Runwork
DaySchedule SSH (key-based auth) BigMailer Universal Summarizer by Kagi

Automated CVE scanning of Bug Bounty programs with Nuclei and Project Discovery

Streamline your vulnerability research by automatically scanning bug bounty scopes against the latest Project Discovery templates. This workflow manages remote Nuclei execution on a VPS and delivers critical findings directly to your inbox, ensuring you're the first to spot new CVEs. It transforms manual reconnaissance into a continuous, hands-off security monitoring engine.

Start Building

What This Recipe Does

This automation provides a comprehensive solution for scheduled security monitoring and system reporting across your infrastructure. By automatically connecting to your remote servers and fetching critical data, it eliminates the need for manual check-ins and reduces the risk of human error in security oversight. The workflow retrieves logs or system metrics via secure connections, processes the information to identify specific patterns or potential issues, and generates a concise summary of the findings. Instead of sifting through thousands of lines of raw log data, business leaders and IT managers receive a curated digest directly in their inbox via Gmail. This ensures that security teams remain informed about system status and potential vulnerabilities without being overwhelmed by noise. The inclusion of automated filtering and summarization means that only relevant, actionable information reaches the decision-makers. By bridging the gap between technical server data and business communication, this tool enhances organizational security posture and streamlines compliance reporting while saving hours of manual labor every week.

What You'll Get

Complete App

Forms, dashboards, and UI components ready to use

Automated Workflows

Background automations that run on your schedule

API Endpoints

REST APIs for external integrations

Connected Integrations

DaySchedule, SSH (key-based auth), BigMailer, Universal Summarizer by Kagi configured and ready

How It Works

  1. 1

    Click "Start Building" and connect your accounts

    Runwork will guide you through connecting DaySchedule and SSH (key-based auth)

  2. 2

    Describe any customizations you need

    The AI will adapt the recipe to your specific requirements

  3. 3

    Preview, test, and deploy

    Your app is ready to use in minutes, not weeks

Who Uses This

Frequently Asked Questions

Do I need to be a developer to set this up?

No. While the initial connection requires your server credentials and SSH access, the workflow is designed to deliver clear, business-ready reports that require no technical expertise to interpret.

Can I change which security events trigger an alert?

Yes. The filtering logic is fully customizable, allowing you to focus on specific events like failed logins, system updates, or unauthorized file changes that matter most to your business.

Which email providers are compatible with this report?

This specific automation is configured for Gmail, providing a seamless experience for Google Workspace users to receive and share security insights.

What format do the security reports arrive in?

You will receive a summarized text report directly in the body of your email, providing a high-level overview of system status and any anomalies detected during the scan.

Importing from n8n?

This recipe uses nodes like ScheduleTrigger, HttpRequest, ConvertToFile, Ssh and 8 more. With Runwork, you don't need to learn n8n's workflow syntax—just describe what you want in plain English.

ScheduleTrigger HttpRequest ConvertToFile Ssh SplitInBatches SplitOut Filter If Set Gmail Summarize StickyNote

Based on n8n community workflow. View original

Related Recipes

ManualTrigger SecurityScorecard

Generate, retrieve and download a report using the SecurityScorecard

Managing third-party risk and monitoring your own security posture is critical for modern business operations. This automation connects your workflow directly to SecurityScorecard, providing instant access to comprehensive cybersecurity ratings and risk assessments. Instead of manually searching through security portals, business leaders and procurement teams can trigger an on-demand analysis of any domain or vendor. This ensures that your organization maintains high security standards and only partners with companies that meet your specific risk requirements. By automating the retrieval of security intelligence, you reduce the time spent on manual due diligence and gain immediate clarity on potential vulnerabilities. This tool transforms raw security data into actionable insights, allowing you to make informed decisions about vendor onboarding, compliance adherence, and proactive risk mitigation. Whether you are preparing for an audit or evaluating a new software provider, this automation provides the transparency needed to protect your digital ecosystem and maintain stakeholder trust. It streamlines the evaluation process, ensuring that security is always a priority in your business decisions.

Build this
ManualTrigger SecurityScorecard

Generate, retrieve and download a report using the SecurityScorecard

This automation provides instant access to critical cybersecurity intelligence by integrating SecurityScorecard data directly into a streamlined application. Instead of manually navigating complex security dashboards, business leaders can trigger a comprehensive risk assessment with a single click. This tool is essential for organizations that need to evaluate the security posture of potential vendors, monitor their own digital footprint, or conduct competitive analysis. By automating the retrieval of security ratings, companies can make data-driven decisions during the procurement process and ensure that all third-party partners meet internal compliance standards. The automation reduces the time spent on manual research and provides a standardized view of risk factors such as network security, DNS health, and leaked credentials. Ultimately, this tool empowers procurement, IT, and risk management teams to mitigate cyber threats before they impact the business, ensuring a more resilient and secure operational environment. By centralizing these insights, your team can maintain a proactive stance on security without requiring deep technical expertise.

Build this
DaySchedule SSH (key-based auth) BigMailer Universal Summarizer by Kagi

Automated CVE scanning of Bug Bounty programs with Nuclei and Project Discovery

Managing server security and infrastructure integrity manually is a time-consuming process that often leads to oversight. This Security and Identity Audit automation streamlines your monitoring by performing scheduled, deep-dive checks across your remote server environment. The workflow connects to your systems via secure protocols, gathers raw log data, and processes it to identify critical patterns or anomalies. Instead of requiring a technical expert to manually parse through thousands of lines of system logs, the automation uses intelligent summarization to distill technical data into a clear, high-level overview. Business leaders and security officers receive a concise report via email, highlighting exactly what changed, who accessed the systems, and whether any unauthorized activity was detected. This proactive approach ensures consistent compliance with security policies while freeing your technical team from routine monitoring tasks. By centralizing the reporting of distributed infrastructure, you maintain a robust security posture with minimal manual effort.

Build this

Ready to build this?

Start with this recipe and customize it to your needs.

Start Building Now