Product

Resources

Company

Try Root Free

Trivy. KICS. LiteLLM. Axios. Your dependencies are being weaponized.

Root secures your stack before the next poisoned update lands. Sign up free.
Try Root free

Glasswing patches are here.

TeamPCP pushed two poisoned versions to PyPI on March 24.
If 1.82.7 or 1.82.8 is in your environment, it already fired.

Thousands of
AI-discovered vulnerabilities.
Patched on your versions.

TeamPCP pushed two poisoned versions to PyPI on March 24.
If 1.82.7 or 1.82.8 is in your environment, it already fired.

Glasswing is releasing critical patches for AI-discovered vulnerabilities. Root backports them to your pinned versions, no upgrades required.

TeamPCP pushed two poisoned versions to PyPI on March 24.
If 1.82.7 or 1.82.8 is in your environment, it already fired.

New Threat Advisory

Glasswing CVEs are here.
The fix path? Upgrade everything.

Glasswing has uncovered thousands of critical vulnerabilities across every major OS, browser, and open-source library. The patches are landing — but for most of them, the standard remediation path means upgrading to the latest version. Across dozens of dependencies. All at once.

Root backports Glasswing patches to your pinned versions. No upgrades required.

The upgrade trap

Two types of teams right now.

Chasing :latest

Upgrading across 40+ vendors at once.

The standard fix path for most Glasswing CVEs means upgrading to the latest version. You're racing to upgrade dozens of dependencies simultaneously — breaking changes, regression testing, weeks of engineering time. And every patch you ship becomes an exploit blueprint the moment it drops.

Root patches your current version.

Staying pinned

Sitting on known Glasswing CVEs.

You can't upgrade fast enough, so you wait. Meanwhile AI-discovered vulnerabilities sit unpatched in your stack. Time-to-exploit has collapsed to under a day. Scanners flag what you already know, but the upgrade path means breaking things.

Root backports the fix to your pinned version.

Now add AI agents pulling dependencies without checking advisories. Attack surface scales with agent count.

Root is the third option. Glasswing patches, backported to every version you run.

Three steps to safe

Sign up. Point. Patched.

1

Connect your repos

Root inventories every dependency across npm, PyPI, Maven, Go, and 8+ ecosystems.

2

Glasswing CVEs mapped

Every Glasswing vulnerability identified. Every affected package flagged. Nothing missed.

3

Patched. Same version.

Root backports the fix to your pinned version. Not a fork. Not a wrapper. The real thing.

Package

Version

Ecosystem

 

CVEs

Status

openssl

1.1.1w

system

GW-2026-0847

libxml2

2.9.14

system

GW-2026-1203

express

4.18.2

npm

GW-2026-0419

jackson-databind

2.14.2

Maven

GW-2026-0563

pillow

9.5.0

PyPI

GW-2026-0981

Waiting to connect...

Why Root
Fixed open source. Not forked.
We backport security fixes to your pinned versions. Same API. Same functionality. The vulnerability is gone. The dependency is real.
We were sitting on 150 open CVEs with no clean path to fix them. Root patched our pinned versions in place — no upgrades, no breaking changes. What used to eat sprint cycles now runs on autopilot, and our HITRUST posture has never been stronger.
BP
Brendan Putek
Relay Networks

Leading engineering teams trust Root

VERIFIED & COMPLIANT
AICPA SOCDocker Verified PublisherSLSA Level 2
INDUSTRY RECOGNITION
Cyber Security Excellence Awards 2026 WinnerIT-Harvest Cyber 150 Fast Growth Vendor 2026

Glasswing patches are here.
Root backports them.

No upgrades. No breakage.

Try Root free
Talk to a real human