Secure, hosted Cargo registry for Rust teams
Cloudsmith gives your Rust teams a fully managed, private Cargo registry backed by enterprise-grade security, policy-as-code, and a global CDN. Proxy crates.io through Cloudsmith to apply vulnerability checks, license controls, and custom policies before any crate reaches your developers or AI agents.
Cargo and 30+ formats, one place. Cloudsmith is the secure artifact store for every dependency your Rust teams and AI agents rely on.
- Use Cargo + 30 other formats
- Store Docker container images alongside Rust crates in the same repository
- Centralize ML models and raw binary assets with your Cargo dependencies
How we support Cargo
Cargo.toml at Cloudsmith and start publishing crates immediately.Why teams choose Cloudsmith for Cargo
Signs you're ready to switch to Cloudsmith for Cargo
Get started with Cargo on Cloudsmith
Frequently asked questions
Yes. Cloudsmith supports both the traditional Git-based index protocol and the Sparse registry protocol introduced in Cargo v1.68. The Sparse protocol is recommended because it reduces bandwidth and improves dependency resolution speeds significantly compared to cloning the full index.
Yes. Cloudsmith supports crates.io as an upstream source. You can configure your Cloudsmith repository to proxy requests for public crates, cache them locally, and apply your security and licence policies before making them available to your teams.
Cloudsmith supports Entitlement Token authentication and HTTP Basic authentication for private Cargo repositories. You can configure credentials in your
.cargo/config.tomlfile or pass them via environment variables such asCARGO_REGISTRIES_<NAME>_TOKEN. For Cargo versions below 1.74, URL-based authentication with the Sparse protocol is also supported.Yes. Every crate pushed to or proxied through Cloudsmith is scanned for known CVEs. You can define OPA Rego policies to automatically quarantine or block crates that exceed your acceptable risk threshold, keeping vulnerable dependencies out of your build pipeline.
You can push your existing crates to Cloudsmith using the Cloudsmith CLI or the standard
cargo publishcommand. Update your.cargo/config.tomlto point at your Cloudsmith registry URL and you are ready to go. Our team is available to support migrations of any scale.Yes. Cloudsmith works with all major CI systems including GitHub Actions, GitLab CI, Jenkins, CircleCI, and Buildkite. You can pass authentication credentials via environment variables, ensuring your pipelines pull and publish crates securely without storing secrets in source code.
Yes. Cloudsmith's policy engine can inspect the licence metadata extracted from each crate and block or flag crates with prohibited licences before they are made available. This is critical for commercial software teams who cannot incorporate certain open source licences into their codebase.
Yes. Cloudsmith supports 30+ package formats in a single platform, and a single repository can hold multiple formats. This means your Rust crates, Docker images, Python packages, and other artifacts all live under one roof with unified access control, audit logging, and policy enforcement.
Cloudsmith acts as the single source of truth for all crates demanded by AI agents and developers. By pointing agent package managers at Cloudsmith, every crate is checked against your policies before use. This prevents AI agents from ingesting vulnerable, poorly maintained, or licence-incompatible crates from public registries.
Cloudsmith is a fully managed SaaS platform backed by a global CDN with 600+ edge points of presence. It is designed for high availability with automatic elasticity, meaning your Cargo registry scales with demand and stays available without any infrastructure management on your part. Enterprise SLA options are available.