For the complete documentation index, see llms.txt.

Overview of Chainguard Repository

Chainguard Repository Overview
  2 min read

The Chainguard Repository is a single, policy-managed experience for pulling artifacts that Chainguard either builds or distributes. It gives your organization one place to pull open source artifacts, configure security policies that govern how they are consumed, and monitor coverage and policy enforcement across your environment.

All artifacts served through the Chainguard Repository are either rebuilt by Chainguard from verifiable source in a SLSA L2-compliant build environment, or sourced from upstream public registries with configurable policy controls. As Chainguard builds more artifacts from source, your organization’s risk shrinks automatically without any changes to your configuration or developer workflows.

Artifact types

As of this writing, the Chainguard Repository contains the following artifact types:

Artifact typeDescription
Chainguard Libraries for JavaScriptOpen source language dependencies rebuilt from source for JavaScript (npm).

Endpoints

Each artifact type is accessible via its own endpoint:

Artifact typeEndpoint
Libraries for JavaScriptlibraries.cgr.dev/javascript

See each artifact type’s documentation for authentication and configuration details.

Policies for Libraries

The Chainguard Repository includes a policy engine that lets you define rules governing which artifacts can be consumed and under what conditions. Policies can be configured in the Chainguard Console or with chainctl, and are enforced automatically across your environment.

For language dependencies, policies apply to both Chainguard-built packages and upstream packages served via the optional fallback to public registries. Available policies include:

  • Upstream fallback: Control whether packages not yet built by Chainguard can be sourced from the upstream public registry.
  • Cooldown: When upstream fallback is enabled, block newly published package versions for a defined period before they can be pulled, giving the security community time to detect threats. The cooldown is configurable (0 to 3650 days) with a default of 7 days.

Note: Chainguard recommends a 7-day cooldown when enabling upstream fallback, to block a large share of malicious packages identified shortly after publication. Shorter cooldown periods increase the risk of pulling malicious or compromised upstream packages before the broader ecosystem can detect and report them.

All upstream packages are checked against public malware identifier feeds, and any package with a known malware idenitifier is blocked before being served.

Management

The Chainguard Console and chainctl can be used for configuring and managing policies across your organization. Learn more in Using the Chainguard Console and Get Started with chainctl.

Access the Console at console.chainguard.dev.

Learn more

Last updated: 2026-03-24 00:48