Ensure timely response to security vulnerabilities with this workflow template, wherein team members receive an alert through Slack whenever a specific Common Vulnerabilities and Exposures (CVE) identifier is mentioned. The workflow extracts the CVE from the Slack event, searches Wiz and Snyk for details about the vulnerability, and posts the findings directly into the Slack thread. This allows Application Security Operations teams to swiftly gather intelligence on potential threats, streamlining the process of vulnerability management.
Trigger
Slack
Optional Triggers
Webhook,"Microsoft Teams"
Use Cases
Application Security Operations , Security Bots
Workflow Breakdown
Receive a mention via Slack for a specific CVE to search for
Extract the CVE from the event text
Search through Wiz and Snyk for CVE issues
Send the results and findings to the Slack thread via a snippet
Vendors
Slack, Utils, Wiz, Snyk
Workflow Output
Slack output of CVE findings
Tips
The workflow is triggered by a mention of \"cve-search\