Automated Lead Generation & Qualification with Google Maps, GPT-4 & HubSpot | n8n workflow template

This n8n workflow automates CVE tracking by retrieving vulnerability details from the NVD API πŸ›‘οΈ, organizing and updating the data in Google Sheets πŸ“Š, and optionally alerting teams via Slack or Email πŸ“©πŸ’¬.


Who is this for?

This workflow is ideal for:

  • Security operations (SecOps) teams πŸ§‘β€πŸ’»
  • DevSecOps engineers πŸ› οΈ
  • IT compliance officers 🧾
  • Vulnerability management analysts πŸ•΅οΈ
  • Sysadmins or cloud engineers in regulated industries 🏒

What problem does this workflow solve?

Manually checking for the latest CVE information is inefficient and error-prone. This automation:

  • Monitors NVD for CVE entries based on product or keyword filters πŸ”
  • Tracks new vulnerabilities and changes to existing ones ⏱️
  • Logs all CVE data in a structured Google Sheet for ongoing review and audit 🧾
  • Can trigger alerts or actions for high-severity CVEs 🚨

What this workflow does

This workflow builds an automated CVE monitoring system that:

  • Queries the NVD API for vulnerability data matching keywords (e.g. “Apache”, “Log4j”) πŸ“‘
  • Extracts relevant fields: CVE ID, description, severity (CVSS scores), published/modified dates, and affected products πŸ—‚οΈ
  • Saves or updates the information in Google Sheets πŸ“‘
  • Optionally filters for critical severity (e.g., CVSS > 8.0) and sends Slack alerts or emails πŸ“¬
  • Supports historical tracking and change detection over time πŸ•’

Includes a Google Sheets template for tracking:

  • CVE IDs and metadata
  • Severity levels and scores
  • Product/component tags
  • Resolution/patch status tracking

Setup

Prerequisites

You’ll need:

  • An n8n instance (cloud or self-hosted) ☁️
  • A Google account + Google Sheets API credentials πŸ“‘
  • (Optional) Slack webhook URL or email setup for notifications πŸ’¬

Step 1: Configure API Inputs

Open the πŸ”§ Configuration node and provide:

  • NVD API parameters (keyword filters, date ranges, etc.)
  • Google Sheet ID and tab name for output
  • Slack webhook URL (optional)

Step 2: Set Filters & Preferences

Define:

  • Target keywords or CPE filters (e.g. β€œCisco ASA”, β€œWindows 10”) 🧩
  • CVSS threshold for high/critical alerts 🎚️
  • Update frequency (manual trigger, scheduled cron, webhook, etc.) πŸ”

Step 3: Connect to Google Sheets

  • Update Sheet node with your destination Sheet ID
  • Ensure columns like CVE ID, Description, Severity, Last Updated exist

Step 4: Enable Alerts (Optional)

  • Set up Slack node with your webhook URL or connect SMTP/Email node
  • Format alert message with key CVE data

Step 5: Activate and Run

  • Save and activate the workflow πŸ”›
  • Run manually or schedule it to run periodically (e.g., every 6 hours) ⏱️

Customization Tips

  • Add deduplication logic to avoid reprocessing the same CVEs ♻️
  • Use filters to monitor only critical CVEs or specific vendors/vendors πŸ”
  • Extend with GitHub Security Advisories or Exploit DB integration 🧩
  • Track remediation status and link to patch notes or fixes 🩹

Troubleshooting

Common Issues

  • Empty results from NVD: Check if your keywords are too narrow or if NVD API rate limits apply πŸ“‰
  • Google Sheets error: Ensure the Sheet ID and tab names are correct and accessible πŸ”‘
  • Alerts not sending: Check Slack webhook or email configurations πŸ”§

Getting Help


This template was created by David Olusola. πŸ›‘οΈ

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

You may also like these