" rel="noopener noreferrer"&gt;Docker, "Introducing Docker Hardened Images"&lt;/a&gt;; &lt;a href="https://www.docker.com/blog/fedramp-compliance-with-hardened-images/" rel="noopener noreferrer"&gt;Docker, "FedRAMP Compliance with Hardened Images"&lt;/a&gt;) Every image ships with a complete Software Bill of Materials (SBOM), SLSA Build Level 3 provenance, and transparent public CVE data. (&lt;a href="https://www.docker.com/blog/introducing-docker-hardened-images/" rel="noopener noreferrer"&gt;Docker, "Introducing Docker Hardened Images"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;DHI is now free and fully open source under the Apache 2.0 license, with a catalog of over 1,000 images and Helm charts built on Alpine and Debian. Organizations needing SLA-backed CVE remediation (under seven days for critical and high-severity vulnerabilities), FIPS-enabled images, or extended lifecycle support can upgrade to DHI Enterprise. (&lt;a href="https://www.docker.com/blog/docker-hardened-images-for-every-developer/" rel="noopener noreferrer"&gt;Docker, "Hardened Images for Everyone"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This foundation layer applies broadly across the architecture. DHI base images underpin the application containers developers build and the MCP server containers that agents call through the Gateway. Docker is actively extending its hardening methodology to MCP server images, with hardened versions of popular servers like Grafana, MongoDB, and GitHub already available. (&lt;a href="https://www.docker.com/press-release/docker-makes-hardened-images-free-open-and-transparent-for-everyone/" rel="noopener noreferrer"&gt;Docker Press Release, December 17, 2025&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;To enforce this foundation at the organizational level, Docker's &lt;strong&gt;Registry Access Management (RAM)&lt;/strong&gt; provides DNS-level filtering that controls which registries developers can access through Docker Desktop. Admins maintain an allowlist of approved registries; any pull or push to a registry not on the list is blocked. Docker's &lt;strong&gt;Image Access Management&lt;/strong&gt; provides complementary controls over which &lt;em&gt;types&lt;/em&gt; of images can be pulled from Docker Hub — Docker Official, Verified Publisher, Organization, or Community images — including repository allow lists. Docker recommends combining both for comprehensive coverage. (&lt;a href="https://docs.docker.com/enterprise/security/hardened-desktop/registry-access-management/" rel="noopener noreferrer"&gt;Docker Docs, "Registry Access Management"&lt;/a&gt;; &lt;a href="https://docs.docker.com/enterprise/security/hardened-desktop/image-access-management/" rel="noopener noreferrer"&gt;Docker Docs, "Image Access Management"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Cloud Native Now reports that future Docker Desktop updates will enable teams to publish and manage their own MCP servers using enterprise controls such as Registry Access Management (RAM) and Image Access Management (IAM), letting platform teams apply familiar governance mechanisms to agent tooling. (&lt;a href="https://cloudnativenow.com/editorial-calendar/best-of-2025/docker-inc-embraces-mcp-to-make-ai-agent-integration-simpler-2/" rel="noopener noreferrer"&gt;Cloud Native Now, "Docker Embraces MCP"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operational note:&lt;/strong&gt; Because distroless images omit interactive debugging tools, Docker recommends approaches like attaching a debug sidecar (e.g., Docker Debug) or using multi-stage builds rather than modifying the hardened image itself. (&lt;a href="https://docs.docker.com/dhi/core-concepts/distroless/" rel="noopener noreferrer"&gt;Docker Docs, "Distroless Images"&lt;/a&gt;)&lt;/p&gt;




&lt;h3&gt;
  
  
  2) Definition — Agents as configuration (cagent)
&lt;/h3&gt;

&lt;p&gt;Instead of ad-hoc Python scripts, developers define agents in a declarative YAML configuration. Docker's open-source cagent framework uses a "root agent + sub-agents" model, where the root agent delegates work to explicitly defined sub-agents, each with its own model, parameters, and tool access. cagent is bundled in Docker Desktop 4.49 and later, so developers can start building agents without a separate installation step. (&lt;a href="https://www.docker.com/blog/cagent-comes-to-docker-desktop-with-built-in-ide-support-through-acp/" rel="noopener noreferrer"&gt;Docker, "cagent Comes to Docker Desktop"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;cagent supports external tools via MCP servers, and offers model flexibility across providers — OpenAI, Anthropic, Google Gemini, or local models via Docker Model Runner — without rewriting the overall agent workflow. Agents are packaged as OCI artifacts, meaning they can be pushed, pulled, and shared through Docker Hub or any OCI-compatible registry, just like container images. This makes agent configurations versionable, reviewable, and distributable through the same supply-chain controls the platform team already enforces for container images. (&lt;a href="https://docs.docker.com/ai/cagent/" rel="noopener noreferrer"&gt;Docker Docs, "cagent"&lt;/a&gt;)&lt;/p&gt;




&lt;h3&gt;
  
  
  3) Inference — Local-first economics (Remocal + Docker Model Runner)
&lt;/h3&gt;

&lt;p&gt;Docker's "Remocal" (Remote + Local) framing encourages pairing local-first development with "Minimum Viable Models" (MVMs) — the smallest, most efficient models that solve the core problem effectively. The idea is to iterate quickly, reduce dependency on external APIs, and keep cost and latency more predictable during development, reserving cloud-scale models for production workloads that genuinely require them. (&lt;a href="https://www.docker.com/blog/remocal-minimum-viable-models-ai/" rel="noopener noreferrer"&gt;Docker, "Remocal + Minimum Viable Models"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Docker Model Runner is the local execution layer. It runs models locally and serves them through OpenAI-compatible and Ollama-compatible APIs, with support for three inference engines: llama.cpp (the default, works on all platforms), vLLM (for high-throughput inference on NVIDIA GPUs), and Diffusers (for image generation on Linux with NVIDIA GPUs). Models are stored as OCI artifacts and cached locally after the initial pull. (&lt;a href="https://docs.docker.com/ai/model-runner/" rel="noopener noreferrer"&gt;Docker Docs, "Model Runner"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Because cagent's YAML config specifies which model to use, swapping between a local MVM and a cloud-hosted frontier model is a one-line change — no workflow rewrite required. This is where the Definition layer and Inference layer connect directly.&lt;/p&gt;

&lt;p&gt;When workloads exceed local resources, Docker Offload extends your local Docker workflow into cloud infrastructure. It uses the same Docker CLI commands (&lt;code&gt;docker build&lt;/code&gt;, &lt;code&gt;docker run&lt;/code&gt;) but executes them on cloud-hosted machines, with NVIDIA L4 GPU acceleration currently in beta and broader GPU support described as arriving in 2026. (&lt;a href="https://www.docker.com/products/model-runner/" rel="noopener noreferrer"&gt;Docker, "Model Runner Product Page"&lt;/a&gt;; &lt;a href="https://www.docker.com/products/docker-offload/" rel="noopener noreferrer"&gt;Docker, "Docker Offload"&lt;/a&gt;)&lt;/p&gt;




&lt;h3&gt;
  
  
  4) Execution — Isolated autonomy (Docker Sandboxes)
&lt;/h3&gt;

&lt;p&gt;When an agent needs broad freedom, such as editing files, installing dependencies, running tests, or building containers, Docker Sandboxes provide the execution environment. Each sandbox is a dedicated microVM with its own kernel, filesystem, and private Docker daemon. The agent can build images, start containers, and run tests without any access to the host Docker environment. Only the project workspace is mounted; the agent cannot see host containers, images, volumes, or the host Docker daemon. (&lt;a href="https://docs.docker.com/ai/sandboxes/architecture/" rel="noopener noreferrer"&gt;Docker Docs, "Sandboxes Architecture"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;This is the layer that wraps and contains the work defined in layers 2 and 3. The developer defines the agent (cagent YAML), selects a model (Model Runner or cloud), and then the sandbox provides the isolated environment where all of that actually executes. Docker describes it as hypervisor-level isolation: unlike containers (which share the host kernel), the sandbox VMs have separate kernels and cannot access host resources outside their defined boundaries. Network isolation is configurable via allow/deny lists. When a sandbox is removed, the entire VM and its contents are deleted. (&lt;a href="https://www.docker.com/blog/docker-sandboxes-run-claude-code-and-other-coding-agents-unsupervised-but-safely/" rel="noopener noreferrer"&gt;Docker, "Docker Sandboxes: Run Agents Safely"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Docker Sandboxes currently support Claude Code, Codex, Copilot, Gemini, cagent, Kiro, OpenCode, and custom shell with microVM-based sandboxes available on macOS and Windows. cagent can be run inside a sandbox with YOLO mode for fully autonomous operation. (&lt;a href="https://docs.docker.com/ai/sandboxes/agents/" rel="noopener noreferrer"&gt;Docker Docs, "Sandbox Agents"&lt;/a&gt;; &lt;a href="https://docs.docker.com/ai/sandboxes/agents/cagent/" rel="noopener noreferrer"&gt;Docker Docs, "cagent Sandbox"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;For standard (non-agent) containers in everyday development, &lt;strong&gt;Enhanced Container Isolation (ECI)&lt;/strong&gt; provides complementary protection. ECI runs all user containers with Linux user namespaces via the Sysbox runtime, mapping container root users to unprivileged users inside the Docker Desktop VM. Together, Sandboxes and ECI cover both agent and non-agent workloads. (&lt;a href="https://docs.docker.com/enterprise/security/hardened-desktop/enhanced-container-isolation/" rel="noopener noreferrer"&gt;Docker Docs, "Enhanced Container Isolation"&lt;/a&gt;)&lt;/p&gt;




&lt;h3&gt;
  
  
  5) External Access — Governed tool use (Docker’s MCP Catalog and Toolkit, including MCP Gateway)
&lt;/h3&gt;

&lt;p&gt;Throughout its work, an agent may need to interact with external systems: GitHub, Jira, databases, search APIs, and more. The MCP Gateway governs all of these interactions. It runs MCP servers in isolated Docker containers with restricted privileges, network access, and resource usage. The Gateway manages each server's full lifecycle: starting a server when an AI application requests a tool, injecting required credentials (managed via Docker Desktop’s secrets store and OAuth flows), applying security restrictions, and forwarding requests. It includes built-in logging and call-tracing capabilities for visibility and governance of tool activity. (&lt;a href="https://docs.docker.com/ai/mcp-catalog-and-toolkit/mcp-gateway/" rel="noopener noreferrer"&gt;Docker Docs, "MCP Gateway"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;The MCP Gateway works behind the scenes for both cagent-defined agents (which specify MCP toolsets in their YAML) and for interactive coding agents like Claude Code and Copilot in VS Code. It acts as a centralized proxy: instead of configuring each MCP server for every client individually, you configure the Gateway once and connect all clients to it. The Gateway is open source. (&lt;a href="https://www.docker.com/blog/docker-mcp-gateway-secure-infrastructure-for-agentic-ai/" rel="noopener noreferrer"&gt;Docker, "MCP Gateway: Secure Infrastructure for Agentic AI"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Rather than letting every developer find and run random MCP servers, Docker's MCP Catalog provides a curated collection of 300+ (and growing) verified MCP servers packaged as Docker images with versioning, provenance, and security updates. Organizations can also create custom catalogs scoped to their approved servers — a natural extension of the "approved images" pattern into "approved tools." Docker is applying additional trust measures to the MCP ecosystem, including automated review of incoming changes with structured reporting. (&lt;a href="https://docs.docker.com/ai/mcp-catalog-and-toolkit/catalog/" rel="noopener noreferrer"&gt;Docker Docs, "MCP Catalog"&lt;/a&gt;)&lt;/p&gt;




&lt;h3&gt;
  
  
  6) Observability — Continuous monitoring and audit (Docker Scout + Gateway logging)
&lt;/h3&gt;

&lt;p&gt;A governed architecture requires continuous visibility, not just point-in-time checks. Two capabilities provide this across the stack.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Docker Scout&lt;/strong&gt; analyzes container images to produce and consume SBOMs, matching them against a continuously updated vulnerability database to identify known issues in image components. This applies to every layer that involves container images: DHI base images, application images, and MCP server images from the Catalog. Scout provides ongoing supply-chain visibility across the full architecture. (&lt;a href="https://docs.docker.com/scout/" rel="noopener noreferrer"&gt;Docker Docs, "Docker Scout"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MCP Gateway logging and call tracing&lt;/strong&gt; provides the audit trail for agent activity. When logging is enabled (via the &lt;code&gt;--log-calls&lt;/code&gt; flag), tool calls that pass through the Gateway are logged and traced — including which tool was invoked and the request/response details. The Gateway also supports interceptors like signature verification (ensuring MCP container images have valid provenance before use) and secret blocking (scanning payloads for credentials that shouldn't be exposed). Together, these give platform and security teams the observability they need to answer "what did the agent do and why." (&lt;a href="https://www.docker.com/blog/docker-mcp-gateway-secure-infrastructure-for-agentic-ai/" rel="noopener noreferrer"&gt;Docker, "MCP Gateway: Secure Infrastructure for Agentic AI"&lt;/a&gt;; &lt;a href="https://github.com/docker/mcp-gateway" rel="noopener noreferrer"&gt;GitHub, docker/mcp-gateway&lt;/a&gt;)&lt;/p&gt;




&lt;h3&gt;
  
  
  7) Identity — Authentication and policy enforcement (SSO + SCIM)
&lt;/h3&gt;

&lt;p&gt;Identity is the layer that binds all other layers together. Without knowing &lt;em&gt;who&lt;/em&gt; is pulling images, defining agents, running sandboxes, or invoking tools, governance policies have no teeth and audit trails have no meaning.&lt;/p&gt;

&lt;p&gt;Docker Business supports SSO for authenticating via an identity provider, and SCIM provisioning for ongoing user lifecycle synchronization between an IdP and Docker. This is the prerequisite for policy enforcement across the entire architecture: RAM policies only take effect when users sign in to Docker Desktop with organization credentials, Image Access Management controls are scoped to authenticated users, and MCP Gateway tool access can be governed by identity. (&lt;a href="https://docs.docker.com/enterprise/security/single-sign-on/" rel="noopener noreferrer"&gt;Docker Docs, "Single Sign-On"&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;When a developer joins or leaves the organization, SCIM ensures their Docker access is provisioned or revoked automatically. This closes the loop on the governance model — ensuring that the Foundation layer's image controls, the External Access layer's tool governance, and the Observability layer's audit trails all tie back to verified, managed identities.&lt;/p&gt;




&lt;h2&gt;
  
  
  Strategic Conclusion
&lt;/h2&gt;

&lt;p&gt;Composed together, these seven layers form a governed architecture for AI agent workflows: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Foundation&lt;/strong&gt; standardizes trusted images and limits unapproved sources (Docker Hardened Images + RAM/IAM)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Definition&lt;/strong&gt; makes agent behavior reproducible (cagent)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Inference&lt;/strong&gt; enables local-first model execution economics (Docker Model Runner + Remocal/MVM)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Execution&lt;/strong&gt; isolates autonomous work in microVM sandboxes&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;External Access&lt;/strong&gt; centralizes and governs tool use through &lt;strong&gt;MCP Gateway&lt;/strong&gt; (with curated servers via the Catalog)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Observability&lt;/strong&gt; combines supply-chain visibility (Docker Scout) with tool-call logs/traces (MCP Gateway)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Identity&lt;/strong&gt; (SSO/SCIM) supports consistent access and lifecycle control at scale.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Two additional Docker Business capabilities complement these layers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Build Acceleration&lt;/strong&gt; improves developer and CI throughput by offloading image builds to cloud infrastructure (Docker Build Cloud).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Standard Container Isolation&lt;/strong&gt; strengthens isolation for everyday (non-agent) containers using Linux user namespaces, reducing effective privileges and limiting blast radius (Enhanced Container Isolation / ECI).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The net effect is a path from unmanaged "Shadow AI" to a governed architecture that reduces developer friction, provides isolation and visibility at each layer, and gives platform teams the controls to enforce policy without slowing delivery.&lt;/p&gt;




&lt;h3&gt;
  
  
  How I Wrote This Article
&lt;/h3&gt;

&lt;p&gt;I spent a week of my free time studying Docker's recent AI-focused releases. It occurred to me that these offerings could be woven together to create a comprehensive ecosystem that solved a lot of the problems developers and enterprise teams are facing these days. &lt;/p&gt;

&lt;p&gt;I read documentation and used Gemini and Google's NotebookLM (audio overviews, slides, videos, chat) to build my understanding of each component. This was the conceptual work of finding the patterns, figuring out how these separate products compose into a layered architecture, and identifying the connections between them.&lt;/p&gt;

&lt;p&gt;Once I had found the common thread of how all these features could be woven into a comprehensive architecture, I used multiple different AI tools and my own writing and research skills to iteratively write and fact check this article. I finished off the process with one last manual overview.&lt;/p&gt;

</description>
      <category>docker</category>
      <category>security</category>
      <category>ai</category>
      <category>containers</category>
    </item>
    <item>
      <title>Building AI-Powered Projects: My Complete Claude Development Stack</title>
      <dc:creator>Alden Weaver</dc:creator>
      <pubDate>Tue, 11 Nov 2025 06:08:39 +0000</pubDate>
      <link>https://forem.com/aldenweaver/building-ai-powered-projects-my-complete-claude-development-stack-4903</link>
      <guid>https://forem.com/aldenweaver/building-ai-powered-projects-my-complete-claude-development-stack-4903</guid>
      <description>&lt;h2&gt;
  
  
  Tools at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Category&lt;/th&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Purpose&lt;/th&gt;
&lt;th&gt;Experience Level&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Planning&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Claude Projects&lt;/td&gt;
&lt;td&gt;Organize chats, PRDs, epics&lt;/td&gt;
&lt;td&gt;Beginner-friendly&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Research Mode&lt;/td&gt;
&lt;td&gt;Deep analysis &amp;amp; competitive research&lt;/td&gt;
&lt;td&gt;Beginner-friendly&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="https://github.com/bmad-code-org/BMAD-METHOD" rel="noopener noreferrer"&gt;B-Mad Method&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Structured agent-based development&lt;/td&gt;
&lt;td&gt;Intermediate&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Development&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Claude Code CLI&lt;/td&gt;
&lt;td&gt;Primary development interface&lt;/td&gt;
&lt;td&gt;Beginner-friendly&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Claude Code Browser&lt;/td&gt;
&lt;td&gt;Experimental parallel tasks&lt;/td&gt;
&lt;td&gt;Experimental&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Claude API&lt;/td&gt;
&lt;td&gt;AI-powered features&lt;/td&gt;
&lt;td&gt;Intermediate&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Parallel Dev&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Conductor&lt;/td&gt;
&lt;td&gt;Visual branch management&lt;/td&gt;
&lt;td&gt;Intermediate&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Git Worktrees&lt;/td&gt;
&lt;td&gt;Alternative parallel development&lt;/td&gt;
&lt;td&gt;Advanced&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Environment&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;VS Code&lt;/td&gt;
&lt;td&gt;IDE&lt;/td&gt;
&lt;td&gt;Beginner-friendly&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;GitHub Desktop&lt;/td&gt;
&lt;td&gt;Visual Git client&lt;/td&gt;
&lt;td&gt;Beginner-friendly&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;New to Claude Code?&lt;/strong&gt; Check out my beginner's guide to getting started with Claude Code &lt;em&gt;(coming soon!)&lt;/em&gt; for a step-by-step introduction to AI-assisted development.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;This post outlines my current toolkit for developing with Claude AI. As these technologies evolve rapidly, I'm committed to continuous learning and updating my stack.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Where This Stack Really Shines&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;While I can't share specifics about my proprietary enterprise work, this stack has proven invaluable for large-scale projects involving:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Multiple interconnected services and APIs&lt;/li&gt;
&lt;li&gt;Complex business logic requiring careful planning&lt;/li&gt;
&lt;li&gt;Teams collaborating on different features simultaneously&lt;/li&gt;
&lt;li&gt;Projects with 10+ epics and 50+ user stories&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The structured approach (B-Mad Method) combined with parallel development (Conductor) makes it possible to maintain velocity and quality even as projects scale.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  How I Wrote This Article
&lt;/h2&gt;

&lt;p&gt;I wrote the initial draft in my natural stream-of-consciousness style, outlining the tools I actually use. Then I asked Claude to refine. The core ideas and tools are mine—the polish and organization are collaborative.&lt;/p&gt;

&lt;h2&gt;
  
  
  Planning &amp;amp; Ideation
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Brainstorming with Claude Projects:&lt;/strong&gt; I use Claude AI's Projects feature extensively, which allows me to organize chats into folders with reusable project knowledge. I can upload files for context, view memory, and add custom instructions to refine responses. This is where I generate PRDs (Product Requirements Documents), epics, and stories.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deep Research:&lt;/strong&gt; When I need in-depth analysis—such as researching best practices or conducting competitive analysis—Claude's Research mode is invaluable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Large-Scale Projects:&lt;/strong&gt; For bigger projects, I use the &lt;a href="https://github.com/bmad-code-org/BMAD-METHOD" rel="noopener noreferrer"&gt;B-Mad Method&lt;/a&gt;, a comprehensive framework for agent-based development with Claude Code. From brainstorming through PRDs, epics, stories, development, and QA, there's a specialized agent for each phase. The workflows are well-documented, and you can adopt as many or as few components as your project needs. &lt;br&gt;
&lt;em&gt;UPDATE (11-16-25):&lt;/em&gt; There is also a quick spec flow for "Bug fixes, small features, rapid prototyping, and quick enhancements” - &lt;a href="https://github.com/bmad-code-org/BMAD-METHOD/blob/main/src/modules/bmm/docs/quick-spec-flow.md" rel="noopener noreferrer"&gt;BMad Quick Spec Flow&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Development with Claude
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Claude Code CLI:&lt;/strong&gt; My primary development interface.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Claude Code in Browser (Beta Research):&lt;/strong&gt; I'm experimenting with this for handling multiple concurrent development tasks. It's useful for working on different aspects of code simultaneously, though I'm still exploring its optimal use cases.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Claude API:&lt;/strong&gt; When building AI-powered features, I integrate the Claude API directly. Security best practice: store your API key as an environment variable, never in your codebase.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;@ Context Management:&lt;/strong&gt; The @ mention feature helps manage context by referencing specific files. Pro tip: I spent way too long copying and pasting file paths before I discovered this!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Custom &lt;code&gt;/&lt;/code&gt; Commands:&lt;/strong&gt; I create custom commands stored in a &lt;code&gt;.claude&lt;/code&gt; folder at my project root. (Note: if you're using the B-Mad Method, which also uses this folder for its agents, organize your custom commands in a separate subfolder for clarity.) Future goal: package my custom commands as an npm module!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj6hjyqdsb29ckncg1aq6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj6hjyqdsb29ckncg1aq6.png" alt="An example of one of my  raw `.claude` endraw  folders" width="164" height="158"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Parallel Development
&lt;/h2&gt;

&lt;p&gt;I've found parallel development most effective when epics and stories are planned with concurrency in mind. When working with Claude to generate project structure, I specifically request stories designed for parallel development.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My preferred approach: Conductor.&lt;/strong&gt; While Git worktrees are a viable alternative for parallel development, I prefer Conductor because it provides better visual tracking of concurrent branches. The main caveat: performance can degrade with too many active branches, though this will likely improve as the tool matures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Experimentation:&lt;/strong&gt; I'm also exploring Claude Code in Browser (Beta Research) for managing concurrent development tasks, though I haven't used it extensively enough to recommend it as a primary parallel development solution.&lt;/p&gt;

&lt;h2&gt;
  
  
  Development Environment
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;IDE:&lt;/strong&gt; Visual Studio Code&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Version Control:&lt;/strong&gt; GitHub Desktop (I can use CLI but appreciate a well-designed GUI)&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;What's your Claude Code stack?&lt;/strong&gt; Drop a comment below—I'd love to hear what tools and workflows you're using!&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;About the Author:&lt;/strong&gt; I'm a software engineer with 10+ years of experience, currently working on AI-powered SaaS platforms. I'm passionate about using technology for good and continuously learning new tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connect:&lt;/strong&gt; &lt;a href="https://www.linkedin.com/in/aldenweaver/" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt; | &lt;a href="https://github.com/aldenweaver" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt; | &lt;a href="https://aldenweaver.vercel.app/" rel="noopener noreferrer"&gt;Portfolio&lt;/a&gt;&lt;/p&gt;

</description>
      <category>claude</category>
      <category>claudecode</category>
      <category>ai</category>
      <category>productivity</category>
    </item>
  </channel>
</rss>
