Skip to main content
All CollectionsTemplatesBasic
Search for CVE Findings in Orca Triggered by Slack - Workflow Template
Search for CVE Findings in Orca Triggered by Slack - Workflow Template

Receive a mention via Slack for "orca-cve", kick off a search in Orca for the specific CVE and update the thread in Slack with the results.

Updated over a week ago

The "Search for CVE Findings in Orca Triggered by Slack" workflow template allows teams to swiftly identify and communicate the impact of a specific Common Vulnerabilities and Exposures (CVE) within their digital ecosystem. Through Slack, a CVE mention activates a search in Orca for related findings. If assets are affected, the workflow sends a list of asset names back to the Slack thread and offers additional details upon request, aiding prompt and informed security responses.

Trigger

Slack

Optional Triggers

"Microsoft Teams"

Use Cases

CSPM, Security Bots

Workflow Breakdown

  1. Receive a mention via Slack for orca-cve

  2. Search in Orca for the specific CVE

  3. If findings are found for the CVE, send the asset names to the Slack thread

  4. Ask if more details are required, if so, send a snippet of the JSON information to the thread

Vendors

Slack, Utils, Orca

Workflow Output

CVE findings from Orca in the Slack thread

Did this answer your question?