https://github.com/underdog-tech/vulnbot
A tool for regularly querying vulnerabilities detected by 3rd party tools and reporting them back to your teams
https://github.com/underdog-tech/vulnbot
bot dependabot github hacktoberfest reporting slack slack-bot vulnerability-management vulnerability-report
Last synced: 2 months ago
JSON representation
A tool for regularly querying vulnerabilities detected by 3rd party tools and reporting them back to your teams
- Host: GitHub
- URL: https://github.com/underdog-tech/vulnbot
- Owner: underdog-tech
- License: mit
- Created: 2023-02-26T02:17:27.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-04-19T12:16:06.000Z (over 1 year ago)
- Last Synced: 2024-04-19T13:36:03.934Z (over 1 year ago)
- Topics: bot, dependabot, github, hacktoberfest, reporting, slack, slack-bot, vulnerability-management, vulnerability-report
- Language: Go
- Homepage:
- Size: 438 KB
- Stars: 23
- Watchers: 4
- Forks: 2
- Open Issues: 16
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Codeowners: .github/CODEOWNERS
- Security: SECURITY.md
Awesome Lists containing this project
README
# Vulnbot


[](https://goreportcard.com/report/github.com/underdog-tech/vulnbot)
[](https://github.com/underdog-tech/vulnbot/actions/workflows/tests.yml)
[](https://github.com/underdog-tech/vulnbot/actions/workflows/codeql.yml)
[](https://codecov.io/gh/underdog-tech/vulnbot)This project aspires to be a bot for pulling in security and vulnerability
alerts from all data sources you might have, and reporting them out to your
appropriate systems.Our currently supported data sources are:
* GitHub (Dependabot)
Our currently supported reporting systems are:
* Console
* Slack## Getting Started
To get started, you will want to first set up a `.env` file with the following:
```sh
SLACK_AUTH_TOKEN=insert_slack_token_here
GITHUB_TOKEN=insert_github_token_here
GITHUB_ORG=github_org_name
```The `env.example` file can be used as a template for this.
The GitHub token will need the following scopes: `public_repo`, `read:org`,
`read:user`, and `security_events`.You will then want to construct a `config.toml`, an example for which can be
found in `config.example.toml`.Once these files are in place, simply run `go run .` or
`go build . && ./vulnbot`!Alternately you can run this in Docker:
```sh
docker build . -t vulnbot
docker run --env-file .env -v ./config.toml:/app/config.toml vulnbot
```Building and running a Docker image would be helpful if, for example, you wanted
to run this as part of a regularly scheduled CI/CD job.## Documentation
At the moment, our documentation consists primarily of developer and
architecture docs. These can be found in the [docs/](docs/) folder, as well as
at .