Here’s a boring truth:
Cybersecurity and Infrastructure Security Agency publishes critical cybersecurity advisories.
Here’s a less comfortable truth:
Most teams never check them.
CISA maintains the Known Exploited Vulnerabilities (KEV) catalog. These are not “theoretical risk under certain lab conditions” bugs. These are vulnerabilities attackers are actively exploiting in the wild, right now, against real systems.
When something lands in KEV, it’s not a polite suggestion. It’s a flare in the sky that says: patch this, or prepare for visitors.
And yet—no one wakes up thinking, “Before coffee, let me refresh a federal website.”
We’re building product.
We’re shipping features.
We’re arguing in Slack.
We’re trying to remember where that one Terraform variable is defined.
So I built a bot that does the refreshing for us.
The Problem: Critical Intel, Zero Attention Span
Let’s be honest.
When was the last time you checked CISA’s advisory page?
If you’re a founder, CTO, or lean security team, the answer is probably somewhere between “I should” and “Isn’t someone doing that?”
That gap is expensive.
CISA advisories include CVEs, severity ratings, affected products, mitigation guidance. For KEV entries, they explicitly call out active exploitation. When you learn about those 48 hours late, those 48 hours are often when attackers are scanning the internet at industrial scale.
Most SMBs don’t have a SOC. They have:
- A CEO/CTO wearing 12 hats
- An ops person who “handles security” between deploys
- Or hope (or not)
Hope is not a control.
But expecting a 30-person company to manually monitor a government advisory page isn’t realistic either.
The Solution: A Stateless Bot That Just Works
I built the CISA Advisory Monitor — a simple GitHub Action that watches CISA’s advisory page and pushes structured alerts straight into Slack or Telegram.
No database.
No server.
No “please contact sales.”
Here’s the flow:
GitHub runs hourly ↓Scrapes the advisory listing ↓Compares against a JSON state file ↓For each new advisory:– Fetch full page– Extract CVEs, severity, affected products– Format a rich alert– Send to Slack (Block Kit) or Telegram (HTML) ↓Mark as processed only after successful delivery
If Slack is down, it retries next run. No silent drops. No “we thought we sent it.”
It runs in under two minutes.
Then it goes back to sleep.
Why This Actually Matters
Speed matters. If six new KEVs drop at 9:00 AM, you want to know by 10:00—not next week when someone stumbles across a tweet.
Placement matters. Alerts land where your team already lives. Not in a forgotten bookmark. Not in an RSS feed nobody reads.
Simplicity matters. Fork. Add secrets. Enable workflow. Done.
This is the same pattern I wrote about in The Security Vendor Maze: most SMBs are drowning in dashboards and starved for signal. They don’t need 400 toggles and a quarterly business review. They need clear, high-quality alerts delivered where decisions happen.
This bot is deliberately boring.
And boring is beautiful.
Btw, Nano Banana create a nice logo to this bot, no?
What You Actually Get
Each alert includes:
- Severity (Critical / High / Info)
- Explicit warnings when exploitation is confirmed
- Full CVE list for cross-checking against your asset inventory
- Summary + direct link to the advisory
No fluff.
No AI-generated poetry.
Just the facts.
The Stack: Intentionally Simple
TypeScript. Node 20. Cheerio. Axios. Pino. Zod.
No AI. No blockchain.
No distributed event mesh powered by quantum vibes.
Just a script on a schedule that does one thing well.
Security tooling should be reliable and forgettable. You set it once, and it hums quietly in the background—until something actually matters.
Bigger Picture
CISA is doing important work.
Curating the vulnerabilities that are not hypothetical, but proven to be exploited.
But publishing isn’t enough. Signal only matters if someone receives it.
This bot is a bridge between public intelligence and the messy reality of how teams operate. No vendor lock-in. No dashboard fatigue. No noise.
Just:
“CISA flagged this. You might want to look.”
If you’re running a startup, leading a small security team, or you’re the person who knows deep down that “we should really monitor KEV” –> feel free to use this: https://github.com/greenido/CISA-alerts-bot
Security doesn’t have to be dramatic.
It just has to be consistent.
Be strong and patched.
Discover more from Ido Green
Subscribe to get the latest posts sent to your email.
