Skip to main content
The dashboard is the first screen after login. It provides a live view of Root’s agentic work across your environment, combining real-time pipeline activity with cumulative protection metrics.

Agentic Factory

The top of the dashboard shows the Agentic Factory — a live visualization of Root’s remediation pipeline operating on your organization’s security findings. A badge in the top right shows how many findings Root is actively working on (e.g., “Actively working on 553 Security Findings”).

Current Factory Work

The Current Factory Work panel displays findings flowing through each stage of the pipeline:
StageDescriptionScope
DetectedNew security findings discoveredPast 24 hours
ResearchingAgent researching for potential fix candidatesAll current
Creating a PatchApplicable fix candidate found — creating the patchAll current
Patch is AvailablePatch is ready, hasn’t yet been applied on the assetAll current
FixedFindings resolvedPast 24 hours
Each stage card shows the count and lists individual CVEs with their severity. The Detected and Fixed stages are scoped to the past 24 hours; the three middle stages show all findings currently in that status.

Security findings — Detected and Fixed (Last 7 Days)

Below the factory, two summary cards show 7-day trends:
  • Detected — count of new findings with a severity breakdown (Critical, High, Medium) and a sparkline trend chart
  • Fixed — count of resolved findings with a sparkline trend chart, plus verification steps completed: “Patch Fully Tested”, “Merge Request Created”, “Validated and Approved by a Human”

Protection Overview

The Protection Overview section shows cumulative metrics across your organization. A badge in the top right displays the overall protection percentage (e.g., “Protection: 96% Findings Resolved”).

Summary panels

PanelWhat it shows
Total DetectedTotal security findings discovered across all subscribed images and libraries, with Critical/High/Medium breakdown
Total FixedTotal findings Root has remediated, with Critical/High/Medium breakdown
Total Monitored LibrariesCount of libraries secured by Root
Total Monitored ImagesCount of container images secured by Root

Security Findings Detected vs. Fixed Over Time

A line chart plots the cumulative count of detected findings and fixed findings over time, showing how remediation keeps pace with discovery.

Recent Security Findings Updates

A tabbed feed showing the most recent findings across four status tabs:
TabWhat it shows
FixedRecently resolved CVEs with package name, version, and severity
Patch is AvailableCVEs where Root has a patch ready
Creating a PatchCVEs where Root’s agents are generating a fix
ResearchingCVEs where Root’s agents are investigating fix candidates
Each entry includes the CVE ID, affected package and version, severity score, and a CVE Details button that links to the CVE Details page.

Complete Autonomous Protection

A gauge showing the percentage of actionable security findings that Root has resolved. When protection is high (e.g., 96%), the panel displays: “Root has everything under control. Root has resolved 96% of all actionable security findings in your environment — every backport patched, fully tested, and delivered as a validated merge request.”

Security Findings page

The Security Findings page (accessible from the sidebar) lists every vulnerability across your subscribed images and discovered packages.
This page may still appear as “Vulnerabilities” in parts of the sidebar while the rename rolls out.

Status tabs

TabMeaning
FixedRoot has applied a patch — the vulnerability is resolved
Working on a PatchRoot’s agents are actively researching or generating a fix
No Fix AvailableNo upstream fix exists; Root is monitoring

Group by CVE

A single CVE can affect multiple assets — the same package across several images, plus libraries your organization uses. Use the Group by CVE option to see the total impact and scope of each vulnerability across your environment, rather than viewing each affected asset as a separate row.

Medium vulnerabilities toggle

A global Medium vulns toggle controls whether Medium-severity findings appear in dashboard charts, the inventory vulnerability reduction column, and reports. Medium vulnerabilities are shown by default.

Filtering

Filter the security findings table by:
  • Search — package name or CVE ID
  • Ecosystem — PyPI, APK, APT, npm, Maven
  • Severity — Critical, High, Medium, Low, Unknown
  • Status tab — Fixed / Working on a Patch / No Fix Available
Filters combine. For example: High-severity PyPI packages currently being worked on.

SLA targets

Root defines two SLA tiers. Standard is included with all paid subscriptions; Enhanced is available at additional charge per Order Form. Standard SLA:
SeverityTimelineCISA KEV
Critical30 calendar days72 hours
High30 calendar days72 hours
Medium60 calendar days
LowCommercially reasonable
Enhanced SLA:
SeverityTimelineCISA KEV
Critical7 calendar days48 hours
High14 calendar days48 hours
Medium30 calendar days
LowCommercially reasonable
SLA timelines begin when both a CVE is published in a recognized vulnerability database and a Fix Candidate is available in the ecosystem. For full details including exclusions, surge conditions, and escalation to Root Labs, see Root’s Service Level Agreement.

Exporting metrics

CSV export: From the Security Findings page, use the export button to download the current filtered view as CSV. The export includes CVE ID, severity, CVSS score, package, ecosystem, OS, SLA status, and fix date. API access: All dashboard data is available via the Root API for integration with BI tools, dashboards, and SIEM:
# Get all fixed CVEs for your organization
curl -H "Authorization: Bearer $ROOT_TOKEN" \
  "https://api.root.io/v1/patches?ticket_statuses=done&order=updated_at:desc"

# Get CVEs currently being worked on
curl -H "Authorization: Bearer $ROOT_TOKEN" \
  "https://api.root.io/v1/patches?ticket_statuses=open,in_progress"

# Get subscribed images with patch metadata
curl -H "Authorization: Bearer $ROOT_TOKEN" \
  "https://api.root.io/v1/subscriptions/"
Webhook notifications: Root can push patch delivery events to a webhook endpoint, enabling real-time updates in Slack, PagerDuty, Jira, or your SIEM. See Webhook Notifications for configuration. The app sidebar provides access to:
  • Dashboard — this page
  • Security Findings — the full CVE table with filtering
  • Libraries — Library Catalog and My Library
  • Images — Image Catalog and My Images
  • Patcher Flow — the Agentic Patching visualization
  • Settings — organization and account settings
  • Invite Teammates — add team members to your organization
  • Documentation — links to docs.root.io
  • Get Help — contact Root support