Available Reports
| Report | Description |
|---|---|
| Vulnerability Reports | CVE coverage and patch status across all adopted images and packages |
| SBOM Reports | Current SBOMs for every artifact in your environment |
| VEX Reports | VEX statement coverage and scanner integration |
| Dashboard & Metrics | CVE backlog trends, MTTR, and patch coverage metrics |
Accessing Reports
Root platform UI: The dashboard and all report views are accessible from the Root platform atapp.root.io. Log in with your organization credentials. The left sidebar provides navigation to:
- Dashboard - fleet-wide metrics at a glance
- Vulnerabilities - full CVE table with filtering and export
- Reports - vulnerability reduction graphs and per-artifact views
- Subscriptions - per-image and per-package patch status
https://api.root.io/v1. Authenticate with a Bearer token:
| Format | Available From |
|---|---|
| CSV | Vulnerabilities page (UI export button) |
| JSON | API endpoints |
| CycloneDX / SPDX | SBOM and VEX download endpoints |
Integrating with Your Security Stack
Root reports are designed to integrate with existing security tooling: Vulnerability scanners (Grype, Trivy): Import Root SBOM and VEX files into your scanner to suppress findings for patched CVEs. See VEX Reports for scanner-specific instructions. ASPM platforms (Wiz, Orca, Snyk): Use VEX statements to update finding status in your ASPM. Root’s VEX marks patched CVEs asfixed, suppressing them from active alert queues.
SIEM (Splunk, Elastic):
Poll the Root API on a schedule to ingest patch events. Use the /patches endpoint filtered by updated_at to get incremental updates.
Dependency-Track:
Import Root SBOMs (CycloneDX format) directly into Dependency-Track projects for continuous monitoring and policy evaluation.
Ticketing (Jira, ServiceNow):
Use webhooks or API polling to automatically close vulnerability tickets when Root delivers a patch.