https://github.com/sensensen404/vuln-notifier
A simple Go tool to monitor Openwall oss-security mailing list
https://github.com/sensensen404/vuln-notifier
Last synced: 3 months ago
JSON representation
A simple Go tool to monitor Openwall oss-security mailing list
- Host: GitHub
- URL: https://github.com/sensensen404/vuln-notifier
- Owner: sensensen404
- License: mit
- Created: 2025-01-16T17:06:49.000Z (4 months ago)
- Default Branch: main
- Last Pushed: 2025-01-26T13:46:21.000Z (3 months ago)
- Last Synced: 2025-01-26T14:28:52.556Z (3 months ago)
- Language: Go
- Homepage:
- Size: 21.5 KB
- Stars: 4
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - sensensen404/vuln-notifier - A simple Go tool to monitor Openwall oss-security mailing list (Go)
README
# vuln-notifier
#### Switch to [δΈζη](https://github.com/sensensen404/vuln-notifier/blob/main/README.zh_CN.md)
A simple Go command-line tool that monitors the Openwall oss-security mailing list and sends notifications for new vulnerability posts to Slack or DingTalk. The tool supports keyword filtering to receive only the relevant security notifications.
## Features
- Periodic polling of Openwall [oss-security mailing list](https://www.openwall.com/lists/oss-security/).
- Send notifications to Slack and DingTalk.
- Filter messages by keywords.
- Keep track of visited vulnerabilities to avoid redundant notifications.
- Configurable polling interval (in minutes).## Requirements
- Go 1.18 or higher.## Installation
1. Clone the repository:
```bash
git clone https://github.com/yourusername/vuln-notifier.git
cd vuln-notifier
```
2. Build the Go application:
```bash
go build vuln-notifier.go
```
3. After building, you can run the tool directly:
```bash
./vuln-notifier
```## Usage
### Command-line Options
| Flag | Description |
|---------------------|---------------------------------------------------------------------------------------------|
| `-keywords` | Comma-separated list of keywords to filter messages (e.g., `apache,critical`) |
| `-slack-webhook` | Slack webhook URL for notifications. |
| `-dingtalk-webhook` | DingTalk webhook URL for notifications. |
| `-interval` | Polling interval in minutes. Default is 60 minutes. |### Example:
To filter vulnerability posts related to **Apache** and send notifications every 30 minutes to both Slack and DingTalk:
```bash
./vuln-notifier -keywords="apache" -slack-webhook="https://hooks.slack.com/services/..." -dingtalk-webhook="https://oapi.dingtalk.com/..." -interval=30
```
This will send notifications for vulnerabilities related to Apache only, filtering out posts unrelated to it.## License
This project is licensed under the MIT License - see the [LICENSE](https://github.com/sensensen404/vuln-notifier/blob/main/LICENSE) file for details.