Automate CVE Detection with AI-Powered Nuclei Template Generation & Google Drive
Short description
Automates collection, technical extraction, and automatic generation of Nuclei templates from public CVE PoCs.
Converts verified PoCs into reproducible detection templates ready for testing and distribution.
Purpose
Provide a reliable pipeline that turns public proof-of-concept data into usable detection artifacts.
Reduce manual work involved in finding PoCs, extracting exploit details, validating sources, and building Nuclei templates.
How it works (technical summary)
Runs a scheduled SSH job that executes vulnx with filters for recent, high-severity PoCs.
Parses the raw vulnx output and splits it into individual CVE entries.
Extracts structured fields: CVE ID, severity, title, summary, risk, remediation, affected products, POCs, and references.
Extracts URLs from PoC sections using regex.
Validates each URL with HTTP requests. Invalid or unreachable links are logged and skipped.
Uses an AI agent (OpenAI via LangChain) to extract technical artifacts: exploit steps, payloads, endpoints, raw HTTP requests/responses, parameters, and reproduction notes. The prompt forces technical-only output.
Sends the extracted technical content to ProjectDiscovery Cloud API to generate Nuclei templates.
Validates AI and API responses. Accepted templates are saved to a configured Google Drive folder.
Produces JSON records and logs for each processed CVE and URL.
Output
Nuclei templates in ProjectDiscovery format (YAML) stored in Google Drive.
Structured JSON per CVE with metadata and extracted technical details.
Validation logs for URL checks, AI extraction, and template generation.
Intended audience
Bug bounty hunters.
Security researchers and threat intel teams.
Automation engineers who need reproducible detection templates.
Setup & requirements
n8n instance with workflow imported.
SSH access to a host with vulnx installed.
OpenAI API key for technical extraction.
ProjectDiscovery API key for template generation.
Google Drive OAuth2 credentials for storing templates.
Configure schedule trigger and target Google Drive folder ID.
Security and usage notes
Performs static extraction and validation only. No active exploitation.
Processes only PoCs that meet configured filters (e.g., CVSS > 6).
Use responsibly. Do not target systems you do not own or have explicit permission to test.
Related Templates
USDT And TRC20 Wallet Tracker API Workflow for n8n
Overview This n8n workflow is specifically designed to monitor USDT TRC20 transactions within a specified wallet. It u...
Send structured logs to BetterStack from any workflow using HTTP Request
Send structured logs to BetterStack from any workflow using HTTP Request Who is this for? This workflow is perfect for...
Automate Daily Keyword Research with Google Sheets, Suggest API & Custom Search
Who's it for This workflow is perfect for SEO specialists, marketers, bloggers, and content creators who want to automa...
๐ Please log in to import templates to n8n and favorite templates
Workflow Visualization
Loading...
Preparing workflow renderer
Comments (0)
Login to post comments