Service Level Agreement

Last updated: December 31, 2025

1. OVERVIEW

This Service Level Agreement ("SLA") describes Root's service level commitments for customers with paid subscriptions to the Root Platform. This SLA is incorporated by reference into the Terms of Service and any applicable Order Form.

Capitalized terms not defined herein have the meanings set forth in the Terms of Service or the  Order Form. In the event of a conflict between this SLA and an Order Form executed by Root's Chief Executive Officer, the Order Form shall control with respect to the specific commitments described therein.

Except as specifically excluded, Root will use commercially reasonable efforts to meet the specified SLA Target Timelines set forth below.

2. PLATFORM SERVICES

2.1 Root Image Catalog 

Root Image Catalog provides access to hardened, continuously remediated container images. Customers may subscribe to images within the RIC for use in their environments.

Included in RIC:

•   Access to all standard catalog images

•   Subscription to any number of images (subject to Acceptable 

Use guidelines in the Terms of Service)

•   SBOMs, VEX statements, and build provenance for all images

•   CVE remediation per applicable SLA tier

Not Included in RIC (Separate Entitlement Required):

•   FIPS-validated images

•   STIG-hardened images

•   Other specialized compliance images as specified in an Order Form

Image Request Entitlement: Where specified in an Order Form, Customer may request to add  new images to the catalog. Root will use commercially reasonable efforts to add requested images within thirty (30) days of request if and as specified in the Order Form, subject to technical feasibility. Image request entitlements do not guarantee addition of any specific image.

Community Images: Root may offer certain images designated as "Community Images" at no charge or at a reduced subscription cost. Community Images are provided "AS IS" without warranty or SLA commitment.

2.2 Root Library Catalog (RLC)

Root Library Catalog provides backported security fixes for application dependencies across supported language ecosystems (e.g., Python/PyPI, JavaScript/NPM, Java/Maven).

Scope of RLC SLA:

•   Applies only to new CVEs discovered after Customer's Subscription has commenced.

•   Applies only to libraries explicitly designated as "Subscribed Libraries" in the Order Form or Root Platform.

•   Does not apply to pre-existing CVE debt in existence at commencement date of Subscription.

CVE Burn Down: Remediation of pre-existing vulnerabilities in Customer's pinned library versions may be available as a separate entitlement ("CVE Burn Down Credits") if and as specified in the Order Form.

2.3 Deliverables

All Root-delivered fixes include:

•   Full source code build in accordance with SLSA standards

•   Software Bill of Materials (SBOM)

•   VEX (Vulnerability Exploitability eXchange) statements

•   Diff files and provenance documentation

•   Patch efficacy testing against proof-of-concept exploits where available

Root maintains underlying open source licensing for all images and publishes patches in compliance with applicable license requirements as provided in the Terms of Service.

3. PLATFORM AVAILABILITY

3.1 Uptime Target

Root targets 99.9% monthly Platform Availability for the Root Platform, including registry services and API access ("Platform Availability").

3.2 Calculation

Platform Availability % = ((Total Minutes - Downtime Minutes) / Total Minutes) × 100

Where:

•   Total Minutes = Total minutes in the calendar month

•   Downtime Minutes = Minutes where Platform was unavailable, excluding Exclusions

3.3 Exclusions

Downtime does not include unavailability due to:

(a)   Scheduled Maintenance: Planned maintenance with at least twenty-four (24) hours advance notice via email or Platform notification.

(b)   Third-Party Infrastructure: Outages of underlying infrastructure providers (e.g., AWS, Google Cloud, Cloudflare) outside Root's reasonable control.

(c)   Force Majeure: Events beyond Root's reasonable control, including natural disasters, acts of war, terrorism, pandemic, or government action.

(d)   Customer-Caused Issues: Unavailability resulting from Customer's acts, omissions, equipment, software, or network connectivity.

(e)   Suspension: Service suspension due to Customer's breach of the Terms of Service, including non-payment.

3.4 Scanning Frequency

Root targets vulnerability scanning of Subscribed Images and Subscribed Libraries at least once every twenty-four (24) hours when utilizing Root-controlled registries. Scanning frequency for Customer-controlled registries depends on Customer's CI/CD configuration and API integration.

3.5 Pull Rate Limits

To ensure fair use and to prevent service degradation, Root may implement reasonable pull-rate limits on registry access. Customers experiencing rate limiting due to suspected misconfiguration will be notified and Root will use reasonable commercial efforts to assist such Customers in remediation of service degradation issues .

4. VULNERABILITY REMEDIATION SLA

SLA Tiers

This SLA defines Standard remediation timelines included with all paid subscriptions. Enhanced SLA tiers with accelerated timelines may be available at an additional charge for customers who require more aggressive remediation timelines. Enhanced SLA terms, eligibility, and pricing are specified in the Order Form.

4.1 General Definitions

"CVE" means a vulnerability with an assigned Common Vulnerabilities and Exposures identifier.

"CISA KEV" means a vulnerability listed in CISA's Known Exploited Vulnerabilities catalog.

"Severity" is determined by CVSS score from the NIST National Vulnerability Database:

•   Critical: CVSS 9.0–10.0

•   High: CVSS 7.0–8.9

•   Medium: CVSS 4.0–6.9

•   Low: CVSS 0.1–3.9

"Fix Candidate" means a proposed remediation existing within the trusted ecosystem, including upstream maintainer releases, sibling distributions, forks, or validated unmerged pull requests.

"Remediation Complete" means Root has delivered a fix that is fully tested, validated against proof-of-concept exploits where available, and includes diff file and provenance documentation.

"Subscription Date" means the effective date of Customer's subscription for the applicable service (RIC or RLC) as specified in the Order Form.

4.2 SLA Timeline Commencement (Both RIC and RLC)

SLA timelines begin upon the later of:

(f) CVE publication in a recognized vulnerability database (NVD, vendor advisory, etc.); AND

(g)   Availability of a Fix Candidate within the trusted ecosystem

Subsequent severity reclassification (e.g., addition to CISA KEV) triggers the more stringent timeline from the time of reclassification.

4.3 Remediation Delivery Standards (Both RIC and RLC)

All Root-delivered fixes include:

•   Source builds in accordance with SLSA standards

•   Software Bill of Materials (SBOM)

•   VEX statements

•   Diff files and provenance documentation

•   Patch efficacy testing and PoC validation where available

Root maintains underlying open source licensing and publishes patches in compliance with applicable license requirements as provided in the Terms of Service.

4A. ROOT IMAGE CATALOG (RIC) — SLA SPECIFICS

4A.1 Scope of RIC SLA Coverage

The RIC Remediation SLA applies to:

(h)   Subscribed Images: Container images explicitly subscribed to by Customer within the Root Platform.

(i) All CVEs: Both new and pre-existing vulnerabilities in Subscribed Images . There is no distinction between CVE Debt and new CVEs for RIC.

(j) Supported Images: Standard catalog images as available in the Root Platform. FIPS, STIG, and other specialized images require separate entitlement per Order Form.

4A.2 What RIC Covers vs. Excludes

Covered

Not Covered

All CVEs in Subscribed Images (new and existing)

Community Images (no SLA)

Critical, High, Medium severity per SLA tier

Low severity (commercially reasonable)

OS-level and package vulnerabilities

Customer-added layers or modifications

Standard catalog images

FIPS/STIG without entitlement

4A.3 RIC Standard SLA Target Timelines

Severity

Standard Timeline

CISA KEV

Critical

30 calendar days

72 hours

High

30 calendar days

72 hours

Medium

60 calendar days

Low

Commercially reasonable

4A.4 RIC Enhanced SLA Timelines

Enhanced SLA terms, eligibility, and pricing if and as specified in the Order Form.

Severity

Enhanced Timeline

CISA KEV

Critical

7 calendar days

48 hours

High

14 calendar days

48 hours

Medium

30 calendar days

Low

Commercially reasonable

5. CVE SURGE CONDITIONS

5.1 Surge Condition

A "CVE Surge Condition" exists when the rate of new Critical or High severity CVEs affecting a specific Subscribed Image or Subscribed Library version exceeds 2.5 times (2.5x) the historical monthly average for that project or dependency, measured over the trailing twelve (12) months.

5.2 Effect of Surge Condition

Upon determination of a CVE Surge Condition:

(k)   SLA timelines become advisory targets rather than commitments for the affected Subscribed Image or Subscribed Library.

(l) Root will notify Customer of the Surge Condition and collaborate on prioritization of critical fixes.

(m) Root will provide guidance on upgrade paths to more stable versions where available.

(n)   Normal SLA commitments resume when the Surge Condition no longer exists.

5.3 Extended Life Support

For customers requiring continued support of end-of-life or high-CVE-volume versions, Extended Life Support may be available at additional cost if and as specified in the Order Form.

6. ESCALATION TO ROOTLABS

6.1 Triggering Escalation

In exceptional circumstances where standard AVR processes cannot remediate a CVE within SLA Timelines (typically due to extraordinary technical complexity or ecosystem-wide gaps) Customer will be notified and may request escalation to Root Labs.

6.2 Root Labs Services

Upon Customer request, Root Labs may provide:

Risk Triage: Comprehensive analysis to determine actual applicability of the CVE to Customer's context, which may include:

•   Reachability analysis of vulnerable code paths

•   EPSS (Exploit Prediction Scoring System) evaluation

•   Environmental context review (runtime, network exposure, access controls)

•   Threat intelligence correlation

•   Attack chain validation

•   Proof-of-concept assessment

VEX Enforcement: When Root Labs determines, after Risk Triage, that the identified risk is low or does not exist:

•   Standard VEX: SBOM with scanner-consumable VEX statements

•   VEX-enforced image (at Customer discretion): Modified image enabling SCA tools to reflect corrected risk assessment

Custom Remediation: When CVE risk remains Critical or High and no viable ecosystem fix exists, Root Labs may use commercially reasonable efforts to engineer a novel fix, including:

•   Developing targeted patches compatible with Customer's versions

•   Validating fixes resolve the vulnerability without breaking functionality

•   Providing supporting documentation for compliance records

6.3 Root Labs Timeline

While Root Labs prioritizes delivery within the SLA Timelines, complex research may extend up to thirty (30) days from escalation request.

6.4 Service Commitments

•   Parallel Processing: Individual CVE escalations will not impact delivery timelines for other remediable CVEs.

•   Communication: Root will provide regular status updates for all escalated issues.

•   Transparency: If remediation is determined technically infeasible, Root Labs will provide written technical justification and support for alternative approaches.

6.5 Technical Infeasibility

If Root determines a CVE cannot be remediated, Root Labs will work with Customer to provide:

  •    Written technical justification for why a CVE cannot be remediated.

  •   Support for alternative workaround solutions (such as: "lowest lift" library or package-specific upgrades; collaboration with Customer engineering on alternative approaches; and alternative CVE-compliant image maintaining stability).

(q)   Upon Customer request, additional technical review involving Root's CTO and/or VP of Engineering will be provided.

7. EXCLUSIONS

7.1 SLA Exclusions

Remediation SLA commitments do not apply when:

  • No Fix Candidate exists within the Customer ecosystem.

  •   The vulnerability exists within Customer-provided code, configurations, or customizations.

  • CVE is disputed, rejected, or withdrawn by NVD or the relevant authority.

  •   Customer has not provided required access, information, or timely response to Root inquiries.

  •   The Subscribed Image or the Subscribed Library is designated as Community (no SLA)

  •  A CVE Surge Condition applies (See Section 5).

  •   Vulnerability exists in a FIPS, STIG, or specialized image for which Customer does not have entitlement.

  •   Pre-existing CVE debt for RLC (covered by CVE Burn Down entitlement if applicable).

7.2 Force Majeure

Neither party shall be liable for failure to perform obligations due to events beyond reasonable control, including natural disasters, acts of war or terrorism, pandemic, government action, or failure of third-party infrastructure providers (a “Force Majeure” event).

8. SLA REMEDY AND ESCALATION

8.1 Escalation Path

Customer shall report SLA issues through Root's support organization as follows:

•   Level 1: Account Manager

•   Level 2: Head of Customer Success

•   Level 3: Head of Field Engineering

•   Level 4: CTO

Customer shall not escalate an SLA issue to the next Level of the support organization unless the prior level of support has failed to address and remedy an SLA issue within the timeframes provided for in this Service Level Agreement.

8.2 No Service Credits

SLA timelines represent Root's performance targets. Failure to meet SLA timelines does not entitle Customer to automatic service credits or financial remedies. Customer's remedy is escalation per Section 8.1 and, where applicable, termination rights per Section 9.

9. TERMINATION FOR SLA FAILURE

9.1 Conditions for Termination

Customer may terminate the Agreement for material SLA failure only if all of the following conditions are met:

  •   Root fails to remediate a Critical severity or CISA KEV vulnerability within two times (2x) the applicable SLA timeline;

  •   Customer has escalated to Root Labs per Section 6 and Root Labs has exhausted the thirty (30) day extended research period without a remediation or providing a reasonable alternative (VEX enforcement, workaround, alternative image);

  •     Customer provides written notice specifying the SLA failure; and

  •     Root fails to cure within forty-five (45) days of such notice.

9.2 Refund Upon Termination

Upon termination pursuant to Section 9.1, Customer is entitled to a pro-rata refund of prepaid fees for the unused portion of the subscription term, less fees attributable to the sixty (60) days following the effective termination date to facilitate Transition Services.

9.3 Limitations

Termination under this Section does not apply to:

•   CVEs where a CVE Surge Condition existed.

•   CVEs excluded under Section 7.

•   Situations where Customer has failed to reasonably cooperate with Root's remediation efforts.

10. MODIFICATIONS

Root may modify this SLA by posting an updated version to www.root.io/sla. Material changes will be communicated with at least thirty (30) days notice. If changes are not acceptable to Customer, Customer may elect to terminate the Agreement and receive a pro-rata refund of prepaid fees for the unused portion of the subscription term, less fees attributable to the sixty (60) days following the effective termination date to facilitate Transition Services.

Trusted by companies who can't afford to slow down

No migrations.
Just fixes.

See how Root's CVE-first architecture works in 3 minutes.

No migrations.
Just fixes.

See how Root's CVE-first architecture works in 3 minutes.