Cloud Run Job that collects supply-chain threat intelligence, triages it with Gemini, and emits a JSON report to stdout.
Sources: GitHub Advisory Database · Reddit (r/netsec, r/cybersecurity) · RSS feeds (Phylum, Snyk, BleepingComputer) · NIST NVD · CISA KEV
Output: JSON array of prioritised threats — CRITICAL / HIGH / MEDIUM, enriched with CVE IDs, fixed versions, and monitored-package escalation.
cp .env.example .env
# Set GEMINI_API_KEY and GITHUB_TOKEN
python -m src securityDigestJSON goes to stdout. Diagnostics go to stderr (structured JSON for Cloud Run).
| Architecture | System design, data flow, package layout |
| Configuration | Env vars, sources.yaml reference, GCP secrets |
| Deployment | Cloud Run deployment via wakellm.sh |
| Development | Local setup, running tests |
| Modules | Package and function reference |
- Python 3.12+
GEMINI_API_KEY— Google AI StudioGITHUB_TOKEN— GitHub personal access token (public repo read scope)
MIT