Root Library Catalog (RLC)

Get all your open source clean of vulnerabilities, secured by default. No engineering required. Root patches your application dependencies—npm, PyPI, Maven, Go, and more—in place at your pinned versions, eliminating CVEs without forcing upgrades or breaking your builds.

*Libraries requires an active Root Image Catalog (RIC) subscription or equivalent base image support.

Root Library Catalog (RLC)

Get all your open source clean of vulnerabilities, secured by default. No engineering required. Root patches your application dependencies—npm, PyPI, Maven, Go, and more—in place at your pinned versions, eliminating CVEs without forcing upgrades or breaking your builds.

*Libraries requires an active Root Image Catalog (RIC) subscription or equivalent base image support.

Root Library Catalog (RLC)

Get all your open source clean of vulnerabilities, secured by default. No engineering required. Root patches your application dependencies—npm, PyPI, Maven, Go, and more—in place at your pinned versions, eliminating CVEs without forcing upgrades or breaking your builds.

*Libraries requires an active Root Image Catalog (RIC) subscription or equivalent base image support.

Root Library Catalog (RLC)

Get all your open source clean of vulnerabilities, secured by default. No engineering required. Root patches your application dependencies—npm, PyPI, Maven, Go, and more—in place at your pinned versions, eliminating CVEs without forcing upgrades or breaking your builds.

*Libraries requires an active Root Image Catalog (RIC) subscription or equivalent base image support.

Root Library Catalog (RLC)

Get all your open source clean of vulnerabilities, secured by default. No engineering required. Root patches your application dependencies—npm, PyPI, Maven, Go, and more—in place at your pinned versions, eliminating CVEs without forcing upgrades or breaking your builds.

*Libraries requires an active Root Image Catalog (RIC) subscription or equivalent base image support.

The problem

Application libraries
are a nightmare

Application libraries
are a nightmare

Application libraries
are a nightmare

Application libraries
are a nightmare

While base images account for many CVEs, the most complex and critical vulnerabilities often live in your application libraries. Manually managing these is a nightmare:

Developer
disruption

Engineers lose 20-30 of their sprint capacity to the CVE grind—triaging alerts, negotiating safe upgrades, and running endless regression tests.

Developer disruption

Engineers lose 20-30 of their sprint capacity to the CVE grind—triaging alerts, negotiating safe upgrades, and running endless regression tests.

Developer
disruption

Engineers lose 20-30 of their sprint capacity to the CVE grind—triaging alerts, negotiating safe upgrades, and running endless regression tests.

Developer
disruption

Engineers lose 20-30 of their sprint capacity to the CVE grind—triaging alerts, negotiating safe upgrades, and running endless regression tests.

Developer
disruption

Engineers lose 20-30 of their sprint capacity to the CVE grind—triaging alerts, negotiating safe upgrades, and running endless regression tests.

Developer
disruption

Engineers lose 20-30 of their sprint capacity to the CVE grind—triaging alerts, negotiating safe upgrades, and running endless regression tests.

Forced upgrades breakage

The default fix—upgrading a dependency—can have a cascading effect, forcing other upgrades and introducing breaking changes that bring development to a halt.

Forced upgrades breakage

The default fix—upgrading a dependency—can have a cascading effect, forcing other upgrades and introducing breaking changes that bring development to a halt.

Forced upgrades breakage

The default fix—upgrading a dependency—can have a cascading effect, forcing other upgrades and introducing breaking changes that bring development to a halt.

Forced upgrades breakage

The default fix—upgrading a dependency—can have a cascading effect, forcing other upgrades and introducing breaking changes that bring development to a halt.

Forced upgrades breakage

The default fix—upgrading a dependency—can have a cascading effect, forcing other upgrades and introducing breaking changes that bring development to a halt.

Forced upgrades breakage

The default fix—upgrading a dependency—can have a cascading effect, forcing other upgrades and introducing breaking changes that bring development to a halt.

Pinned
dependencies

Your most critical systems often rely on older, pinned dependencies that can’t be easily upgraded.
This leaves you with a permanent, unfixable attack surface.

Pinned
dependencies

Your most critical systems often rely on older, pinned dependencies that can’t be easily upgraded.
This leaves you with a permanent, unfixable attack surface.

Pinned
dependencies

Your most critical systems often rely on older, pinned dependencies that can’t be easily upgraded.
This leaves you with a permanent, unfixable attack surface.

Pinned
dependencies

Your most critical systems often rely on older, pinned dependencies that can’t be easily upgraded.
This leaves you with a permanent, unfixable attack surface.

Pinned
dependencies

Your most critical systems often rely on older, pinned dependencies that can’t be easily upgraded.
This leaves you with a permanent, unfixable attack surface.

Pinned
dependencies

Your most critical systems often rely on older, pinned dependencies that can’t be easily upgraded.
This leaves you with a permanent, unfixable attack surface.

Massive
backlogs

Vulnerability backlogs grow faster than your team can manage, creating a huge operational burden and leaving you exposed to risk
for months or even years.

Massive
backlogs

Vulnerability backlogs grow faster than your team can manage, creating a huge operational burden and leaving you exposed to risk
for months or even years.

Massive
backlogs

Vulnerability backlogs grow faster than your team can manage, creating a huge operational burden and leaving you exposed to risk
for months or even years.

Massive
backlogs

Vulnerability backlogs grow faster than your team can manage, creating a huge operational burden and leaving you exposed to risk
for months or even years.

Massive
backlogs

Vulnerability backlogs grow faster than your team can manage, creating a huge operational burden and leaving you exposed to risk
for months or even years.

Massive
backlogs

Vulnerability backlogs grow faster than your team can manage, creating a huge operational burden and leaving you exposed to risk
for months or even years.

The solution:

The solution:

The solution:

The solution:

Shift Out

Shift Out

Shift Out

Shift Out

We say, it’s time to Shift Out.

We say, it’s time to Shift Out.

We say, it’s time to Shift Out.

We say, it’s time to Shift Out.

Shift Out is a movement built on a simple idea: open source should arrive clean of all vulnerabilities, secured by default. It may
sound crazy, but we’ve made it real.

Shift Out is a movement built on a simple idea: open source should arrive clean of all vulnerabilities, secured by default. It may
sound crazy, but we’ve made it real.

Shift Out is a movement built on a simple idea: open source should arrive clean of all vulnerabilities, secured by default. It may
sound crazy, but we’ve made it real.

Shift Out is a movement built on a simple idea: open source should arrive clean of all vulnerabilities, secured by default. It may
sound crazy, but we’ve made it real.

Shift Out is a movement built on a simple idea: open source should arrive clean of all vulnerabilities, secured by default. It may
sound crazy, but we’ve made it real.

Shift Out is a movement built on a simple idea: open source should arrive clean of all vulnerabilities, secured by default. It may
sound crazy, but we’ve made it real.

Root’s Shift Out Platform is powered by thousands of AI agents trained to detect, patch, and validate vulnerabilities for any piece
of open source code on this planet.

Root’s Shift Out Platform is powered by thousands of AI agents trained to detect, patch, and validate vulnerabilities for any piece
of open source code on this planet.

Root’s Shift Out Platform is powered by thousands of AI agents trained to detect, patch, and validate vulnerabilities for any piece
of open source code on this planet.

Root’s Shift Out Platform is powered by thousands of AI agents trained to detect, patch, and validate vulnerabilities for any piece
of open source code on this planet.

Root’s Shift Out Platform is powered by thousands of AI agents trained to detect, patch, and validate vulnerabilities for any piece
of open source code on this planet.

Root’s Shift Out Platform is powered by thousands of AI agents trained to detect, patch, and validate vulnerabilities for any piece
of open source code on this planet.

Root’s Libraries offering is a managed
patching service that fixes vulnerabilities
in your application dependencies at the
versions you run. No more forced upgrades.
No more dependency hell.

Root’s Libraries offering is a managed
patching service that fixes vulnerabilities
in your application dependencies at the
versions you run. No more forced upgrades.
No more dependency hell.

Root’s Libraries offering is a managed
patching service that fixes vulnerabilities
in your application dependencies at the
versions you run. No more forced upgrades.
No more dependency hell.

Root’s Libraries offering is a managed
patching service that fixes vulnerabilities
in your application dependencies at the
versions you run. No more forced upgrades.
No more dependency hell.

Root’s Libraries offering is a managed
patching service that fixes vulnerabilities
in your application dependencies at the
versions you run. No more forced upgrades.
No more dependency hell.

Root’s Libraries offering is a managed
patching service that fixes vulnerabilities
in your application dependencies at the
versions you run. No more forced upgrades.
No more dependency hell.

Our Agentic Vulnerability Remediation (AVR) platform automates the entire process, delivering secure, patched versions of your libraries without disrupting your workflow.

Our Agentic Vulnerability Remediation (AVR) platform automates the entire process, delivering secure, patched versions of your libraries without disrupting your workflow.

Our Agentic Vulnerability Remediation (AVR) platform automates the entire process, delivering secure, patched versions of your libraries without disrupting your workflow.

Our Agentic Vulnerability Remediation (AVR) platform automates the entire process, delivering secure, patched versions of your libraries without disrupting your workflow.

Our Agentic Vulnerability Remediation (AVR) platform automates the entire process, delivering secure, patched versions of your libraries without disrupting your workflow.

Our Agentic Vulnerability Remediation (AVR) platform automates the entire process, delivering secure, patched versions of your libraries without disrupting your workflow.

How it works

Research, patch, test, replace

Research

Collect everything known about the CVE—advisories, exploits, affected versions, upstream commits—to build the full picture. You provide the vulnerable library (library@version) and CVEs, often via scanner export (Snyk, Prisma, Aikido, etc.).

Research

Collect everything known about the CVE—advisories, exploits, affected versions, upstream commits—to build the full picture. You provide the vulnerable library (library@version) and CVEs, often via scanner export (Snyk, Prisma, Aikido, etc.).

Research

Collect everything known about the CVE—advisories, exploits, affected versions, upstream commits—to build the full picture. You provide the vulnerable library (library@version) and CVEs, often via scanner export (Snyk, Prisma, Aikido, etc.).

Research

Collect everything known about the CVE—advisories, exploits, affected versions, upstream commits—to build the full picture. You provide the vulnerable library (library@version) and CVEs, often via scanner export (Snyk, Prisma, Aikido, etc.).

Research

Collect everything known about the CVE—advisories, exploits, affected versions, upstream commits—to build the full picture. You provide the vulnerable library (library@version) and CVEs, often via scanner export (Snyk, Prisma, Aikido, etc.).

Research

Collect everything known about the CVE—advisories, exploits, affected versions, upstream commits—to build the full picture. You provide the vulnerable library (library@version) and CVEs, often via scanner export (Snyk, Prisma, Aikido, etc.).

Patch

Apply the smallest safe fix. Our AI-powered agents generate the smallest possible safe
fix—often a backport of a security patch, not
a full version upgrade.

Patch

Apply the smallest safe fix. Our AI-powered agents generate the smallest possible safe
fix—often a backport of a security patch, not
a full version upgrade.

Patch

Apply the smallest safe fix. Our AI-powered agents generate the smallest possible safe
fix—often a backport of a security patch, not
a full version upgrade.

Patch

Apply the smallest safe fix. Our AI-powered agents generate the smallest possible safe
fix—often a backport of a security patch, not
a full version upgrade.

Patch

Apply the smallest safe fix. Our AI-powered agents generate the smallest possible safe
fix—often a backport of a security patch, not
a full version upgrade.

Patch

Apply the smallest safe fix. Our AI-powered agents generate the smallest possible safe
fix—often a backport of a security patch, not
a full version upgrade.

Test

Run package tests, functional tests, and CVE-specific tests. Expert security researchers review and validate every patch for safety, correctness, and effectiveness.

Test

Run package tests, functional tests, and CVE-specific tests. Expert security researchers review and validate every patch for safety, correctness, and effectiveness.

Test

Run package tests, functional tests, and CVE-specific tests. Expert security researchers review and validate every patch for safety, correctness, and effectiveness.

Test

Run package tests, functional tests, and CVE-specific tests. Expert security researchers review and validate every patch for safety, correctness, and effectiveness.

Test

Run package tests, functional tests, and CVE-specific tests. Expert security researchers review and validate every patch for safety, correctness, and effectiveness.

Test

Run package tests, functional tests, and CVE-specific tests. Expert security researchers review and validate every patch for safety, correctness, and effectiveness.

Replace

Deliver a built-from-source, patched artifact (e.g., django==4.2.1-root) with complete chain of trust: provenance, attestation, SBOM (CycloneDX), VEX, and before/after CVE delta report.

Replace

Deliver a built-from-source, patched artifact (e.g., django==4.2.1-root) with complete chain of trust: provenance, attestation, SBOM (CycloneDX), VEX, and before/after CVE delta report.

Replace

Deliver a built-from-source, patched artifact (e.g., django==4.2.1-root) with complete chain of trust: provenance, attestation, SBOM (CycloneDX), VEX, and before/after CVE delta report.

Replace

Deliver a built-from-source, patched artifact (e.g., django==4.2.1-root) with complete chain of trust: provenance, attestation, SBOM (CycloneDX), VEX, and before/after CVE delta report.

Replace

Deliver a built-from-source, patched artifact (e.g., django==4.2.1-root) with complete chain of trust: provenance, attestation, SBOM (CycloneDX), VEX, and before/after CVE delta report.

Replace

Deliver a built-from-source, patched artifact (e.g., django==4.2.1-root) with complete chain of trust: provenance, attestation, SBOM (CycloneDX), VEX, and before/after CVE delta report.

Delivery model

Libraries are fulfilled via contracted fix-rate throughput (e.g., 5 fixes/week, 10 fixes/week) with Critical/High vulnerabilities automatically prioritized. CISA KEV vulnerabilities receive priority treatment regardless of capacity constraints.

Delivery model

Libraries are fulfilled via contracted fix-rate throughput (e.g., 5 fixes/week, 10 fixes/week) with Critical/High vulnerabilities automatically prioritized. CISA KEV vulnerabilities receive priority treatment regardless of capacity constraints.

Delivery model

Libraries are fulfilled via contracted fix-rate throughput (e.g., 5 fixes/week, 10 fixes/week) with Critical/High vulnerabilities automatically prioritized. CISA KEV vulnerabilities receive priority treatment regardless of capacity constraints.

Delivery model

Libraries are fulfilled via contracted fix-rate throughput (e.g., 5 fixes/week, 10 fixes/week) with Critical/High vulnerabilities automatically prioritized. CISA KEV vulnerabilities receive priority treatment regardless of capacity constraints.

Delivery model

Libraries are fulfilled via contracted fix-rate throughput (e.g., 5 fixes/week, 10 fixes/week) with Critical/High vulnerabilities automatically prioritized. CISA KEV vulnerabilities receive priority treatment regardless of capacity constraints.

Delivery model

Libraries are fulfilled via contracted fix-rate throughput (e.g., 5 fixes/week, 10 fixes/week) with Critical/High vulnerabilities automatically prioritized. CISA KEV vulnerabilities receive priority treatment regardless of capacity constraints.

Shift Out means

All open source is fixed

Use your version, your stack – and it’s already fixed with no forced upgrades and no vendor-imposed images.

CVE work drops to zero

There’s no more triage and no more manual patching. CVE work is done for you – not by you.

Every fix is trustworthy

Never hear "trust us bro" again - every fix is the smallest possible, and tested to the max to make sure it never breaks.

Every fix is transparent

AppSec and Devs can always see exactly

what was fixed, how it was tested, and why it can be trusted.

Key features benefits

Key features benefits

Key features benefits

Key features benefits

2,000+ curated images

Hardened, continuously remediated versions of Alpine, Debian, Ubuntu, plus official runtimes like Python, Node, Java, Go, and 40+ more.

Instant security: Adopt a secure foundation without changing your stack.

2,000+ curated images

Hardened, continuously remediated versions of Alpine, Debian, Ubuntu, plus official runtimes like Python, Node, Java, Go, and 40+ more.

Instant security: Adopt a secure foundation without changing your stack.

2,000+ curated images

Hardened, continuously remediated versions of Alpine, Debian, Ubuntu, plus official runtimes like Python, Node, Java, Go, and 40+ more.

Instant security: Adopt a secure foundation without changing your stack.

2,000+ curated images

Hardened, continuously remediated versions of Alpine, Debian, Ubuntu, plus official runtimes like Python, Node, Java, Go, and 40+ more.

Instant security: Adopt a secure foundation without changing your stack.

2,000+ curated images

Hardened, continuously remediated versions of Alpine, Debian, Ubuntu, plus official runtimes like Python, Node, Java, Go, and 40+ more.

Instant security: Adopt a secure foundation without changing your stack.

2,000+ curated images

Hardened, continuously remediated versions of Alpine, Debian, Ubuntu, plus official runtimes like Python, Node, Java, Go, and 40+ more.

Instant security: Adopt a secure foundation without changing your stack.

Full version history

Access patched versions of any tag from the last 3-5 years. Need python:3.9-slim-bullseye from 18 months ago? We have it, patched and maintained.

Extended lifetime support: Secure older, pinned dependencies without being forced to upgrade.

Full version history

Access patched versions of any tag from the last 3-5 years. Need python:3.9-slim-bullseye from 18 months ago? We have it, patched and maintained.

Extended lifetime support: Secure older, pinned dependencies without being forced to upgrade.

Full version history

Access patched versions of any tag from the last 3-5 years. Need python:3.9-slim-bullseye from 18 months ago? We have it, patched and maintained.

Extended lifetime support: Secure older, pinned dependencies without being forced to upgrade.

Full version history

Access patched versions of any tag from the last 3-5 years. Need python:3.9-slim-bullseye from 18 months ago? We have it, patched and maintained.

Extended lifetime support: Secure older, pinned dependencies without being forced to upgrade.

Full version history

Access patched versions of any tag from the last 3-5 years. Need python:3.9-slim-bullseye from 18 months ago? We have it, patched and maintained.

Extended lifetime support: Secure older, pinned dependencies without being forced to upgrade.

Full version history

Access patched versions of any tag from the last 3-5 years. Need python:3.9-slim-bullseye from 18 months ago? We have it, patched and maintained.

Extended lifetime support: Secure older, pinned dependencies without being forced to upgrade.

Built-from-source patching

We rebuild every patched artifact from source, ensuring no unknown binaries or hidden malware.

Complete trust: Eliminate supply chain risk with verifiable, transparently built images.

Built-from-source patching

We rebuild every patched artifact from source, ensuring no unknown binaries or hidden malware.

Complete trust: Eliminate supply chain risk with verifiable, transparently built images.

Built-from-source patching

We rebuild every patched artifact from source, ensuring no unknown binaries or hidden malware.

Complete trust: Eliminate supply chain risk with verifiable, transparently built images.

Built-from-source patching

We rebuild every patched artifact from source, ensuring no unknown binaries or hidden malware.

Complete trust: Eliminate supply chain risk with verifiable, transparently built images.

Built-from-source patching

We rebuild every patched artifact from source, ensuring no unknown binaries or hidden malware.

Complete trust: Eliminate supply chain risk with verifiable, transparently built images.

Built-from-source patching

We rebuild every patched artifact from source, ensuring no unknown binaries or hidden malware.

Complete trust: Eliminate supply chain risk with verifiable, transparently built images.

Zero breaking changes

Our images maintain native OS compatibility. If it worked on the official image, it works on the Root version.

Frictionless adoption: Swap a single line in your Dockerfile. No code changes, no re-architecting.

Zero breaking changes

Our images maintain native OS compatibility. If it worked on the official image, it works on the Root version.

Frictionless adoption: Swap a single line in your Dockerfile. No code changes, no re-architecting.

Zero breaking changes

Our images maintain native OS compatibility. If it worked on the official image, it works on the Root version.

Frictionless adoption: Swap a single line in your Dockerfile. No code changes, no re-architecting.

Zero breaking changes

Our images maintain native OS compatibility. If it worked on the official image, it works on the Root version.

Frictionless adoption: Swap a single line in your Dockerfile. No code changes, no re-architecting.

Zero breaking changes

Our images maintain native OS compatibility. If it worked on the official image, it works on the Root version.

Frictionless adoption: Swap a single line in your Dockerfile. No code changes, no re-architecting.

Zero breaking changes

Our images maintain native OS compatibility. If it worked on the official image, it works on the Root version.

Frictionless adoption: Swap a single line in your Dockerfile. No code changes, no re-architecting.

Complete proof chain

Every image is delivered with a full set of security artifacts (SBOM, VEX, Attestation) to satisfy auditors.

Automated compliance: Pass security reviews and audits instantly with verifiable proof of remediation.

Complete proof chain

Every image is delivered with a full set of security artifacts (SBOM, VEX, Attestation) to satisfy auditors.

Automated compliance: Pass security reviews and audits instantly with verifiable proof of remediation.

Complete proof chain

Every image is delivered with a full set of security artifacts (SBOM, VEX, Attestation) to satisfy auditors.

Automated compliance: Pass security reviews and audits instantly with verifiable proof of remediation.

Complete proof chain

Every image is delivered with a full set of security artifacts (SBOM, VEX, Attestation) to satisfy auditors.

Automated compliance: Pass security reviews and audits instantly with verifiable proof of remediation.

Complete proof chain

Every image is delivered with a full set of security artifacts (SBOM, VEX, Attestation) to satisfy auditors.

Automated compliance: Pass security reviews and audits instantly with verifiable proof of remediation.

Complete proof chain

Every image is delivered with a full set of security artifacts (SBOM, VEX, Attestation) to satisfy auditors.

Automated compliance: Pass security reviews and audits instantly with verifiable proof of remediation.

Dual-architecture support

All images are available for both AMD64 and ARM64 architectures.

Future-proof your stack: Build and deploy consistently across all modern infrastructure.

Dual-architecture support

All images are available for both AMD64 and ARM64 architectures.

Future-proof your stack: Build and deploy consistently across all modern infrastructure.

Dual-architecture support

All images are available for both AMD64 and ARM64 architectures.

Future-proof your stack: Build and deploy consistently across all modern infrastructure.

Dual-architecture support

All images are available for both AMD64 and ARM64 architectures.

Future-proof your stack: Build and deploy consistently across all modern infrastructure.

Dual-architecture support

All images are available for both AMD64 and ARM64 architectures.

Future-proof your stack: Build and deploy consistently across all modern infrastructure.

Dual-architecture support

All images are available for both AMD64 and ARM64 architectures.

Future-proof your stack: Build and deploy consistently across all modern infrastructure.

Who is RLC for?

Security teams

Eliminate 60-70 of CVE noise from scanners; focus on high-impact application-level risks.

Platform DevOps teams

Standardize on a secure foundation; eliminate image drift

and reduce maintenance overhead.

Developers

Pull secure images by default; never blocked by base image

vulnerabilities. Zero learning curve, no migration required.

Compliance GRC teams

Generate audit-ready proof on demand for SOC 2, FedRAMP,

and other regulatory requirements.

Pricing model

Simple,
predictable

We offer two simple pricing models for RIC, designed to scale with your needs.

Root Library Catalog

Best for:

Teams with defined, predictable workloads

Pricing Unit:

Fixed-price for all versions within a library

Root Library Catalog

Best for:

Teams with defined, predictable workloads

Pricing Unit:

Fixed-price for all versions within a library

Root Library Catalog

Best for:

Teams with defined, predictable workloads

Pricing Unit:

Fixed-price for all versions within a library

Root Library Catalog

Best for:

Teams with defined, predictable workloads

Pricing Unit:

Fixed-price for all versions within a library

Root Library Catalog

Best for:

Teams with defined, predictable workloads

Pricing Unit:

Fixed-price for all versions within a library

Root Library Catalog

Best for:

Teams with defined, predictable workloads

Pricing Unit:

Fixed-price for all versions within a library

Image & Library Bundle

Best for:

Includes Root Image Catalog. Growing teams, microservices architectures, and organizations with 40+ containers

Pricing Unit:

Per-developer seat, with no limit
on container usage

Image & Library Bundle

Best for:

Includes Root Image Catalog. Growing teams, microservices architectures, and organizations with 40+ containers

Pricing Unit:

Per-developer seat, with no limit
on container usage

Image & Library Bundle

Best for:

Includes Root Image Catalog. Growing teams, microservices architectures, and organizations with 40+ containers

Pricing Unit:

Per-developer seat, with no limit
on container usage

Image & Library Bundle

Best for:

Includes Root Image Catalog. Growing teams, microservices architectures, and organizations with 40+ containers

Pricing Unit:

Per-developer seat, with no limit
on container usage

Image & Library Bundle

Best for:

Includes Root Image Catalog. Growing teams, microservices architectures, and organizations with 40+ containers

Pricing Unit:

Per-developer seat, with no limit
on container usage

Image & Library Bundle

Best for:

Includes Root Image Catalog. Growing teams, microservices architectures, and organizations with 40+ containers

Pricing Unit:

Per-developer seat, with no limit
on container usage

All subscriptions include:

Registry SLA guarantees (30-day Standard or 7-day Enhanced for Critical/High vulnerabilities)

Full version history (3-5 years) and dual-architecture support (AMD64 + ARM64)

Complete security artifact chain (provenance,

attestation, SBOM, VEX, malware scans)

Standard support (Premium Support available

with RIC + Libraries bundle)

Why we don’t suck

No forced reengineering
No vendor lock-in
No restrictions on open source
Full transparency on every fix
One-click integration

Why we don’t suck

Why we don’t suck

No forced reengineering
No forced reengineering
No vendor lock-in
No vendor lock-in
No restrictions on open source
No restrictions on open source
Full transparency on every fix
Full transparency on every fix
One-click integration
One-click integration

Get started in minutes

Browse the community catalog

Explore over 500 of our most popular images for free at cr.root.io. Pull and use them in any project, no strings attached. (Community tier has no SLA guarantees).

Browse the community catalog

Explore over 500 of our most popular images for free at cr.root.io. Pull and use them in any project, no strings attached. (Community tier has no SLA guarantees).

Browse the community catalog

Explore over 500 of our most popular images for free at cr.root.io. Pull and use them in any project, no strings attached. (Community tier has no SLA guarantees).

Browse the community catalog

Explore over 500 of our most popular images for free at cr.root.io. Pull and use them in any project, no strings attached. (Community tier has no SLA guarantees).

Browse the community catalog

Explore over 500 of our most popular images for free at cr.root.io. Pull and use them in any project, no strings attached. (Community tier has no SLA guarantees).

Browse the community catalog

Explore over 500 of our most popular images for free at cr.root.io. Pull and use them in any project, no strings attached. (Community tier has no SLA guarantees).

Request a free POV

Want to see how RIC works on your specific images? We’ll set up a free Proof of Value and deliver patched versions in about a week.

Request a free POV

Want to see how RIC works on your specific images? We’ll set up a free Proof of Value and deliver patched versions in about a week.

Request a free POV

Want to see how RIC works on your specific images? We’ll set up a free Proof of Value and deliver patched versions in about a week.

Request a free POV

Want to see how RIC works on your specific images? We’ll set up a free Proof of Value and deliver patched versions in about a week.

Request a free POV

Want to see how RIC works on your specific images? We’ll set up a free Proof of Value and deliver patched versions in about a week.

Request a free POV

Want to see how RIC works on your specific images? We’ll set up a free Proof of Value and deliver patched versions in about a week.

Get a custom quote

Let’s design a plan that fits your team’s
exact needs—whether Container Bundles or Unlimited per-seat pricing—and calculate the ROI you can expect.

Get a custom quote

Let’s design a plan that fits your team’s
exact needs—whether Container Bundles or Unlimited per-seat pricing—and calculate the ROI you can expect.

Get a custom quote

Let’s design a plan that fits your team’s
exact needs—whether Container Bundles or Unlimited per-seat pricing—and calculate the ROI you can expect.

Get a custom quote

Let’s design a plan that fits your team’s
exact needs—whether Container Bundles or Unlimited per-seat pricing—and calculate the ROI you can expect.

Get a custom quote

Let’s design a plan that fits your team’s
exact needs—whether Container Bundles or Unlimited per-seat pricing—and calculate the ROI you can expect.

Get a custom quote

Let’s design a plan that fits your team’s
exact needs—whether Container Bundles or Unlimited per-seat pricing—and calculate the ROI you can expect.

Note: RLC covers base OS, runtimes, and bundled packages. For application-layer dependencies (npm, PyPI, Maven, etc.), see our Libraries add-on offering.