Secure Container Images
Switch base images to
cr.root.io for zero-CVE containers.Secure Packages
Point pip, npm, Maven, or other package managers at
pkg.root.io.Secure Container Images
Root Image Catalog (RIC) provides drop-in replacements for standard base images — same tags, pre-patched.1. Get access
Contact root.io to receive your registry credentials forcr.root.io.
2. Authenticate
3. Update your Dockerfile
Replace your base image reference. Tags, APIs, and behavior are identical.4. Verify patch coverage
Every image from
cr.root.io ships with an updated SBOM and VEX statements. See Supported Images for the full list.Secure Application Packages
Root Library Catalog (RLC) provides a secure package registry atpkg.root.io for Python, JavaScript, and Java ecosystems.
1. Get access
Contact root.io to receive your registry credentials forpkg.root.io.
2. Configure your package manager
- pip
- uv
- npm
- Maven
3. Install packages as usual
For Python, install from yourrequirements.txt or add packages directly — Root resolves and serves patched versions transparently:
@rootio/ scope and applied via overrides in package.json. See the JavaScript guide for details.
What happens next
Once configured, Root’s AVR agents continuously monitor every package you consume. When a new CVE is published:Research
AVR collects advisories, upstream commits, exploit details, and affected versions to build the full picture before touching any code.
Patch
Agents apply the smallest safe fix — backporting patches when possible, applying native distribution package upgrades when not.
Test
Package tests, functional tests, and CVE-specific tests run automatically to ensure the patch works and nothing else breaks.