Switch to 中文版
A simple Go command-line tool that monitors the Openwall oss-security mailing list and sends notifications for new vulnerability posts to Slack or DingTalk. The tool supports keyword filtering to receive only the relevant security notifications.
- Periodic polling of Openwall oss-security mailing list.
- Send notifications to Slack and DingTalk.
- Filter messages by keywords.
- Keep track of visited vulnerabilities to avoid redundant notifications.
- Configurable polling interval (in minutes).
- Go 1.18 or higher.
-
Clone the repository:
git clone https://github.com/yourusername/vuln-notifier.git cd vuln-notifier
-
Build the Go application:
go build vuln-notifier.go
-
After building, you can run the tool directly:
./vuln-notifier
Flag | Description |
---|---|
-keywords |
Comma-separated list of keywords to filter messages (e.g., apache,critical ) |
-slack-webhook |
Slack webhook URL for notifications. |
-dingtalk-webhook |
DingTalk webhook URL for notifications. |
-interval |
Polling interval in minutes. Default is 60 minutes. |
To filter vulnerability posts related to Apache and send notifications every 30 minutes to both Slack and DingTalk:
./vuln-notifier -keywords="apache" -slack-webhook="https://hooks.slack.com/services/..." -dingtalk-webhook="https://oapi.dingtalk.com/..." -interval=30
This will send notifications for vulnerabilities related to Apache only, filtering out posts unrelated to it.
This project is licensed under the MIT License - see the LICENSE file for details.