RRepoGEO

REPOGEO REPORT · LITE

tailscale-dev/ScaleTail

Default branch main · commit c3ad6654 · scanned 5/14/2026, 12:58:23 PM

GitHub: 1,801 stars · 114 forks

AI VISIBILITY SCORE
35 /100
Critical
Category recall
0 / 2
Not recommended in any query
Rule findings
1 pass · 1 warn · 0 fail
Objective metadata checks
AI knows your name
3 / 3
Direct prompts that named your repo
HOW TO READ THIS REPORT

Action plan is what to do next — copy-pasteable changes prioritized by impact. Category visibility is the real GEO test: when a user asks an AI a brand-free question that should surface tailscale-dev/ScaleTail, does the AI actually recommend you — or your competitors? Objective checks verify the metadata signals AI engines weight first. Self-mention check detects whether AI even knows you exist by name.

Action plan — copy-paste fixes

3 prioritized changes generated by gemini-2.5-flash. Mark items done after you ship the fix.

OVERALL DIRECTION
  • highreadme#1
    Clarify README's opening statement to emphasize 'Docker sidecar for Tailscale'

    Why:

    CURRENT
    ScaleTail - Secure Self-Hosting Made Simple. ScaleTail provides ready-to-run Docker Compose stacks that instantly connect your self-hosted applications to your Tailnet. By using a Docker sidecar configuration, your applications get an URL with automatic HTTPS, for example: `https://application.tail-net.ts.net`.
    COPY-PASTE FIX
    ScaleTail: Ready-to-run Docker Compose stacks for secure self-hosting with Tailscale sidecar configurations. Instantly connect your self-hosted applications to your Tailnet, gaining automatic HTTPS via a Docker sidecar, e.g., `https://application.tail-net.ts.net`.
  • hightopics#2
    Add 'docker-sidecar' to the repository topics

    Why:

    CURRENT
    docker, docker-compose, dockercompose, hacktoberfest, self-hosted, sidecar, sidecar-container, sidecar-proxy, tailscale, tailscale-exit-node, tailscale-network, tailscale-proxy, zero-trust
    COPY-PASTE FIX
    docker, docker-compose, dockercompose, docker-sidecar, hacktoberfest, self-hosted, sidecar, sidecar-container, sidecar-proxy, tailscale, tailscale-exit-node, tailscale-network, tailscale-proxy, zero-trust
  • mediumreadme#3
    Add a prominent disclaimer about experimental status to the README

    Why:

    COPY-PASTE FIX
    ⚠️ **EXPERIMENTAL PROJECT:** ScaleTail is an experimental project, not a supported Tailscale product, and is not production-ready. It is not secure, not stable, not performant, not feature complete, and not easy to operate. Use at your own risk.

Category GEO backends resolved for this scan: google/gemini-2.5-flash, deepseek/deepseek-v4-flash

Category visibility — the real GEO test

Brand-free queries asked to google/gemini-2.5-flash. Did AI recommend you, or someone else?

Same questions for every model — switch tabs to compare answers and rankings.

Recall
0 / 2
0% of queries surface tailscale-dev/ScaleTail
Avg rank
Lower is better. #1 = top recommendation.
Share of voice
0%
Of all named tools, what % are you?
Top rival
Caddy
Recommended in 1 of 2 queries
COMPETITOR LEADERBOARD
  1. Caddy · recommended 1×
  2. Traefik Proxy · recommended 1×
  3. NGINX Proxy Manager · recommended 1×
  4. NGINX · recommended 1×
  5. HAProxy · recommended 1×
  • CATEGORY QUERY
    How to securely expose self-hosted Docker services with private network access?
    you: not recommended
    AI recommended (in order):
    1. Caddy
    2. Traefik Proxy
    3. NGINX Proxy Manager
    4. NGINX
    5. HAProxy
    6. Envoy Proxy
    7. Cloudflare Tunnel

    AI recommended 7 alternatives but never named tailscale-dev/ScaleTail. This is the gap to close.

    Show full AI answer
  • CATEGORY QUERY
    Seeking a Docker sidecar solution for secure private network integration of self-hosted apps.
    you: not recommended
    AI recommended (in order):
    1. Tailscale (tailscale/tailscale)
    2. OpenVPN (kylemanna/openvpn)
    3. WireGuard (linuxserver/wireguard)
    4. Netmaker (gravitl/netmaker)
    5. ZeroTier (zerotier/zerotier)

    AI recommended 5 alternatives but never named tailscale-dev/ScaleTail. This is the gap to close.

    Show full AI answer

Objective checks

Rule-based audits of metadata signals AI engines weight most.

  • Metadata completeness
    warn

    Suggestion:

  • README presence
    pass

Self-mention check

Does AI even know your repo exists when asked about it directly?

  • Compared to common alternatives in this category, what is the core differentiator of tailscale-dev/ScaleTail?
    pass
    AI named tailscale-dev/ScaleTail explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

  • If a team adopts tailscale-dev/ScaleTail in production, what risks or prerequisites should they evaluate first?
    pass
    AI named tailscale-dev/ScaleTail explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

  • In one sentence, what problem does the repo tailscale-dev/ScaleTail solve, and who is the primary audience?
    pass
    AI named tailscale-dev/ScaleTail explicitly

    AI answers can be confidently wrong. Read for accuracy: does it match your actual tech stack, audience, and differentiator?

Embed your GEO score

Drop this badge into the README of tailscale-dev/ScaleTail. It auto-updates whenever the report is rescanned and links back to the latest report — easy public proof that you care about AI discoverability.

RepoGEO badge previewLive preview
MARKDOWN (README)
[![RepoGEO](https://repogeo.com/badge/tailscale-dev/ScaleTail.svg)](https://repogeo.com/en/r/tailscale-dev/ScaleTail)
HTML
<a href="https://repogeo.com/en/r/tailscale-dev/ScaleTail"><img src="https://repogeo.com/badge/tailscale-dev/ScaleTail.svg" alt="RepoGEO" /></a>
Pro

Subscribe to Pro for deep diagnoses

tailscale-dev/ScaleTail — Lite scans stay free; this card itemizes Pro deep limits vs Lite.

  • Deep reports10 / month
  • Brand-free category queries5 vs 2 in Lite
  • Prioritized action items8 vs 3 in Lite