Secure by default
Secure by default
Secure by default
Security That Fixes Itself
Stop shifting left. Shift Out. Root’s agentic AI hunts, patches, and proves every fix — automatically, without slowing devs down.
Why Root
Why Root
Why Root
Speed of Development
Root fixes vulnerabilities in minutes — not sprints.
Zero workflow disruption or dependency drift.
~180 seconds
From vulnerability detection to patched image
~180 seconds
From vulnerability detection to patched image
~180 seconds
From vulnerability detection to patched image
5 min
To get everything up and running!
5 min
To get everything up and running!
5 min
To get everything up and running!
100%
Compatible with your existing registry and CI/CD stack
100%
Compatible with your existing registry and CI/CD stack
100%
Compatible with your existing registry and CI/CD stack
Infinite
Image variants supported — any OS, any tag
Infinite
Image variants supported — any OS, any tag
Infinite
Image variants supported — any OS, any tag
0
Zero workflow disruption
0
Zero workflow disruption
0
Zero workflow disruption
90% faster
Than traditional vulnerability management tools
90% faster
Than traditional vulnerability management tools
90% faster
Than traditional vulnerability management tools
FAQ
FAQ
FAQ
Frequently Asked Questions
Find quick answers to the most common questions about Root’s features, security, and setup.
What makes Root different from other security solutions?
Root fixes, not just scans. Unlike vendors that force upgrades or rebasing, Root patches vulnerabilities in place — across both base images and application dependencies — while preserving your existing versions and workflows. Every fix includes provenance, attestation, SBOM (CycloneDX), and VEX for full auditability
What container images does Root support?
Root supports all major Linux distributions and runtimes — Alpine, Debian, Ubuntu, Python, Node, Go, .NET, and more. The Root Image Catalog (RIC) continuously remediates over 2,000 base images from source with a 30-day Standard SLA (or 7-day Enhanced) and 180-second average fix time
How do I use or buy Root images?
Start free at images.root.io to pull from 500+ continuously remediated images, or choose a paid tier for enterprise coverage.
What's your SLA for vulnerability remediation?
30-day (Standard) or 7-day (Enhanced) for registries; Libraries deliver 1–25+ fixes/week, prioritized by severity.
Do you support enterprise compliance?
Yes. Every Root artifact includes attestation, provenance, SBOM (CycloneDX), VEX, and malware scans. Enhanced tiers add FIPS 140-2/3 compliance and SOC 2, FedRAMP, PCI DSS, and CMMC alignment.
Can I try before purchasing?
Yes. Browse 500+ zero-CVE images free, or request a Proof of Value to see Root remediate your own libraries within a week — complete with before/after CVE reports and full attestation proof.
What makes Root different from other security solutions?
Root fixes, not just scans. Unlike vendors that force upgrades or rebasing, Root patches vulnerabilities in place — across both base images and application dependencies — while preserving your existing versions and workflows. Every fix includes provenance, attestation, SBOM (CycloneDX), and VEX for full auditability
What container images does Root support?
Root supports all major Linux distributions and runtimes — Alpine, Debian, Ubuntu, Python, Node, Go, .NET, and more. The Root Image Catalog (RIC) continuously remediates over 2,000 base images from source with a 30-day Standard SLA (or 7-day Enhanced) and 180-second average fix time
How do I use or buy Root images?
Start free at images.root.io to pull from 500+ continuously remediated images, or choose a paid tier for enterprise coverage.
What's your SLA for vulnerability remediation?
30-day (Standard) or 7-day (Enhanced) for registries; Libraries deliver 1–25+ fixes/week, prioritized by severity.
Do you support enterprise compliance?
Yes. Every Root artifact includes attestation, provenance, SBOM (CycloneDX), VEX, and malware scans. Enhanced tiers add FIPS 140-2/3 compliance and SOC 2, FedRAMP, PCI DSS, and CMMC alignment.
Can I try before purchasing?
Yes. Browse 500+ zero-CVE images free, or request a Proof of Value to see Root remediate your own libraries within a week — complete with before/after CVE reports and full attestation proof.
What makes Root different from other security solutions?
Root fixes, not just scans. Unlike vendors that force upgrades or rebasing, Root patches vulnerabilities in place — across both base images and application dependencies — while preserving your existing versions and workflows. Every fix includes provenance, attestation, SBOM (CycloneDX), and VEX for full auditability
What container images does Root support?
Root supports all major Linux distributions and runtimes — Alpine, Debian, Ubuntu, Python, Node, Go, .NET, and more. The Root Image Catalog (RIC) continuously remediates over 2,000 base images from source with a 30-day Standard SLA (or 7-day Enhanced) and 180-second average fix time
How do I use or buy Root images?
Start free at images.root.io to pull from 500+ continuously remediated images, or choose a paid tier for enterprise coverage.
What's your SLA for vulnerability remediation?
30-day (Standard) or 7-day (Enhanced) for registries; Libraries deliver 1–25+ fixes/week, prioritized by severity.
Do you support enterprise compliance?
Yes. Every Root artifact includes attestation, provenance, SBOM (CycloneDX), VEX, and malware scans. Enhanced tiers add FIPS 140-2/3 compliance and SOC 2, FedRAMP, PCI DSS, and CMMC alignment.
Can I try before purchasing?
Yes. Browse 500+ zero-CVE images free, or request a Proof of Value to see Root remediate your own libraries within a week — complete with before/after CVE reports and full attestation proof.





