Skip to content

Deam0on/wakellm

Repository files navigation

wakellm-security

Cloud Run Job that collects supply-chain threat intelligence, triages it with Gemini, and emits a JSON report to stdout.

Sources: GitHub Advisory Database · Reddit (r/netsec, r/cybersecurity) · RSS feeds (Phylum, Snyk, BleepingComputer) · NIST NVD · CISA KEV
Output: JSON array of prioritised threats — CRITICAL / HIGH / MEDIUM, enriched with CVE IDs, fixed versions, and monitored-package escalation.

Quick start

cp .env.example .env
# Set GEMINI_API_KEY and GITHUB_TOKEN
python -m src securityDigest

JSON goes to stdout. Diagnostics go to stderr (structured JSON for Cloud Run).

Documentation

Architecture System design, data flow, package layout
Configuration Env vars, sources.yaml reference, GCP secrets
Deployment Cloud Run deployment via wakellm.sh
Development Local setup, running tests
Modules Package and function reference

Requirements

  • Python 3.12+
  • GEMINI_API_KEYGoogle AI Studio
  • GITHUB_TOKEN — GitHub personal access token (public repo read scope)

License

MIT

About

Cloud Run Job that fetches supply-chain threat intel from GitHub Advisories, Reddit, RSS, NVD, and CISA KEV - triages with Gemini, emits structured JSON.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Contributors