Look, I’ve sat through twenty years of corporate security training, and I can tell you exactly how it goes: a well-meaning engineer creates a 47-slide deck on supply-chain vulnerabilities, nobody absorbs a single concept, and six months later your CI/CD pipeline still has the SBOM equivalent of a dumpster fire. So when Mohammad-Ali A’râbi, a Docker Captain, decided to tackle the Docker security workshops problem, he didn’t add more documentation or write better tests. He did something much weirder: he built the Asgard Arcade, a collection of utterly useless but technically obsessive card games disguised as DevSecOps training.
And honestly? This might be the most honest thing anyone’s built for security education in years.
Why Everyone Expected More Docs, Not Card Games
The Docker Commandos were already doing something unusual—a narrative-driven universe where ten elite security specialists fight CVE monsters in a dark fantasy setting called the Black Forest Shadow. Characters like Gord (representing docker init) and Jack (representing docker scout) journey from an 1865 Gothic nightmare to the futuristic Asgard, teaching real security concepts through immersive storytelling. Smart idea. Weird execution. People expected the next step would be, you know, more content. Better guides. Faster tutorials.
Instead? Arcade games.
Four of them, actually. Asgard Siege puts you in tactical defense mode where you deploy the right Commando to counter supply-chain threats like “The Hydra.” Mess up, and Asgard’s security level tanks. Blackjack with Jack is standard blackjack against the shadow villain Angra, except if you’re dealt the cyborg commando Jack, you get to peek at the dealer’s hidden card. Asgardian Jass is a full four-player Swiss trick-taking card game where the suits are Shields, Attestations, Hardened Images, and Signatures. And The Reference Deck is pure stat comparison—Power, Stealth, Legacy—each card a security concept.
The project is an “ultimate anti-value tool: it encourages developers to spend their Build Time playing cards with a cyborg cowboy instead of fixing their Dockerfile.”
Yeah. The builder admits it solves exactly zero real vulnerabilities.
The Actual Genius Here (and Yes, There Is Some)
What’s wild is that this probably does work better than dry security documentation—and that’s not actually crazy when you think about it. Memory research shows us that novelty, game mechanics, and narrative context stick in your brain. You’ll forget the SBOM slide in a security webinar. You’ll remember trying to figure out whether to deploy Gord or Jack against The Supply Chain Hydra. And when you later see “SBOM” in a real audit? Your brain has already tagged it to something: the Shield suit, the Attestation card, the whole weird Asgard universe.
That’s not nothing. That’s actually how humans learn complex, boring concepts—by wrapping them in something they’ll engage with voluntarily.
The technical stack is also overkill in the best way: Next.js 14, Tailwind CSS, Radix UI. A Jass engine with heuristic AI for your partner Evie and opponents (Angra and Jack the Miner) that handles trump logic, suit rules, and trick resolution. React state machines for managing the security level deterioration in Siege mode. Dynamic dealer logic for the “Zero-Day Exploit” variant of Blackjack. Someone spent real time making these games work, not just exist.
Here’s the thing that gets me: Gemini CLI built the entire arcade—UI, AI logic, all of it—based on a directive for “utterly useless” vision. A human gave an AI agent a weird, specific vision of security training through Scandinavian card games and dark fantasy character arcs, and the agent executed it flawlessly. That’s not just a technical flex. That’s a signal about how we’re going to be building tools in 2025.
But Let’s Be Honest About What This Really Is
This is a April Fools submission. The builder is explicit about that. The whole thing is technically over-engineered joke with a genuine kernel of pedagogy inside it. And sure, this will never replace serious security documentation or enterprise training programs. You still need the dry stuff. You still need the policy docs and the compliance checklists and the vulnerability assessments.
But—and this matters—most developers won’t read those unless they’re required to. They’ll skim them, miss the critical bits, and move on. A game? A game they might actually want to play. A game with a recurring world and characters they recognize? That changes the friction.
The real story here isn’t “Docker built arcade games for security.” It’s “we’re reaching the point where an AI agent can take your weird creative vision and ship production-quality interactive software in the time it used to take to write a tech spec.” A’râbi didn’t have to hand-code a Jass engine or build a state machine from scratch. He had a vision. The tool did the work.
That’s going to reshape how we think about specialized tools for specific communities. Why would a DevSecOps team build boring educational content when they could build engaging content with a fraction of the engineering effort?
Who Actually Benefits Here?
Docker, obviously. Free marketing disguised as a community contribution. A’râbi gets credit and engagement. The people playing the games get better retention of security concepts through novelty. The only person who loses is the person who built the previous security training, which is probably already five years out of date anyway.
You can play the arcade yourself at dockersecurity.io/commandos. The entire thing lives in the official DockerSecurity.io repository, which means it’s maintained, documented, and part of the ecosystem. That’s not a throwaway April Fools joke—that’s infrastructure.
The Uncomfortable Question
If an AI agent can build a fully-featured arcade suite with custom character art, game logic, and responsive design in the time it takes you to write documentation, what’s the future of specialized developer tools? Can they all be this engaging? Should they be? Or do we end up in a world where every onboarding experience is gamified into oblivion?
Maybe the real meta-joke isn’t that Docker built card games for security. Maybe it’s that this is the future of developer education, and we’re all pretending it’s still a prank.
🧬 Related Insights
- Read more: Why Your Kubernetes Cluster Can’t Save You From a Broken Database
- Read more: The AI Safety Checklist Nobody’s Actually Using
Frequently Asked Questions
What is Docker Asgard Arcade exactly? It’s a suite of four interactive card games—Blackjack, Swiss Jass, a tactical defense game, and a stat-comparison game—where the characters and mechanics teach Docker security concepts (SBOMs, supply-chain threats, provenance, vulnerability detection). You can play it directly at dockersecurity.io/commandos.
Will playing card games actually teach me Docker security? Sort of. The games encode real security metaphors (Shields = SBOMs, Signatures = attestations). The novelty and engagement will help you remember concepts better than reading docs. But they won’t replace hands-on security training or policy documentation—they’re a supplement, not a replacement.
Did a human actually build this or did an AI do it? Both. A Docker Captain (Mohammad-Ali A’râbi) had the weird creative vision and submitted it. Gemini CLI (an AI agent) wrote all the code, game logic, UI, and the blog post itself. The human provided the “utterly useless” direction; the AI executed the over-engineering.
Can I use these games in my own training programs? The code lives in the official DockerSecurity.io repository, so it’s publicly available. Whether your organization can integrate it depends on your setup and the license, but it’s designed as community infrastructure, not a proprietary tool.