Building the secure-by-default future of open source

Chainguard builds and maintains an open toolchain for secure software delivery, contributes upstream fixes, and leads critical projects across the cloud-native ecosystem. We contribute back because it's the right thing to do—not to keep score, but to make the entire ecosystem more secure for everyone.

100+

Projects actively maintained and contributed to.

18+

Leadership positions across critical OSS foundations.

Automated

Bots monitoring upstream for new security releases.

Upstream-First

Fixes before scanners detect vulnerabilities. 

OUR OPEN SOURCE TOOLS

The tools we build and maintain

Essential infrastructure for secure-by-default software delivery.

An image of the Wolfi logo.

Wolfi

A community Linux (un)distribution designed for containers and cloud-native workloads. Built with security as a first-class concern, providing full provenance and SBOM support from the ground up.

Learn more

Octo-STS

OIDC token exchange for GitHub Actions enabling secure, keyless authentication for CI/CD workflows. Bridges the gap between GitHub Actions and external identity providers.

Read more

gitsign

Makes it effortless to sign commits and tags in CI environments. Leveraging Sigstore's keyless signing, it brings cryptographic verification to your Git history without key management burden.

Read more

digestabot

Keeps image digests current through automated PRs. Prevents supply chain attacks by ensuring deployments reference verified image versions.

Read more

dfc (Dockerfile Converter)

Helps teams transition from traditional Dockerfiles to declarative, reproducible apko and melange configurations. This migration helper accelerates the path to more secure, maintainable container builds.

Read more

Terraform Provider

Build, sign, attest, test, and publish container images entirely as infrastructure code. No manual steps, no drift, just reproducible builds.

Read more

Bazel rules_apko

Bazel rules for hermetic image builds with locked dependencies. Integrates secure container creation seamlessly into Bazel workflows.

Read more

apko

Declarative OCI image builder that produces minimal, reproducible container images with attestations and SBOMs. Eliminates the complexity of traditional Dockerfile builds.

Read more

melange

Declarative APK packaging system with multi-architecture support, built-in linters, and signing capabilities. Powers modern secure software distribution from source to package.

Read more

COMMUNITY CONTRIBUTIONS

Open source projects we contribute to

Chainguard team members create, maintain, and lead some of the most widely-used open source projects. 

A logo of the Kubernetes open source project.

Kubernetes

An image of the Sigstore logo.

Sigstore

SLSA

Tekton

Knative

Cosign

Rekor

gitsign

An image of the Wolfi logo.

Wolfi

Trino

FOUNDATION MEMBERSHIPS

Active participation across the ecosystem

We support and participate in the organizations shaping the future of open source.

Linux Foundation

CNCF

OpenSSF

OCI

Continuous Delivery Foundation

HOW WE CONTRIBUTE

Upstream-first philosophy

We don't just build on open source—we improve it for everyone

Upstream-first approach

We routinely upstream bug fixes and features across the entire stack—from kernel-level hardening to application security. No long-lived downstream patches, just contributions that benefit the entire ecosystem. We're a top 100 contributor to CNCF projects.

Originating security fixes

When upstream lags, we step up. We've authored and upstreamed patches for criticalCVEs in BusyBox, LangChain, and other essential components, ensuring the entire ecosystem benefits from our security research. 

Advisory feeds & scanner integrations

We publish vulnerability advisories in OSV and secdb formats, running scheduled pipelines to keep security scanners across the ecosystem accurate and current. 

REAL-WORLD IMPACT

CVE remediation in action

Examples of how we fix vulnerabilities upstream, not just downstream

BusyBox CVE patches

When long-standing BusyBox CVEs remained unpatched upstream, Chainguard engineers created and submitted patches to the BusyBox maintainers. We fixed CVE-2025-46394 and CVE-2024-58251, contributing the solutions back so all Linux distributions could benefit—not just our own users.

Rapid response

When vulnerabilities are discovered, we don't just patch our own images. Wecontribute fixes upstream so the entire open source community benefits. Ourengineers regularly submit patches, pull requests, and security advisories toupstream projects. 

Ecosystem-wide benefits

Our upstream contributions mean that Alpine Linux, Debian, Ubuntu, and otherdistributions can integrate our security fixes. We believe in strengthening the entireecosystem, not just building walls around our own products.

AUTOMATED SECURITY

Fixing vulnerabilities before they're detected

Our automated rebuild system delivers security fixes faster than traditional vulnerability scanning

Automated upstream monitoring

Our bots continuously monitor upstream projects for new releases. When security patches drop, our system automatically opens pull requests to rebuild packages—no waiting for CVE databases to catch up.

Hours, not weeks

When Go released version 1.20.6 fixing CVE-2023-29406, we delivered patched images within days. Traditional scanners couldn't even detect the vulnerability yet—the NVD hadn't published the required data, and most scanners ignore standard library issues. 

Cascading rebuilds

A single security patch triggers automatic rebuilds across all affected packages.When we patched Go, all 192 Go-based packages in Wolfi were rebuilt with the fix—including cert-manager, etcd, Kubernetes components, and Terraform.

The result

Eliminate risks from compromised build systems and hijacked package distribution mechanisms to mitigate malware attacks like XZ-Utils, MavenGave, and npm Shai-Hulud.

SUSTAINABLE STEWARDSHIP

Chainguard EmeritOSS

Safe, predictable maintenance for mature open source projects that have reached stability.

Kaniko

When Google archived Kaniko in 2025, we stepped in to provide maintenance-only support. We deliver CVE fixes, dependency updates, and maintained images to keep customer workloads running safely during their migration period.

Read more

Kubeapps

A beloved tool for deploying and managing applications in Kubernetes clusters. As maintainers reached natural lifecycle transitions, we're ensuring Kubeapps remains secure and operational, giving teams the stability they need during their migration planning.

Read more
A logo of the Kubernetes open source project.

ingress-nginx

A critical ingress controller embedded in countless Kubernetes deployments. Our stability-focused maintenance gives teams confidence to continue operating securely while evaluating their migration path.

Read more

MinIO

Designed for cloud-native and Kubernetes environments, MinIO provides scalable, durable storage for data lakes, backups, artifact storage, and machine learning workloads. With EmeritOSS, we'll continue supporting this high-performance, open source object storage system.

Read more

PgCat

PgCat is a PostgreSQL connection pooler and proxy that supports sharding, load balancing, failover, and mirroring. It’s a robust alternative to the classic PgBouncer that we're happy to support.

Read more

PushProx

Prometheus PushProx is a clever proxy and client solution that lets Prometheus scrape targets even behind NATs or firewalls, all while retaining the familiar pull-based model. This makes it much easier to monitor environments where direct scraping isn’t possible.

Read more

Depend on an unmaintained project?

If your organization relies on an archived or unmaintained open source project, we invite you to submit it for consideration. Our goal is to keep essential software running safely for as long as you need it.