SBOM Report Types
Root generates SBOMs at two levels: Per-image SBOM: A complete package inventory for a specific container image tag. Includes all OS packages, language runtimes, and installed application dependencies found in the image - both before and after Root Patches are applied. The post-patch SBOM reflects the current patched state. Per-package SBOM: For application packages onpkg.root.io, a component-level inventory of what’s in the patched package version.
Both types are updated every time a new Root Patch is applied to the artifact.
Accessing SBOMs
Via the Root platform UI:- Navigate to your subscribed image or package
- Click the SBOM button in the artifact panel
- The SBOM downloads directly to your browser
cosign or oras:
SBOM Formats
Root generates SBOMs in two industry-standard formats:| Format | Version | Use Case |
|---|---|---|
| CycloneDX | 1.5 | Preferred for vulnerability analysis tooling (Grype, Dependency-Track) |
| SPDX | 2.3 | Preferred for compliance and legal workflows |
rootio:patch_applied- indicates which Root Patch was applied to a componentrootio:original_version- the original vulnerable version before patchingrootio:avr_id- the AVR pipeline run that produced this SBOM
Continuous SBOM Updates
SBOMs are versioned - a new SBOM is generated each time Root applies a patch to an artifact. Detecting changes between versions: Each SBOM includes atimestamp field reflecting when it was generated. Compare SBOMs over time to track exactly which packages changed and when:
Integrating SBOMs with External Tools
Grype (vulnerability scanning):- In Dependency-Track, navigate to Projects → Import BOM
- Select your Root SBOM file (CycloneDX format)
- Dependency-Track automatically correlates components against its vulnerability database