Skip to main content
Root Library Catalog (RLC) is a secure package registry at pkg.root.io. It mirrors the public package ecosystems your teams already use — PyPI, npm, Maven Central — and serves patched versions of vulnerable packages transparently. RLC works as a drop-in registry replacement. No dependency declarations change. No application code changes. You consume the same packages at the same versions; Root ensures they’re free of known vulnerabilities.

Supported Ecosystems

EcosystemPackage ManagersRegistry Endpoint
Pythonpip, uv, Poetrypkg.root.io/pypi/
JavaScriptnpm, pnpm, yarnpkg.root.io/npm/
JavaMaven, Gradlepkg.root.io/maven/
Additional ecosystems including Ruby, Go, and Rust are under evaluation. Email hello@root.io if these are important to your team.

How Patched Packages Are Delivered

RLC acts as a transparent proxy in front of the upstream registries. When you install a package through pkg.root.io:
  1. Root’s AVR pipeline has already scanned the package for known CVEs
  2. If a vulnerability exists and a fix is available, AVR applies a Root Patch and publishes the secured artifact at pkg.root.io
  3. Your package manager resolves and downloads the patched version — same name, same version string, no code changes required
  4. The patched artifact ships with an updated SBOM and VEX statement documenting what was fixed
For Python and Java, packages resolve transparently by version. For JavaScript, Root publishes patched packages under the @rootio/ scope and uses overrides/resolutions in package.json to redirect resolution — no import statement changes needed.

Registry Endpoints

EcosystemEndpointProtocol
Python (pip, uv, Poetry)https://pkg.root.io/pypi/simple/PEP 503 Simple Index
JavaScript (npm, pnpm, yarn)https://pkg.root.io/npm/npm registry protocol
Java (Maven)https://pkg.root.io/maven/Maven repository layout
All endpoints require authentication. See Authentication for credential setup, or jump to the ecosystem guide for your stack.

SBOM and VEX Coverage

Every patched package published to pkg.root.io includes:
  • SBOM — a machine-readable inventory of all components and their versions after patching, in SPDX or CycloneDX format
  • VEX statement — documents which CVEs were fixed in this artifact and asserts non-exploitability of any remaining known findings
  • Provenance attestation — cryptographic proof that the artifact was produced by Root’s AVR pipeline
These artifacts are available via the Root platform UI, the API, and as package metadata. They give your security team and auditors a complete record of what Root changed and why the fix can be trusted.

RLC vs. Standard Registries

PyPI / npm / Maven CentralRoot Library Catalog
Vulnerability countVaries — packages ship as releasedRoot Patches applied before delivery
Patching responsibilityYours — wait for upstream or upgradeRoot’s — automatic via AVR
Remediation SLANoneCritical: 7 days · High: 14 days · Medium: 60 days
Security artifactsNoneSBOM, VEX, Provenance per package
Version pinningRequired — upgrade to fix CVEsPreserved — same version, CVEs removed
Breaking changesPossible on upgradeNone — patch-in-place