Skip to content
Home SCA Tools Chainguard
CH

Chainguard

NEW
Category: SCA
License: Commercial (Free tier available)
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 10, 2026
5 min read
0 Comments

Chainguard provides hardened container images built to have zero or near-zero known CVEs. Where standard Docker Hub images regularly carry dozens of unpatched vulnerabilities, Chainguard Images are rebuilt nightly from source with only the packages needed to run the application.

As of February 2026, Chainguard has delivered over 500 million unique container build manifests and offers a catalog of more than 2,000 projects. The company was founded by former Google engineers who created Sigstore, the open-source signing standard for software artifacts, and has grown to an estimated $100M+ ARR trajectory.

What is Chainguard?

Chainguard is a supply chain security company that takes a different approach to vulnerability management. Instead of scanning images after they are built and filing tickets for remediation, Chainguard produces images that start clean. Every image is built on Wolfi, a minimal Linux undistro purpose-built for containers, and goes through an automated pipeline that rebuilds, patches, signs, and generates SBOMs without manual intervention.

The result is a drop-in replacement for popular base images (Node.js, Python, Go, Nginx, PostgreSQL, and hundreds more) that carries significantly fewer vulnerabilities from day one.

Zero-CVE Images
Images are built from source with only essential runtime dependencies. No shells, no package managers, no unnecessary utilities. Automated nightly rebuilds ensure the latest patches are always applied.
Built-in SBOMs
Every Chainguard Image includes a high-quality SBOM generated at build time, attesting exactly what software is inside. Available in standard formats without additional tooling.
Sigstore Signing
All images are cryptographically signed using Sigstore and include SLSA Build Level 2 provenance attestations, verifying the integrity of the build process from source to artifact.

Key features

Distroless, minimal images

Chainguard Images follow a distroless philosophy. They contain only the application and its essential runtime dependencies. Shells, package managers, debugging utilities, and other common tools that expand the attack surface are excluded by default. Development variants (tagged :latest-dev) include a shell for debugging but are not intended for production.

This minimal approach dramatically reduces the number of packages in each image, which directly reduces the number of potential vulnerabilities.

Automated nightly rebuilds

The Chainguard factory platform, powered by DriftlessAF, rebuilds every image nightly from source. This is not just a base layer update. The entire image is reconstructed, pulling in the latest security patches from upstream sources. AI-driven reconciliation bots trigger dependency updates and vulnerability-based rebuilds automatically, so images stay current without manual intervention.

500M+ build manifests
As of February 2026, Chainguard has surpassed 500 million unique container build manifests. The automated factory produces builds across the entire catalog continuously, ensuring that patched versions are available within hours of upstream fixes.

Wolfi: the container-native Linux undistro

Wolfi is Chainguard’s purpose-built Linux distribution for containers. Unlike traditional distributions that ship hundreds of packages to support general-purpose computing, Wolfi packages are granular and independently versioned. Key characteristics include:

  • No kernel – Wolfi relies on the host kernel, reducing the package footprint
  • apk-based – Uses the Alpine Package Keeper format for fast, minimal package management
  • Security hardening – Packages compiled with hardening flags (PIE, RELRO, stack protectors)
  • Detailed provenance – Every package includes SBOM data and build attestations

SBOM and attestation

Every Chainguard Image ships with an SBOM generated during the build process. These are not afterthought scans. The SBOM reflects exactly what went into the image at build time, making it far more accurate than post-build scanning tools that may miss statically linked binaries or embedded libraries.

Images also include Sigstore cosign signatures and SLSA Build Level 2 provenance attestations. You can verify the entire chain from source commit to container registry.

Catalog breadth

The Chainguard catalog covers 2,000+ projects including popular runtimes, databases, web servers, and development tools. Recent expansions added nearly 600 new projects in the second half of 2025 alone.

CategoryExample Images
RuntimesNode.js, Python, Go, Ruby, Java (JRE/JDK), .NET, PHP, Rust
DatabasesPostgreSQL, MySQL, MariaDB, Redis, MongoDB
Web ServersNginx, Caddy, Traefik, HAProxy
InfrastructureKubernetes, Helm, Terraform, Vault, Consul
CI/CDGit, GitHub Actions Runner, GitLab Runner
MonitoringPrometheus, Grafana, OpenTelemetry

Getting started

1
Pull a free image – Free tier images are available without login: docker pull cgr.dev/chainguard/python:latest
2
Verify the signature – Use cosign to verify: cosign verify cgr.dev/chainguard/python:latest --certificate-oidc-issuer=https://token.actions.githubusercontent.com
3
Check the SBOM – Download the attestation: cosign download attestation cgr.dev/chainguard/python:latest
4
Replace your base image – Update your Dockerfile FROM line to use Chainguard’s image as a drop-in replacement.
# Before: standard Python image with 100+ known CVEs
FROM python:3.12-slim

# After: Chainguard Python image with zero known CVEs
FROM cgr.dev/chainguard/python:latest

WORKDIR /app
COPY requirements.txt .
RUN pip install --no-cache-dir -r requirements.txt
COPY . .
CMD ["python", "app.py"]

Pricing

TierAccessSLAPrice
Free~50 images, :latest tag onlyNo CVE SLAFree
Catalog2,000+ images, version pinningCVE remediation SLAContact sales
Per-ImageSelected imagesCVE remediation SLAContact sales

Free tier images receive automatic updates including major and minor version bumps. Paid tiers add version pinning, extended support for older versions, and a guaranteed SLA for CVE remediation turnaround.

When to use Chainguard

Chainguard is the right choice when you want to eliminate container vulnerabilities at the source rather than triaging scan results after the fact.

Strengths:

  • Zero or near-zero CVEs out of the box, eliminating scan-and-patch cycles
  • Build-time SBOMs and Sigstore signatures for supply chain compliance
  • 2,000+ images covering most popular software stacks
  • Automated nightly rebuilds keep images current without manual effort
  • Free tier available for evaluation and small projects

Limitations:

  • Not a vulnerability scanner; it is a secure image provider (pair with Grype or Trivy for runtime scanning)
  • Distroless images lack shells, making debugging more difficult
  • Paid tiers required for version pinning and CVE remediation SLAs
  • Switching base images requires Dockerfile changes and testing across your stack
Best for
Organizations that want to eliminate container vulnerabilities proactively by using hardened, zero-CVE base images with built-in SBOMs and cryptographic signing, rather than scanning and patching after build.

How it compares:

vs.Key difference
Docker Hub Official ImagesDocker Hub images prioritize compatibility over security and often carry dozens of CVEs. Chainguard images are built minimal with zero known CVEs.
GrypeGrype scans existing images for vulnerabilities. Chainguard provides images that do not have vulnerabilities to begin with. Complementary tools.
Distroless (Google)Google’s distroless images pioneered the minimal approach. Chainguard extends it with nightly rebuilds, SBOMs, Sigstore signing, and a much broader catalog.
AlpineAlpine is small but still carries CVEs and requires manual patching. Chainguard images are rebuilt nightly and include supply chain attestations.

Frequently Asked Questions

What is Chainguard?
Chainguard provides hardened container images designed to have zero or near-zero known CVEs. Built on Wolfi, a Linux undistro purpose-built for containers, Chainguard Images strip out shells, package managers, and unnecessary utilities to minimize attack surface. Every image includes a build-time SBOM and Sigstore cryptographic signature.
Is Chainguard free?
Chainguard offers a free tier with approximately 50 container images tagged :latest and :latest-dev, available without login. These include SBOMs, signatures, and SLSA Build Level 2 provenance but are not covered by the CVE remediation SLA. Paid catalog and per-image licensing provides access to 2,000+ images with patching SLAs and version pinning.
How does Chainguard achieve zero CVEs?
Chainguard builds images from source using a minimal, distroless approach with only essential runtime dependencies. The automated factory rebuilds every image nightly, pulling in the latest security patches. The DriftlessAF platform uses AI-driven reconciliation bots to trigger dependency updates and vulnerability-based rebuilds automatically.
What is Wolfi?
Wolfi is a Linux undistro created by Chainguard, specifically designed for container and cloud-native environments. It does not include a Linux kernel, focusing instead on minimal package sets with granular, independent versioning. Packages are built with security hardening flags and come with detailed SBOM data.
How does Chainguard compare to Docker Hub official images?
Docker Hub official images are built for broad compatibility and often include hundreds of packages, leading to dozens or hundreds of known CVEs at any given time. Chainguard Images are built from source with a minimal approach, typically containing zero known CVEs. They also include build-time SBOMs and Sigstore signatures that Docker Hub images lack.

Complement with SAST

Pair dependency scanning with static analysis for broader coverage.

See all SAST tools

Comments

Powered by Giscus — comments are stored in GitHub Discussions.