Revenue
$40.00M
2025
Funding
$892.00M
2025
Growth Rate (y/y)
640%
2025
Revenue
Sacra estimates that Chainguard hit $40M in annual recurring revenue (ARR) in January 2025. ARR was $37M at the end of 2024, up 640% YoY from approximately $5M in 2023. This explosive growth reflects the company's position at the center of enterprise software supply chain security, driven by regulatory mandates and high-profile breaches that have made secure container images a board-level priority.
The company serves over 150 paying customers including major enterprises like ANZ Bank, Canva, GitLab, HPE, Snap, Wiz, and Anduril. Chainguard projects reaching over $100M ARR before the end of 2026, suggesting continued triple-digit growth as organizations scramble to meet new SBOM and SLSA compliance requirements.
Revenue growth has accelerated alongside the company's product expansion beyond basic container images into AI-specific workloads and virtual machines. The federal and defense sectors represent a particularly high-growth segment, with Chainguard operating custom image registries on government networks to serve agencies facing Executive Order 14028 compliance deadlines.
Valuation & Funding
Chainguard is valued at $3.5 billion following their April 2025 Series D round, which raised $356 million co-led by Kleiner Perkins and IVP. The round included new strategic investors Salesforce Ventures and Datadog Ventures, with participation from all existing investors.
In October 2025, Chainguard announced a new $280M growth investment at that $3.5 billion valuation from General Catalyst’s Customer Value Fund, bringing total funding to $892M.
Previous investors include Sequoia Capital, Spark Capital, Redpoint Ventures, Lightspeed Venture Partners, Amplify Partners, and Mantis VC. The Series C in July 2024 valued the company at $1.12 billion, representing a more than 3x valuation increase in nine months.
Product
Chainguard builds ultra-secure container images and virtual machines that start with zero known vulnerabilities and stay that way through daily automated rebuilds. Platform engineers and security teams use Chainguard Images as drop-in replacements for standard base images like Ubuntu or Alpine Linux, swapping a single line in their Dockerfile to instantly eliminate hundreds of potential security holes.
The core product works through Chainguard's private registry at `cgr.dev`, where developers authenticate using the `chainctl` CLI tool. When they pull an image like `cgr.dev/chainguard/python:3.12`, they receive a minimal container built on Wolfi, Chainguard's custom Linux distribution designed specifically for containers. Unlike traditional distributions that bundle hundreds of unnecessary packages, Wolfi includes only the essential runtime components, dramatically reducing the attack surface.
Every 24 hours, Chainguard Factory 2.0—powered by the open-source DriftlessAF automation system—rebuilds the catalog of over 2,000 unique containers against the latest upstream packages. If a new CVE is patched upstream, the rebuilt image is immediately available and users receive notifications through email, Slack, or webhooks. Each image comes with a signed software bill of materials and SLSA-level-2 provenance attestation, providing the compliance documentation that security teams need for audits.
The platform extends beyond basic container images to include three major product lines. Chainguard AI Images target machine learning workloads with PyTorch, Conda, and NVIDIA drivers for GPU-accelerated environments. Chainguard Libraries extend the secure-by-default approach into language-specific dependencies, with the Python offering now in general availability providing backported CVE patches for critical and high-severity vulnerabilities alongside VEX advisories—allowing developers to remediate security issues without forced upgrades.
Chainguard VMs cover both application images like Jenkins, Nginx, and Squid Proxy, as well as base images including Chainguard OS, Java, and Python for cloud and on-premises deployments, enabling organizations to secure legacy infrastructure that hasn't migrated to containers. Security teams use the Chainguard Console to monitor their entire fleet, track SLA compliance, and export SBOMs for regulatory reporting.
Business Model
Chainguard operates a vertically integrated SaaS model that controls the entire software supply chain from operating system to final container image. Unlike traditional security vendors that scan existing artifacts for vulnerabilities, Chainguard eliminates vulnerabilities at the source by building and maintaining the base images themselves.
The company follows a B2B go-to-market approach with both product-led growth for individual developers and enterprise sales for large organizations. Pricing is structured as annual or monthly SaaS subscriptions with different catalog tiers, from basic hardened images to specialized FIPS-validated variants for federal customers. The model creates recurring revenue through continuous image updates and compliance reporting rather than one-time security scans.
Chainguard's ownership of Wolfi Linux provides significant competitive moats and margin advantages. By controlling the underlying distribution, they can implement security patches faster than vendors dependent on Ubuntu or Red Hat, while avoiding licensing fees paid to traditional Linux distributors. The company operates its own container registry infrastructure to ensure reliable access and enable per-pull authentication for targeted security advisories.
The business model scales efficiently as new customers can immediately access the full catalog of pre-built images without requiring custom development work. Enterprise customers pay premium pricing for SLA guarantees, dedicated support, and specialized compliance features, while the underlying infrastructure costs remain largely fixed.
Competition
Vertically integrated players
Docker represents the most direct competitive threat through their Official Images program and Scout security platform. With over 20 million developers in their ecosystem, Docker can push secure images at the registry level and bundle security scanning directly into developer workflows. However, Docker's continued reliance on Alpine and Ubuntu base images means they inherit the long tail of CVEs that Chainguard's Wolfi distribution avoids.
Red Hat's Trusted Software Supply Chain offering provides end-to-end pipeline security within OpenShift, combining Tekton build tasks, Quay registry signing, and RHEL Universal Base Images. Their enterprise support and FedRAMP certification paths compete directly with Chainguard in regulated markets, though Red Hat's approach requires customers to adopt their entire OpenShift ecosystem.
Google's Distroless images remain the de facto standard for minimal containers, while their Assured OSS program provides signed, SBOM-backed packages. The combination of free availability and GCP integration poses risks to Chainguard in Google Cloud-heavy accounts, though Google lacks the commercial support and frequent updates that enterprises require.
Full-duite DevSecOps platforms
Snyk has expanded beyond vulnerability scanning into application risk management through acquisitions like Enso Security, offering the broadest code-to-cloud coverage in the market. While Snyk provides container hardening guidance, they don't produce proprietary base images, instead focusing on developer adoption through IDE integrations and CI/CD pipeline embedding.
JFrog's Artifactory and Xray products create a comprehensive artifact management and security platform that competes with Chainguard's registry and scanning capabilities. JFrog's strength lies in supporting multiple package types beyond containers, though their security approach remains reactive scanning rather than proactive hardening.
Aqua Security and Sysdig offer runtime protection and compliance monitoring that extends beyond Chainguard's build-time focus. These platforms provide broader security coverage but require customers to manage their own base image security, creating potential integration opportunities rather than direct competition.
Open source alternatives
The Sigstore project provides free signing and transparency tools that reduce vendor lock-in across the software supply chain security market. While Sigstore enables any vendor to provide signed artifacts and SBOMs, it doesn't address the fundamental challenge of vulnerable base images that Chainguard solves.
SLSA framework adoption by major cloud providers creates standardized security requirements that benefit the entire market while reducing differentiation based on compliance features alone. Chainguard's advantage lies in actually meeting these standards rather than just providing the tooling to achieve them.
TAM Expansion
New products
Chainguard AI Images target the explosive growth in enterprise AI workloads by providing pre-hardened GPU and CPU images for PyTorch, Kafka, and Conda environments. As organizations deploy more machine learning models in production, they need the same security guarantees for AI infrastructure that Chainguard provides for traditional applications.
Chainguard Libraries extend the secure-by-default approach beyond operating system packages into language-specific dependencies where CVE patch cycles often lag months behind discovery. The Python offering reached general availability in October 2025 with backported patches for critical and high-severity vulnerabilities, enabling developers to remediate security issues without the breaking changes that come with forced upgrades to newer package versions.
Chainguard VMs expanded in September 2025 to include both application VMs (Jenkins, Nginx, Squid Proxy) and base VMs (Chainguard OS, Java, Python) with support for cloud and on-premises deployments. This positions Chainguard to secure legacy infrastructure that hasn't migrated to containers, significantly expanding addressable market beyond cloud-native workloads to capture the massive installed base of traditional virtual machine environments.
Customer base expansion
Federal and defense markets represent substantial expansion opportunities with high barriers to entry that favor established solutions. Chainguard's partnership with Booz Allen Hamilton (October 2025) demonstrated the value proposition in this segment: agencies using Chainguard received ATO approval in 8 weeks versus a prior year-long stall, saving thousands of engineering hours. The reference architecture for government deployments addresses Executive Order 14028 compliance requirements and positions Chainguard to capture increasing cybersecurity budgets in the public sector.
Regulated industries including financial services, healthcare, and critical infrastructure face the steepest penalties for supply chain breaches. Wins at companies like ANZ Bank and Anduril demonstrate Chainguard's ability to meet stringent compliance requirements that traditional security tools cannot address.
AI platform vendors represent a validated and rapidly scaling customer segment. Cloudera's integration (October 2025) demonstrated a 90%+ reduction in CVE footprint, proving the value proposition extends to data platforms where machine learning frameworks lag traditional software in security maturity. As enterprises consolidate AI workloads onto specialized platforms, securing these platforms at the infrastructure layer creates leverage across multiple end-customer deployments.
Geographic expansion
International markets offer significant expansion opportunities as software supply chain security regulations spread globally. The EU Cyber Resilience Act and similar frameworks in other regions create demand for the same secure-by-default approach that drives US growth.
Chainguard's global partner program (launched August 2025) provides a two-tier structure with incentives, enablement, and joint go-to-market alongside major cloud ecosystems including AWS, GCP, and Azure. This channel strategy enables efficient geographic scaling without requiring direct sales presence in every region, as partners can resell the standardized catalog of over 2,000 images with localized support and integration services.
Risks
Commoditization pressure: As major cloud providers and platform companies build their own secure base images, Chainguard's core value proposition could become a standard feature rather than a premium service. Google's Distroless images and Docker's expanding security features suggest that minimal, hardened containers may become table stakes rather than differentiated offerings.
Regulatory capture: Chainguard's growth depends heavily on compliance mandates like Executive Order 14028 and SBOM requirements that could be modified or repealed under different political administrations. Changes to federal cybersecurity requirements could significantly impact demand from both government and private sector customers who currently buy Chainguard primarily for compliance reasons.
Open source disruption: The emergence of community-driven alternatives to Wolfi or automated tools that can harden existing distributions could undermine Chainguard's technical moats. If the open source community develops effective ways to achieve similar security outcomes without proprietary distributions, Chainguard's pricing power and competitive advantages could erode rapidly.
News
DISCLAIMERS
This report is for information purposes only and is not to be used or considered as an offer or the solicitation of an offer to sell or to buy or subscribe for securities or other financial instruments. Nothing in this report constitutes investment, legal, accounting or tax advice or a representation that any investment or strategy is suitable or appropriate to your individual circumstances or otherwise constitutes a personal trade recommendation to you.
This research report has been prepared solely by Sacra and should not be considered a product of any person or entity that makes such report available, if any.
Information and opinions presented in the sections of the report were obtained or derived from sources Sacra believes are reliable, but Sacra makes no representation as to their accuracy or completeness. Past performance should not be taken as an indication or guarantee of future performance, and no representation or warranty, express or implied, is made regarding future performance. Information, opinions and estimates contained in this report reflect a determination at its original date of publication by Sacra and are subject to change without notice.
Sacra accepts no liability for loss arising from the use of the material presented in this report, except that this exclusion of liability does not apply to the extent that liability arises under specific statutes or regulations applicable to Sacra. Sacra may have issued, and may in the future issue, other reports that are inconsistent with, and reach different conclusions from, the information presented in this report. Those reports reflect different assumptions, views and analytical methods of the analysts who prepared them and Sacra is under no obligation to ensure that such other reports are brought to the attention of any recipient of this report.
All rights reserved. All material presented in this report, unless specifically indicated otherwise is under copyright to Sacra. Sacra reserves any and all intellectual property rights in the report. All trademarks, service marks and logos used in this report are trademarks or service marks or registered trademarks or service marks of Sacra. Any modification, copying, displaying, distributing, transmitting, publishing, licensing, creating derivative works from, or selling any report is strictly prohibited. None of the material, nor its content, nor any copy of it, may be altered in any way, transmitted to, copied or distributed to any other party, without the prior express written permission of Sacra. Any unauthorized duplication, redistribution or disclosure of this report will result in prosecution.