VERITY
Container images ship with packages — OS and application-level — that accumulate CVEs daily. Upstream maintainers patch on their own schedule — if at all. That leaves you choosing between manually rebuilding every image or running known-vulnerable containers in production.
Verity eliminates that trade-off. It continuously scans images, patches them in-place with Copa (no Dockerfile rebuild), and publishes signed, attested, drop-in replacements.
How it works
ghcr.io/verity-org Use a patched image
Replace your image reference. That's it.
Helm Charts
View all →Drop-in Helm wrapper charts with all image references pre-patched.
Image Catalog
Covering the full cloud-native stack — from language runtimes to service mesh, databases to
CI/CD. Every image is scanned, patched, signed, and published to
ghcr.io/verity-org.