Cloudsmith Raises $72M to Secure AI Software Supply Chains

Cloudsmith Raises $72M to Secure AI Software Supply Chains

Software is now built by humans and AI agents working in tandem, generating code and dependencies at a pace that renders yesterday’s artifact repositories blunt instruments rather than safety systems, and that speed gap has turned package governance into a board-level risk that demands cloud-native scale, real-time policy, and verifiable provenance. Cloudsmith closed a $72 million Series C led by TCV with participation from Insight Partners and existing backers, signaling investor conviction that artifact management has shifted from storage to continuous control. The Belfast-based company said the capital will accelerate product development and go-to-market as Fortune 500 and Global 2000 teams replace self-hosted binaries and brittle mirrors. The pitch is direct: govern every package at every stage—source, build, test, deploy—across languages and formats without slowing delivery.

The Funding: Scale for an AI-Native Supply Chain

Platform Focus and Technical Roadmap

Cloudsmith’s roadmap circles three pillars that map to modern supply chain realities: provenance, policy, and performance. Provenance begins with signed artifacts and tamper-evident metadata, using standards such as Sigstore for keyless signing, in-toto attestations to track build steps, and SPDX SBOMs to describe component makeup. Policy then compiles those facts into enforceable controls—think Open Policy Agent with Rego rules—to block unsigned uploads, quarantine risky transitive dependencies, and require SLSA-aligned build attestations before promotion. Performance ties it together with globally distributed edge caches, immutable references, and per-tenant isolation designed to absorb AI-generated traffic spikes without cache poisoning or replication delay. The target is format-agnostic: Docker/OCI images, Maven, PyPI, NuGet, npm, Helm, Cargo, and Debian/Red Hat packages.

Enterprise-Grade Multitenancy and Integration

Building on this foundation, the company is emphasizing integrations that let security and platform teams move in lockstep. CI/CD connectors for GitHub Actions, GitLab, Jenkins, and Azure DevOps inject checks at publish and pull; admission controls for Kubernetes validate OCI image signatures and SBOMs at deploy; and VCS-aware provenance ties a commit to an artifact digest and runtime environment. Private networking through VPC peering and egress controls aligns with regulated workloads, while regional data residency and per-repository encryption keys address cross-border governance. Cloudsmith has also highlighted staged promotion pipelines—dev, staging, prod—with policy gates, plus quarantine channels where risky libraries can be patched or replaced. For buyers consolidating on one control plane, migration tooling maps from Artifactory or Nexus to unified namespaces, preserving metadata and access lists to limit downtime.

What Changes for Enterprises: Governance as a First-Class Control

Operational Impact and Compliance Playbook

For teams leaning into coding copilots and autonomous agents, governance now rides alongside speed rather than after it. A practical playbook starts with inventory: require SBOMs for every artifact, internal or third-party, and attach in-toto attestations to each build. Next, move to enforcement: mandate Sigstore verification on pull, turn on dependency diff alerts, and restrict publish rights with least-privilege tokens and short-lived credentials. Then close the loop at runtime by validating images via Kubernetes admission webhooks and blocking drift from approved repositories. This approach naturally leads to measurable outcomes—fewer unknown components in production, faster time to remediate CVEs through targeted rebuilds, and clearer audit trails for SOC 2, ISO 27001, or emerging software liability regimes. Large adopters have begun tying these controls to budget levers by assigning cost centers per repo and surfacing policy violations as gates in release checklists.

Strategic Considerations and Next Steps

Securing AI-era pipelines required a shift from periodic scanning to continuous verification, and the funding round created room to harden that control plane for scale, speed, and regulatory scrutiny. Practical next steps were clear: standardize on one artifact endpoint to collapse sprawl, roll out signing and SBOM generation inside the build system rather than as an external scan, and codify promotion rules in policy-as-code so exceptions could be reviewed, approved, and tracked. Teams evaluating platforms were advised to test for surge behavior with agent-generated dependency storms, confirm per-tenant key management and regional controls, and verify native support for OCI references, provenance attestations, and OPA enforcement. With those capabilities in place, enterprises could let AI agents ship faster while raising the assurance bar, aligning developer velocity with executive accountability without trading away control.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later