Blog

Blog

Blog

How Root Patches Actually Work

John Amaral

CTO, Co-Founder

Published :

Aug 7, 2025

I get asked this question almost daily: "John, how do Root patches actually work? And how are they different from everything else out there?"

It's a fair question. When I tell engineers that Root patches show up directly in their Trivy or Aikido scan results, I usually get a look that says "wait, how is that even possible?" followed by "and why should I trust patches I didn't write myself?"

Both reactions make sense. As the person who architected this system, let me walk you through what we built and the technical decisions behind it.

The engineering problem that drove our architecture

Before Root, I spent years watching engineering teams get stuck in the same vulnerability remediation cycle. Your scanner finds CVEs, hands you a list of CVE numbers, and then... you're on your own.

What follows is painful: googling CVE descriptions, digging through NIST databases, trying to understand upstream patches, testing fixes across different environments, and hoping you didn't break something critical. This process can take weeks per vulnerability.

From an engineering perspective, this was completely backwards. We had sophisticated systems for detecting problems, but fixing them was still manual, error-prone, and incredibly time-intensive.

I knew there had to be a better way to architect vulnerability remediation.

Our architectural approach: Patches as a service

The core technical insight behind Root was this: what if we treated vulnerability patches like any other infrastructure service? Instead of every team doing the same research and testing work, what if we centralized that expertise and made it available through APIs?

That's exactly what we built. When a CVE gets published, our system immediately ingests it and begins automated analysis. But unlike traditional approaches that rely purely on automation, we combine machine analysis with human security expertise to create what we call "surgical patches."

Here's the technical workflow:

  • CVE Ingestion & Analysis: Our system monitors multiple vulnerability feeds and immediately begins technical analysis when new CVEs are published. We parse the technical details, map affected code paths, and identify the minimal remediation approach.

  • Patch Development: This is where human expertise becomes crucial. Our security engineers analyze the specific vulnerability, understand the technical requirements for remediation, and develop targeted fixes. We're not doing broad container rebuilds here. We're making surgical changes that address the specific security issue.

  • Validation Pipeline: Every patch goes through automated testing across multiple environments, configurations, and use cases. We validate that the patch eliminates the vulnerability without breaking functionality.

  • Distribution Integration: Once validated, patches are distributed through our partner integrations that show up directly in scanner results where engineers are already looking.

The technical architecture of surgical patching

This is where our approach differs fundamentally from alternatives like Chainguard or Docker's hardened images.

Traditional approaches rebuild entire containers from minimal base images. From an engineering perspective, this creates several problems:

  • You lose custom configurations and optimizations

  • Extensive testing is required for each rebuild

  • There's significant risk of breaking application functionality

  • The rebuild process is slow and resource-intensive

Root's surgical patching takes a different approach. Instead of rebuilding everything, we identify exactly what needs to change and make only those changes.

Technical Implementation: When we encounter a vulnerability in, say, OpenSSL within a Node.js container, we don't rebuild the entire Node.js stack. Instead, we:

  1. Analyze the specific vulnerability - understanding exactly which OpenSSL functions are affected

  2. Identify minimal remediation - determining the smallest change that eliminates the security risk

  3. Preserve existing functionality - ensuring custom configurations, performance optimizations, and dependencies remain intact

  4. Generate targeted patch - creating a surgical fix that updates only the vulnerable components

The result is a patch that fixes the security issue in minutes rather than a rebuild process that takes weeks.

Integration architecture: Patches in existing workflows

One of our key architectural decisions was to integrate with existing tools rather than requiring new ones. This meant building APIs and integrations that work with scanners teams are already using.

Scanner Integration Design: Our integration architecture allows Root patches to appear directly in scan results. When you run a Trivy scan, you'll see:

Package: openssl
Version: 1.1.1f
Vulnerability: CVE-2024-0727
Severity: Critical
Root Patch: Validated fix available
Apply: root patch apply CVE-2024-0727

API Architecture: Under the hood, this works through APIs that integrate with scanner databases. When scanners query vulnerability information, they also receive Root patch availability data. The scanner presents this information in its native interface, making patch application feel like a natural part of the existing workflow.

Registry Integration: Once patches are applied, updated containers are pushed to existing registries using standard container protocols. No specialized infrastructure required.

Quality engineering: How we ensure patch reliability

The biggest technical challenge we faced was ensuring patch quality. If we're going to show up in scanner results saying "apply this patch," it absolutely has to work.

Multi-Environment Testing: Every patch is automatically tested across different base images (Alpine, Ubuntu, Debian) and different application configurations and dependencies

Automated Validation Pipeline: Our CI/CD pipeline runs extensive validation:

# Simplified version of our validation process
for patch in new_patches:
    run_security_validation(patch)  # Confirms CVE is fixed
    run_functionality_tests(patch)  # Ensures app still works
    run_performance_benchmarks(patch)  # Validates no degradation
    run_compatibility_matrix(patch)  # Tests across environments

Rollback Mechanisms: Every patch includes automated rollback capabilities. If something goes wrong, systems can automatically revert to the previous state.

The results speak for themselves: 99.9% success rate across thousands of patch deployments in customer environments.

Real-world performance and impact

From a technical perspective, the performance improvements are significant:

Speed Metrics:

  • Traditional remediation: 2-6 weeks average

  • Root patch application: 2-10 minutes average

  • 95%+ reduction in remediation time

Resource Efficiency:

  • Surgical patches: ~50MB typical storage overhead

  • Container rebuilds: 200-500MB typical storage overhead

  • 75%+ reduction in storage and bandwidth requirements

Engineering Impact: Our customers report reclaiming 200+ engineering hours per quarter that were previously spent on manual vulnerability research and testing.

Technical roadmap and future architecture

We're continuously expanding our technical capabilities:

  • Enhanced Patch Types: Beyond library updates, we're developing patches for configuration vulnerabilities, application-level security issues, and infrastructure misconfigurations.

  • Broader Integration Coverage: Additional scanner integrations launching throughout 2025, including native support for more CI/CD platforms and security orchestration tools.

  • Advanced Automation: Machine learning models to predict patch compatibility and automatically optimize testing processes.

  • Performance Optimization: Continued work on reducing patch application time and improving resource efficiency.

Getting technical with Root

If you want to understand how this works in practice, I'd recommend starting with Root Community. It's free for up to 3 containers and lets you see exactly how patches appear in your scanner results and integrate with your existing workflows.

For a deeper technical discussion, I'm always happy to walk through the architecture in detail. Book a demo if you want to dive into the technical implementation or discuss how Root patches would integrate with your specific environment.

The technical challenges we've solved around reliable, automated vulnerability remediation are complex, but the end result should feel simple: vulnerabilities get fixed quickly and safely, without disrupting your development workflow.

That's good engineering.

Want to discuss the technical details? Connect with me on LinkedIn or reach out directly.

Trusted by businesses who can't afford slowing down

Ready to transform your container security?

From vulnerability detection to patched images in ~180 seconds.