Root maintains a current SBOM for every artifact in its registries. SBOMs are updated automatically when Root Patches are applied and are available for download at any time.Documentation Index
Fetch the complete documentation index at: https://docs.root.io/llms.txt
Use this file to discover all available pages before exploring further.
SBOM Report Types
Root generates SBOMs at two levels: Per-image SBOM: A complete package inventory for a specific container image tag. Includes all OS packages, language runtimes, and installed application dependencies found in the image - both before and after Root Patches are applied. The post-patch SBOM reflects the current patched state. Per-package SBOM: For application packages onpkg.root.io, a component-level inventory of what’s in the patched package version.
Both types are updated every time a new Root Patch is applied to the artifact.
Accessing SBOMs
Via the Root platform UI:- Navigate to your subscribed image or package
- Click the SBOM button in the artifact panel
- The SBOM downloads directly to your browser
cosign or oras:
SBOM Formats
Root generates SBOMs in two industry-standard formats:| Format | Version | Use Case |
|---|---|---|
| CycloneDX | 1.5 | Preferred for vulnerability analysis tooling (Grype, Dependency-Track) |
| SPDX | 2.3 | Preferred for compliance and legal workflows |
rootio:patch_applied- indicates which Root Patch was applied to a componentrootio:original_version- the original vulnerable version before patchingrootio:avr_id- the AVR pipeline run that produced this SBOM
Continuous SBOM Updates
SBOMs are versioned - a new SBOM is generated each time Root applies a patch to an artifact. Detecting changes between versions: Each SBOM includes atimestamp field reflecting when it was generated. Compare SBOMs over time to track exactly which packages changed and when:
Integrating SBOMs with External Tools
Grype (vulnerability scanning):- In Dependency-Track, navigate to Projects → Import BOM
- Select your Root SBOM file (CycloneDX format)
- Dependency-Track automatically correlates components against its vulnerability database