Openhands Kubernetes Remote Runtime

C+ 71 completed
Other
containerized / go · tiny
32
Files
5,974
LOC
0
Frameworks
3
Languages

Pipeline State

completed
Run ID
#396910
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Skipped
Decision
skip_scaffold_dup
Novelty
24.85
Framework unique
Isolation
Last stage change
2026-04-16 18:15:42
Deduplication group #47834
Member of a group with 1 similar repo(s) — canonical #110144 view group →
Top concepts (2)
Project DescriptionDevOps/Infrastructure
All rows scored by the Repobility analyzer (https://repobility.com)

AI Prompt

Create a Kubernetes-compatible runtime service for OpenHands. I need this service to provision sandbox pods for agent sessions, implementing the OpenHands Remote Runtime API contract and supporting Kubernetes 1.30+. Key features must include subdomain-based routing for agent server, VSCode, and worker ports, along with session management that supports pause/resume. Please ensure it handles automatic idle sandbox cleanup, uses API key authentication, and supports custom runtime classes like sysbox-runc or gvisor. The architecture should manage Pods, Services, and Ingress resources for exposing ports 60000, 60001, 12000, and 12001.
go kubernetes api runtime containerization k8s service golang yaml devops
Generated by gemma4:latest

Catalog Information

A Kubernetes-compatible runtime service for OpenHands that provisions sandbox pods for agent sessions. This service implements the OpenHands Remote Runtime API contract and supports Kubernetes versions 1.30+.

Description

A Kubernetes-compatible runtime service for OpenHands that provisions sandbox pods for agent sessions. This service implements the OpenHands Remote Runtime API contract and supports Kubernetes versions 1.30+.

Novelty

3/10

Tags

go kubernetes api runtime containerization k8s service golang yaml devops

Claude Models

claude-opus-4-6

Quality Score

C+
71.1/100
Structure
76
Code Quality
61
Documentation
60
Testing
65
Practices
80
Security
100
Dependencies
60

Strengths

  • CI/CD pipeline configured (github_actions)
  • Good test coverage (89% test-to-source ratio)
  • Code linting configured (golangci-lint)
  • Consistent naming conventions (snake_case)
  • Good security practices \u2014 no major issues detected
  • Containerized deployment (Docker)
  • Properly licensed project

Weaknesses

  • 413 duplicate lines detected \u2014 consider DRY refactoring
  • 2 'god files' with >500 LOC need decomposition

Recommendations

  • Add a test suite \u2014 start with critical path integration tests

Security & Health

5.8h
Tech Debt (C)
A
OWASP (100%)
PASS
Quality Gate
A
Risk (2)
Repobility · MCP-ready · https://repobility.com
MIT
License
2.7%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

go
77.9%
markdown
17.7%
yaml
4.4%

Frameworks

None detected

Concepts (2)

Generated by the Repobility scanner · https://repobility.com
CategoryNameDescriptionConfidence
All rows scored by the Repobility analyzer (https://repobility.com)
auto_descriptionProject Description![CI](https://github.com/zparnold/openhands-kubernetes-remote-runtime/actions/workflows/ci.yml) ![Go Report Card](https://goreportcard.com/report/github.com/zparnold/openhands-kubernetes-remote-runtime) ![codecov](https://codecov.io/gh/zparnold/openhands-kubernetes-remote-runtime)80%
auto_categoryDevOps/Infrastructuredevops-infra70%

Quality Timeline

1 quality score recorded.

View File Metrics

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/121273.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV