Service Level Agreement
Last updated: December 31, 2025
1. OVERVIEW
This Service Level Agreement ("SLA") describes Root's service level commitments for customers with paid subscriptions to the Root Platform. This SLA is incorporated by reference into the Terms of Service and any applicable Order Form.
Capitalized terms not defined herein have the meanings set forth in the Terms of Service or the Order Form. In the event of a conflict between this SLA and an Order Form executed by Root's Chief Executive Officer, the Order Form shall control with respect to the specific commitments described therein.
Except as specifically excluded, Root will use commercially reasonable efforts to meet the specified SLA Target Timelines set forth below.
2. PLATFORM SERVICES
2.1 Root Image Catalog
Root Image Catalog provides access to hardened, continuously remediated container images. Customers may subscribe to images within the RIC for use in their environments.
Included in RIC:
• Access to all standard catalog images
• Subscription to any number of images (subject to Acceptable
Use guidelines in the Terms of Service)
• SBOMs, VEX statements, and build provenance for all images
• CVE remediation per applicable SLA tier
Not Included in RIC (Separate Entitlement Required):
• FIPS-validated images
• STIG-hardened images
• Other specialized compliance images as specified in an Order Form
Image Request Entitlement: Where specified in an Order Form, Customer may request to add new images to the catalog. Root will use commercially reasonable efforts to add requested images within thirty (30) days of request if and as specified in the Order Form, subject to technical feasibility. Image request entitlements do not guarantee addition of any specific image.
Community Images: Root may offer certain images designated as "Community Images" at no charge or at a reduced subscription cost. Community Images are provided "AS IS" without warranty or SLA commitment.
2.2 Root Library Catalog (RLC)
Root Library Catalog provides backported security fixes for application dependencies across supported language ecosystems (e.g., Python/PyPI, JavaScript/NPM, Java/Maven).
Scope of RLC SLA:
• Applies only to new CVEs discovered after Customer's Subscription has commenced.
• Applies only to libraries explicitly designated as "Subscribed Libraries" in the Order Form or Root Platform.
• Does not apply to pre-existing CVE debt in existence at commencement date of Subscription.
CVE Burn Down: Remediation of pre-existing vulnerabilities in Customer's pinned library versions may be available as a separate entitlement ("CVE Burn Down Credits") if and as specified in the Order Form.
2.3 Deliverables
All Root-delivered fixes include:
• Full source code build in accordance with SLSA standards
• Software Bill of Materials (SBOM)
• VEX (Vulnerability Exploitability eXchange) statements
• Diff files and provenance documentation
• Patch efficacy testing against proof-of-concept exploits where available
Root maintains underlying open source licensing for all images and publishes patches in compliance with applicable license requirements as provided in the Terms of Service.
3. PLATFORM AVAILABILITY
3.1 Uptime Target
Root targets 99.9% monthly Platform Availability for the Root Platform, including registry services and API access ("Platform Availability").
3.2 Calculation
Platform Availability % = ((Total Minutes - Downtime Minutes) / Total Minutes) × 100
Where:
• Total Minutes = Total minutes in the calendar month
• Downtime Minutes = Minutes where Platform was unavailable, excluding Exclusions
3.3 Exclusions
Downtime does not include unavailability due to:
(a) Scheduled Maintenance: Planned maintenance with at least twenty-four (24) hours advance notice via email or Platform notification.
(b) Third-Party Infrastructure: Outages of underlying infrastructure providers (e.g., AWS, Google Cloud, Cloudflare) outside Root's reasonable control.
(c) Force Majeure: Events beyond Root's reasonable control, including natural disasters, acts of war, terrorism, pandemic, or government action.
(d) Customer-Caused Issues: Unavailability resulting from Customer's acts, omissions, equipment, software, or network connectivity.
(e) Suspension: Service suspension due to Customer's breach of the Terms of Service, including non-payment.
3.4 Scanning Frequency
Root targets vulnerability scanning of Subscribed Images and Subscribed Libraries at least once every twenty-four (24) hours when utilizing Root-controlled registries. Scanning frequency for Customer-controlled registries depends on Customer's CI/CD configuration and API integration.
3.5 Pull Rate Limits
To ensure fair use and to prevent service degradation, Root may implement reasonable pull-rate limits on registry access. Customers experiencing rate limiting due to suspected misconfiguration will be notified and Root will use reasonable commercial efforts to assist such Customers in remediation of service degradation issues .
4. VULNERABILITY REMEDIATION SLA
SLA Tiers
This SLA defines Standard remediation timelines included with all paid subscriptions. Enhanced SLA tiers with accelerated timelines may be available at an additional charge for customers who require more aggressive remediation timelines. Enhanced SLA terms, eligibility, and pricing are specified in the Order Form.
4.1 General Definitions
"CVE" means a vulnerability with an assigned Common Vulnerabilities and Exposures identifier.
"CISA KEV" means a vulnerability listed in CISA's Known Exploited Vulnerabilities catalog.
"Severity" is determined by CVSS score from the NIST National Vulnerability Database:
• Critical: CVSS 9.0–10.0
• High: CVSS 7.0–8.9
• Medium: CVSS 4.0–6.9
• Low: CVSS 0.1–3.9
"Fix Candidate" means a proposed remediation existing within the trusted ecosystem, including upstream maintainer releases, sibling distributions, forks, or validated unmerged pull requests.
"Remediation Complete" means Root has delivered a fix that is fully tested, validated against proof-of-concept exploits where available, and includes diff file and provenance documentation.
"Subscription Date" means the effective date of Customer's subscription for the applicable service (RIC or RLC) as specified in the Order Form.
4.2 SLA Timeline Commencement (Both RIC and RLC)
SLA timelines begin upon the later of:
(f) CVE publication in a recognized vulnerability database (NVD, vendor advisory, etc.); AND
(g) Availability of a Fix Candidate within the trusted ecosystem
Subsequent severity reclassification (e.g., addition to CISA KEV) triggers the more stringent timeline from the time of reclassification.
4.3 Remediation Delivery Standards (Both RIC and RLC)
All Root-delivered fixes include:
• Source builds in accordance with SLSA standards
• Software Bill of Materials (SBOM)
• VEX statements
• Diff files and provenance documentation
• Patch efficacy testing and PoC validation where available
Root maintains underlying open source licensing and publishes patches in compliance with applicable license requirements as provided in the Terms of Service.
4A. ROOT IMAGE CATALOG (RIC) — SLA SPECIFICS
4A.1 Scope of RIC SLA Coverage
The RIC Remediation SLA applies to:
(h) Subscribed Images: Container images explicitly subscribed to by Customer within the Root Platform.
(i) All CVEs: Both new and pre-existing vulnerabilities in Subscribed Images . There is no distinction between CVE Debt and new CVEs for RIC.
(j) Supported Images: Standard catalog images as available in the Root Platform. FIPS, STIG, and other specialized images require separate entitlement per Order Form.
4A.2 What RIC Covers vs. Excludes
Covered
Not Covered
All CVEs in Subscribed Images (new and existing)
Community Images (no SLA)
Critical, High, Medium severity per SLA tier
Low severity (commercially reasonable)
OS-level and package vulnerabilities
Customer-added layers or modifications
Standard catalog images
FIPS/STIG without entitlement
4A.3 RIC Standard SLA Target Timelines
Severity
Standard Timeline
CISA KEV
Critical
30 calendar days
72 hours
High
30 calendar days
72 hours
Medium
60 calendar days
—
Low
Commercially reasonable
—
4A.4 RIC Enhanced SLA Timelines
Enhanced SLA terms, eligibility, and pricing if and as specified in the Order Form.
Severity
Enhanced Timeline
CISA KEV
Critical
7 calendar days
48 hours
High
14 calendar days
48 hours
Medium
30 calendar days
—
Low
Commercially reasonable
—
5. CVE SURGE CONDITIONS
5.1 Surge Condition
A "CVE Surge Condition" exists when the rate of new Critical or High severity CVEs affecting a specific Subscribed Image or Subscribed Library version exceeds 2.5 times (2.5x) the historical monthly average for that project or dependency, measured over the trailing twelve (12) months.
5.2 Effect of Surge Condition
Upon determination of a CVE Surge Condition:
(k) SLA timelines become advisory targets rather than commitments for the affected Subscribed Image or Subscribed Library.
(l) Root will notify Customer of the Surge Condition and collaborate on prioritization of critical fixes.
(m) Root will provide guidance on upgrade paths to more stable versions where available.
(n) Normal SLA commitments resume when the Surge Condition no longer exists.
5.3 Extended Life Support
For customers requiring continued support of end-of-life or high-CVE-volume versions, Extended Life Support may be available at additional cost if and as specified in the Order Form.
6. ESCALATION TO ROOTLABS
6.1 Triggering Escalation
In exceptional circumstances where standard AVR processes cannot remediate a CVE within SLA Timelines (typically due to extraordinary technical complexity or ecosystem-wide gaps) Customer will be notified and may request escalation to Root Labs.
6.2 Root Labs Services
Upon Customer request, Root Labs may provide:
Risk Triage: Comprehensive analysis to determine actual applicability of the CVE to Customer's context, which may include:
• Reachability analysis of vulnerable code paths
• EPSS (Exploit Prediction Scoring System) evaluation
• Environmental context review (runtime, network exposure, access controls)
• Threat intelligence correlation
• Attack chain validation
• Proof-of-concept assessment
VEX Enforcement: When Root Labs determines, after Risk Triage, that the identified risk is low or does not exist:
• Standard VEX: SBOM with scanner-consumable VEX statements
• VEX-enforced image (at Customer discretion): Modified image enabling SCA tools to reflect corrected risk assessment
Custom Remediation: When CVE risk remains Critical or High and no viable ecosystem fix exists, Root Labs may use commercially reasonable efforts to engineer a novel fix, including:
• Developing targeted patches compatible with Customer's versions
• Validating fixes resolve the vulnerability without breaking functionality
• Providing supporting documentation for compliance records
6.3 Root Labs Timeline
While Root Labs prioritizes delivery within the SLA Timelines, complex research may extend up to thirty (30) days from escalation request.
6.4 Service Commitments
• Parallel Processing: Individual CVE escalations will not impact delivery timelines for other remediable CVEs.
• Communication: Root will provide regular status updates for all escalated issues.
• Transparency: If remediation is determined technically infeasible, Root Labs will provide written technical justification and support for alternative approaches.
6.5 Technical Infeasibility
If Root determines a CVE cannot be remediated, Root Labs will work with Customer to provide:
Written technical justification for why a CVE cannot be remediated.
Support for alternative workaround solutions (such as: "lowest lift" library or package-specific upgrades; collaboration with Customer engineering on alternative approaches; and alternative CVE-compliant image maintaining stability).
(q) Upon Customer request, additional technical review involving Root's CTO and/or VP of Engineering will be provided.
7. EXCLUSIONS
7.1 SLA Exclusions
Remediation SLA commitments do not apply when:
No Fix Candidate exists within the Customer ecosystem.
The vulnerability exists within Customer-provided code, configurations, or customizations.
CVE is disputed, rejected, or withdrawn by NVD or the relevant authority.
Customer has not provided required access, information, or timely response to Root inquiries.
The Subscribed Image or the Subscribed Library is designated as Community (no SLA)
A CVE Surge Condition applies (See Section 5).
Vulnerability exists in a FIPS, STIG, or specialized image for which Customer does not have entitlement.
Pre-existing CVE debt for RLC (covered by CVE Burn Down entitlement if applicable).
7.2 Force Majeure
Neither party shall be liable for failure to perform obligations due to events beyond reasonable control, including natural disasters, acts of war or terrorism, pandemic, government action, or failure of third-party infrastructure providers (a “Force Majeure” event).
8. SLA REMEDY AND ESCALATION
8.1 Escalation Path
Customer shall report SLA issues through Root's support organization as follows:
• Level 1: Account Manager
• Level 2: Head of Customer Success
• Level 3: Head of Field Engineering
• Level 4: CTO
Customer shall not escalate an SLA issue to the next Level of the support organization unless the prior level of support has failed to address and remedy an SLA issue within the timeframes provided for in this Service Level Agreement.
8.2 No Service Credits
SLA timelines represent Root's performance targets. Failure to meet SLA timelines does not entitle Customer to automatic service credits or financial remedies. Customer's remedy is escalation per Section 8.1 and, where applicable, termination rights per Section 9.
9. TERMINATION FOR SLA FAILURE
9.1 Conditions for Termination
Customer may terminate the Agreement for material SLA failure only if all of the following conditions are met:
Root fails to remediate a Critical severity or CISA KEV vulnerability within two times (2x) the applicable SLA timeline;
Customer has escalated to Root Labs per Section 6 and Root Labs has exhausted the thirty (30) day extended research period without a remediation or providing a reasonable alternative (VEX enforcement, workaround, alternative image);
Customer provides written notice specifying the SLA failure; and
Root fails to cure within forty-five (45) days of such notice.
9.2 Refund Upon Termination
Upon termination pursuant to Section 9.1, Customer is entitled to a pro-rata refund of prepaid fees for the unused portion of the subscription term, less fees attributable to the sixty (60) days following the effective termination date to facilitate Transition Services.
9.3 Limitations
Termination under this Section does not apply to:
• CVEs where a CVE Surge Condition existed.
• CVEs excluded under Section 7.
• Situations where Customer has failed to reasonably cooperate with Root's remediation efforts.
10. MODIFICATIONS
Root may modify this SLA by posting an updated version to www.root.io/sla. Material changes will be communicated with at least thirty (30) days notice. If changes are not acceptable to Customer, Customer may elect to terminate the Agreement and receive a pro-rata refund of prepaid fees for the unused portion of the subscription term, less fees attributable to the sixty (60) days following the effective termination date to facilitate Transition Services.





