Smarter security with Chainguard Libraries and Cloudsmith.
Made to eliminate supply chain attacks at package build and distribution. Chainguard Libraries is a curated set of high-assurance, open-source packages built entirely from source in a hardened environment. Each package has SLSA Level 2 provenance and is minimal, verifiable, and production-ready. There’s no repackaging and no guesswork. You get secure, reproducible builds with full traceability. These libraries are continuously updated so your dependencies stay current and tamper-resistant.
How we support Chainguard Libraries
Why teams integrate Cloudsmith with Chainguard Libraries
Frequently asked questions
Cloudsmith supports upstream proxying for Chainguard Libraries across Java (Maven/Gradle), Python (PyPI/pip/uv), and JavaScript (npm). Each ecosystem can be configured as a separate upstream source within a Cloudsmith repository, with priority ordering relative to public registry fallbacks.
You configure two upstream sources in your Cloudsmith repository: Chainguard Libraries at priority 1, and the public registry (PyPI, Maven Central, or npm) at priority 2. Cloudsmith resolves package requests against Chainguard first. If a package is not yet in the Chainguard index, the request falls back to the public registry. Packages from the public registry can be subject to quarantine periods and policy rules you define, so fallback traffic is governed rather than open.
No. Once Cloudsmith is configured as the upstream endpoint for a given ecosystem, developers and CI systems continue using their existing tools: pip, Maven, Gradle, npm, pnpm, Yarn, and so on. Chainguard Libraries appear as a standard upstream repository, so workflows stay identical. The only change is where the packages come from.
This is the most common migration issue. Build systems cache previously downloaded packages, and those caches will reuse old artefacts even after you reconfigure your upstream. Before switching, clear local caches across developer machines and CI environments, and update cache keys in tools like GitHub Actions to force a cache miss. Cloudsmith's audit logs show you exactly what is being served from cache versus fetched fresh, helping you validate a clean migration.
Every Chainguard Library package carries Sigstore signatures, a signed SBOM, and SLSA Level 3 provenance. When served through Cloudsmith, all package metadata and attestation data is preserved. Cloudsmith's audit logs record the pull event with a full timestamp, requesting identity, and package version, giving you an end-to-end chain of custody from Chainguard's build factory to your build environment.
Yes. Cloudsmith's policy engine, powered by OPA Rego, lets you define rules that apply to any package entering your repository, regardless of upstream source. For public registry fallback traffic, you can enforce quarantine or cooldown periods, restrict package versions, and block flagged packages - so packages sourced outside the Chainguard index are still subject to governance before reaching developers.
If you configure a Chainguard-only upstream with no fallback, a build will fail on missing packages until Chainguard adds coverage. If you configure a fallback to a public registry, the request is served from the public registry under whatever governance rules you have set in Cloudsmith. Chainguard logs missing package requests and prioritises them for future builds. For JavaScript, Chainguard's built-in npm fallback handles this more safely than a direct public registry fallback.
Once a package is pulled from Chainguard and cached in Cloudsmith, it is distributed across Cloudsmith's 600+ global edge PoPs. Subsequent requests from any region are served from the nearest edge location, not from Chainguard directly. This means your teams in APAC, EMEA, or the Americas all get low-latency access without hammering the Chainguard origin on every build.
Yes. Cloudsmith's repository-level access controls, token-based authentication, and RBAC let you define exactly which teams or service accounts can pull from a given repository containing Chainguard Libraries upstreams. You can create separate repositories per team or project, each with its own access policy, so that access to verified packages is governed just like any other artefact in your platform.
Yes. The combination is particularly well suited to regulated environments. Chainguard provides SLSA Level 3 provenance, signed SBOMs, and malware-resistant builds. Cloudsmith adds centralised audit logging, policy-as-code enforcement, SAML/SSO integration, and custom storage regions for data residency requirements. Together, they give compliance and security teams the evidence and controls needed to satisfy SOC 2, FedRAMP, and similar frameworks.