Skip to content

Automated Watch

Staying current on security vulnerabilities, on the updates of the 11 technologies in the infrastructure, and on competitor moves — that is a full-time job if done by hand. Three workflows automate this watch at different cadences and from different sources.

TypeWorkflowFrequencySource
SecuritySecurity CVE Watch (33n)Daily 6 AM + DIUN webhook + Monday 9 AMTrivy scanner
TechnologyTech WatchDaily 8 AMPerplexity API
CompetitiveBusiness WatchMonday 9 AMPerplexity API

Data sources

Local Trivy scanner

Perplexity API

DIUN webhook

Analysis + filtering · severity, novelty, impact

Notification Hub

Telegram digest with buttons


ProblemWithout auto watchWith auto watch
Undetected CVECaught by an audit or an incidentAlert by 6 AM
Outdated version”It worked yesterday”Breaking-change notification
Missed opportunityInformation slipped byWeekly digest with impact scoring

Each watch has a different cadence and source:

CriterionSecurityTechnologyCompetitive
UrgencyCritical (zero-day)MediumLow
FrequencyDaily + reactiveDailyWeekly
SourceLocal scanner (Trivy)Web search (Perplexity)Web search (Perplexity)
ActionPatch immediatelyPlan an updateAdapt strategy

This workflow watches 9 Docker images via Trivy:

ImageStackCriticality
n8nio/n8nn8n-stackHigh
odoo:18odoo-stackHigh
caddy:2-alpinesecurity-stackCritical
postgres:16n8n + odooHigh
redis:7-alpinen8n-stackMedium
qdrant/qdrantai-stackMedium
crowdsecurity/crowdsecsecurity-stackHigh
prometheusmonitoring-stackMedium
grafanamonitoring-stackMedium

Three triggers coexist:

  • Daily (6 AM): full scan of every image
  • DIUN webhook: targeted scan when a new version is detected
  • Weekly (Monday 9 AM): aggregated report with trends

The workflow filters by severity (CRITICAL + HIGH), drops CVEs without an available fix, and mutes CVEs already notified to avoid spam. Critical alerts go out instantly with action buttons:

🚨 CRITICAL CVE
Image: caddy:2-alpine
CVE: CVE-2026-1234
Severity: CRITICAL (9.8)
Package: openssl 3.1.2
Fix: openssl 3.1.3
[Update Now] [Details] [Defer]

Every morning at 8 AM, the workflow queries Perplexity for the 11 infrastructure technologies with a 7-day recency filter. The llama-3.1-sonar-small-128k-online model is used for speed.

The local AI (claude-haiku-yolo) then reviews the results and assigns a priority score (1-5), boosting security fixes (+1 or +2). Updates with a score >= 4 trigger an immediate alert.

The daily digest is structured per technology with an action code:

ScoreRecommended action
5Critical immediate update
4Priority update this weekend
3Plan in the coming week
1-2Informational, no action

If a major breaking change or security fix is detected, an Obsidian note is automatically created for documentation.

Every Monday at 9 AM, this workflow uses Perplexity in large model mode (llama-3.1-sonar-large-128k-online) for deeper market analysis. It watches:

  • Competitors: news, fundraising rounds, product launches
  • Keywords: “automation workflow”, “ERP cloud France”, “AI integration enterprise”
  • Prospects: news on target companies inside the CRM

The unique angle: when a piece of news is about a prospect already in Odoo, the workflow automatically enriches the CRM lead with a summary and creates a follow-up activity at D+2.


LimitImpactMitigation
Perplexity = paid APICost per requestSmall model daily, large weekly
CVE false positivesAlerts on non-exploitable CVEs”Ignore unfixed” filter + mute already notified
No custom image scanHome-built Dockerfiles not scannedPlanned: cover custom builds

If regulatory watch is needed:

  • Add a source for regulatory changes (GDPR, NIS2)
  • Alert when compliance work is required

If a sales team is involved:

  • Broaden competitive watch with more keywords
  • Odoo dashboard with enriched lead scoring
  • Per-rep digest

If Docker image volume grows:

  • Scan in parallel (batches of 3)
  • Prioritise scans by stack criticality
  • Reduce frequency for stable images