Modern software development runs on open source, and that’s not hyperbole. Python alone pulls in dozens—sometimes hundreds—of third‑party libraries for even the simplest applications. While public repositories have fueled innovation at incredible speed, they’ve also created a new class of risk: Opaque build pipelines, unverifiable provenance, and a growing burden on teams to chase vulnerabilities after the fact.
Today marks the tech preview of Red Hat trusted libraries, a new package index designed to bring enterprise-grade trust, transparency, and security posture to application dependencies, starting with Python.
The problem isn’t just CVEs — it’s trust
Much of the industry conversation has centered on zero CVEs. While reducing known vulnerabilities is important, it’s only a symptom of a deeper issue. Development teams often lack answers to fundamental questions:
- Where did this library come from?
- How was it built?
- Can we prove it hasn’t been tampered with?
- Can we respond quickly when upstream has a fix?
Without verifiable provenance and trusted build systems, even a dependency with no known CVEs can still represent significant risk. At Red Hat, we believe the real challenge lies in how software is built, not just what gets shipped. That belief underpins everything we do in software supply chain security, and it’s what led to trusted libraries.
What are trusted libraries?
Trusted libraries provide enterprise‑ready, verifiably built open source libraries with complete supply chain transparency. In this Tech Preview, we are delivering:
- Curated Python packages: Libraries like Numpy, Pandas,and Flask, based on popularity.
- Build‑from‑source artifacts: Produced in Red Hat’s hardened build infrastructure.
- SLSA Level 3 provenance: Including signed build attestations and SBOMs.
- Continuous monitoring and automated rebuilds with upstream patches
- Seamless pip compatibility: Using
packages.redhat.com/trusted-libraries, no workflow changes are required.
Every library is built, signed, and distributed with the same rigor Red Hat applies to its enterprise platforms, so you can have greater confidence in every dependency you ship.
Built on a secure software factory
Trusted libraries are produced using Red Hat’s trusted software build factory, Konflux. This factory approach confirms that every step, from source ingestion to final distribution, is automated, auditable, and verifiable. Rather than treating code security as a post‑build activity, trusted libraries bakes trust directly into the pipeline:
- Ingest: Continuously monitor upstream projects for changes and patches.
- Build: Reproducible builds with SLSA Level 3 guarantees.
- Attest: SBOMs, provenance, and build attestations.
- Distribute: High-availability delivery through trusted registries.
The result is not just faster response to vulnerabilities, but a more trustworthy foundation for application development.
Designed for developers, platform teams, and security leaders
Trusted Libraries integrate naturally into existing workflows:
- Developers keep using familiar tools like
pip,requirements.txt, andpyproject.toml - Platform teams can enforce policies through Red Hat tooling and CI/CD integrations
- Security and compliance teams gain SBOMs and attestations aligned with emerging regulatory requirements
Trusted libraries are part of a larger, cohesive effort to enhance the security footprint of the entire software stack. Recently, Red Hat introduced Project Hummingbird, focused on delivering more frequently updated, verifiably built container images with an emphasis on reducing exposure to known vulnerabilities. While Hummingbird addresses trust at the container image layer, trusted libraries extend those same principles up the stack into application dependencies. Together, they represent a unified vision:
- Trusted application dependencies: Trusted Libraries
- Trusted base images: Project Hummingbird
- A shared and protected build foundation: Konflux
This end-to-end approach delivers greater consistency, from the base image your application runs on to the libraries your code imports. The service is included as part of the Red Hat Advanced Developer Suite, reinforcing a secure-by-default development experience across IDEs, CI/CD pipelines, and production environments on top of Red Hat OpenShift.
Tech Preview: What to expect
The Tech Preview of trusted libraries, available in February 2026, is designed for early adopters who want to help shape the future of trusted open source dependencies and provide us feedback ahead of general availability. Over time, we plan to expand trusted libraries to additional ecosystems, such as npm and Java.
Trust shouldn’t be optional—it should be built in, so sign up to participate in the Tech Preview of trusted libraries. We look forward to working with early adopters to shape the future of trusted open source!
Learn more
Red Hat Product Security
저자 소개
Sudhir Prasad is a Director of Product Management at Red Hat, where he leads the Software Supply Chain Security portfolio. He is responsible for defining product vision, strategy, and execution across multiple enterprise security platforms, helping organizations build, deliver, and operate software securely at scale.
At Red Hat, Sudhir has played a key role in incubating and scaling new software supply chain security products and driving enterprise adoption. His work spans secure software supply chains, artifact signing, security and compliance policy enforcement, secure application pipelines, and compliance automation. In addition, Sudhir drives Red Hat's strategy and execution around AI application and model safety and security, with a focus on enabling secure and compliant AI adoption in regulated and security-sensitive environments. His recent work includes AI-driven initiatives for CVE exploitability analysis, risk assessment, and compliance across structured and unstructured data.
Prior to his current role, Sudhir led product management for Red Hat’s Storage and Data Services portfolios and has held senior product leadership roles at Violin Memory, NetApp, and HP.
Sudhir holds an MBA from Northwestern University’s Kellogg School of Management. He is passionate about building enterprise platforms at the intersection of security, AI, and cloud infrastructure.
유사한 검색 결과
Chasing the holy grail: Why Red Hat’s Hummingbird project aims for "near zero" CVEs
Elevate your vulnerabiFrom challenge to champion: Elevate your vulnerability management strategy lity management strategy with Red Hat
Data Security And AI | Compiler
Data Security 101 | Compiler
자세히 알아보기
- 체크리스트: 클라우드 보안을 개선하는 4가지 방법
- 백서: 하이브리드 클라우드 환경을 위한 보안 접근 방식
- 컨테이너와 쿠버네티스 보안에 대한 계층화된 접근 방식
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래