More Guides will be available soon, Stay tuned!
You’ve got your AI tools running locally. You’re scanning targets and getting smart analysis. But what about staying updated daily with the latest vulnerabilities?
This week, we’ll automate that process with a cron job that fetches the latest CVEs and stores the results in a format compatible with your favorite note-taking system, like Obsidian.
We’ll use the CVE feed from MITRE’s API to pull the most recent entries each day.
First, test it manually:
$ curl -s 'https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json' | jq > ~/kev_daily.json
Then, schedule this to run every day at noon:
$ echo "0 12 * * * curl -s 'https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json' | jq > ~/kev_daily.json | crontab -
Now, every day, you’ll get a fresh JSON file of the latest CVEs in your home directory.
$ ai-hack "Summarize CVE-2025-1234" > ~/obsidian/cve/CVE-2025-1234.md
Or loop through the JSON daily and auto-create Obsidian notes:
jq -r '.results[ ] | .cve_id + "\n" + .description + "\n---"' ~/cve_daily.json | while read -r line; do
filename=$(echo "$line" | head -n1)
echo "$line" > ~/obsidian/cve/$filename.md
ai-hack "Summarize $filename" >> ~/obsidian/cve/$filename.md
done
Now your Obsidian vault becomes a living CVE journal powered by local AI.
~/obsidian/
├── cve/
│ ├── CVE-2025-1234.md
│ ├── CVE-2025-9101.md
│ └── CVE-2025-1122.md
Each note contains:
• CVE ID
• Description from MITRE
• AI-generated summary + risk assessment
• Use Obsidian plugins like Daily Notes or Dataview to filter CVEs by severity
• Add tags (#critical, #auth-bypass, etc.) to help with filtering
• Combine with your ai-nuclei output for unified reporting
All the guides, tips, and tricks on this web site are for education purpose only, the website owner is not accountable for any use of this information