Overview
Open source is the foundation of modern software. It is also the fastest-growing attack surface in the world.
In March 2026, five major supply chain attacks landed in 12 days. Trivy, the vulnerability scanner trusted by thousands of organizations, was weaponized to exfiltrate CI/CD secrets. Axios, with 100M+ weekly downloads, was compromised by a North Korean state actor who deployed cross-platform RATs through a single hidden dependency. LiteLLM was poisoned on PyPI. The malicious packages were live for hours before removal. Hours is all it takes.
The problem is accelerating. AI coding agents now pull dependencies at machine speed with no human review. Every docker pull, every npm install, every pip install that an agent executes expands your attack surface. Agents trust the registry. They pull latest. They don't check provenance.
Root is the security boundary between upstream open source and your build environment.
The Root OSS Security Platform continuously monitors, patches, tests, and delivers hardened versions of the open source images and libraries your applications depend on. Every artifact is rebuilt from source with full provenance. No unknown binaries. No hidden malware. No unpatched vulnerabilities in your builds.
WHAT'S INCLUDED
Hardened Container Images: Continuously remediated base OS images built on Debian, Ubuntu, and Alpine, plus official runtimes for Python, Node, Java, and more. Full version history spanning 3-5 years. Just change FROM ubuntu:22.04 to FROM cr.root.io/ubuntu:22.04.
Patched Application Dependencies: Remediated library versions across JavaScript (npm), Python (PyPI), and Java (Maven). Root resolves vulnerable dependencies in place through targeted backports, without forcing major version upgrades or breaking your dependency tree.
Compliance Artifacts: Every artifact ships with SBOM (CycloneDX), VEX documentation, and attestation. Audit-ready proof for SOC 2, FedRAMP, and FIPS 140-2/3.
Coverage is continuously expanding across new base OS distributions and language ecosystems.
WHY ROOT
Scanners find problems. Root fixes them. When Trivy itself was compromised in March 2026, Root's hardened artifacts remained unaffected. We rebuild from source with independent verification.
Shift Out, not Shift Left. Root remediates outside your developer workflow so teams ship features instead of chasing vulnerability backlogs.
Built from Source, Every Time. No opaque binaries. No trust-me patches. Complete provenance from source to registry.
Zero Breaking Changes. If it worked on the official upstream version, it works on Root's version. Every patch is tested against CVE-specific and functional test suites before delivery.
HOW IT WORKS
- RESEARCH: Root's agents continuously monitor CVE advisories, upstream commits, exploits, and security disclosures on the projects you care about.
- PATCH: Apply the smallest safe fix. Upgrade if possible. Backport if not. No forced migrations.
- TEST: Package tests, functional tests, and CVE-specific regression tests.
- DELIVER: Deliver the hardened artifact into your registry with full provenance.
INTEGRATION
Works with AWS ECR, Docker Hub, GCR/GAR, GitLab and more. No pipeline disruption. Native CI/CD integration. Compatible with Trivy, Grype, Aikido, and all major scanners.
Additional flexible integration point at your IDE, Agents and beyond.
COMPLIANCE
SOC 2 Type 2 certified. SLSA Level 3 verified. FIPS 140-2/3 ready. FedRAMP ready.
PRICING
Three tiers. All require 12-month term, billed monthly. Essentials: start securing your open source today with catalog access and reasonable-effort remediation. Professional: contractual SLAs, expanded coverage, and catalog request entitlements. Enterprise: unlimited coverage, 7-day Critical/High SLA, service credits, FIPS, and FedRAMP.
Highlights
- Hardened open source, rebuilt from source. Continuously remediated container images and application dependencies with full SBOM, VEX, and attestation. Change one line in your Dockerfile or dependency manifest. Root handles the rest.
- Scanners find problems. Root fixes them. Eliminate 60-70% of CVE noise from your scanners. Reclaim 20-30% of developer sprint capacity. When Trivy was compromised in March 2026, Root's images remained clean because we rebuild from source with independent verification.
- Built for the agentic era. AI coding agents pull dependencies at machine speed without checking provenance. Root gives agents a verified source of truth. Point your builds at Root's registries and every artifact is already hardened. SOC 2, SLSA Level 3, FIPS 140-2/3, and FedRAMP ready.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
Root AVR - Single Image (Debian) | Automated Vulnerability Remediation (AVR) on Debian Bookworm. Basic support only for the term. Upgradable via private offer. | $3,950.00 |
Root AVR - Single Image (Ubuntu) | Automated Vulnerability Remediation (AVR) on Ubuntu 24.10, 24.04, 22.04, 20.04. Basic support only for the term. Upgradable via private offer. | $3,950.00 |
Root AVR - Single Image (Alpine) | Automated Vulnerability Remediation (AVR) on Alpine 3.15, 3.16, 3.17, 3.18, 3.19, 3.20, 3.21. Basic support only for the term. Upgradable via private offer. | $3,950.00 |
Root AVR - Single Image (ElasticSearch) | Automated Vulnerability Remediation (AVR) on ElasticSearch - Ubuntu. Basic support only for the term. Upgradable via private offer. | $3,950.00 |
Root AVR - Single Image (Node) | Automated Vulnerability Remediation (AVR) on Node - Debian. Basic support only for the term. Upgradable via private offer. | $3,950.00 |
Vendor refund policy
All fees are non-cancellable and non-refundable except as required by law.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Support varies by tier:
Essentials: Community documentation and email support at hello@root.io . Self-service onboarding guides, Dockerfile change instructions, and registry configuration walkthroughs available at https://docs.root.io/ .
Professional: Business-hours support via dedicated Slack channel with Root engineering. Priority email response. Onboarding assistance for registry integration and CI/CD pipeline configuration.
Enterprise: 24/7 support with a named Customer Success Manager. Dedicated Slack channel. Priority escalation for remediation and catalog requests. Custom onboarding for air-gapped and FedRAMP environments.
All tiers include access to Root's documentation at https://docs.root.io/ for setup guides, API references, and FAQs.
For pre-sales questions or to discuss which tier is right for your organization, contact us at hello@root.io .
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
