Settings

Configure your VulnTrack instance

Integration Status

Monitor and control your data source integrations

Loading integrations...

configured enabled healthy

Configuration Options: Click the Configure button on each integration to set up credentials via the UI, or use environment variables as a fallback.

UI settings take precedence over environment variables when both are present.

Data Synchronization

Sync data from GitHub, Upwind, and Jira

Scheduler Active

Google Directory

Sync users and groups from Google Workspace

Google Directory Not Configured

Set up a service account with domain-wide delegation to enable user sync.

Required environment variables:

  • GOOGLE_SERVICE_ACCOUNT_KEY - Path to service account JSON key
  • GOOGLE_ADMIN_EMAIL - Admin email for impersonation
  • GOOGLE_ALLOWED_DOMAIN - Your Google Workspace domain

Run ./scripts/setup-google-directory-api.sh to set up the service account.

Connected Domain

Admin Email

Sync Users

Import all users from Google Directory to the local database.

Create Team from Group

Import a Google Group as a VulnTrack team with all its members.

Select Google Group

Type at least 2 characters to search

Showing groups

Loading groups...

No groups found matching ""

Search for a Google Group to create a team

Automatic Sync: Google Directory users are automatically synced every hour in the background.

GitHub Repositories

Configure which repositories to scan for vulnerabilities, secrets, and SBOM

Search for repositories in your GitHub organization and click to add

Enter a repository in owner/repo format if you know the exact name

Loading repositories...

No repositories configured

Add repositories to start scanning for vulnerabilities, secrets, and dependencies.

After syncing, findings will appear on the global dashboard.

CODEOWNERS Scan Results

Jira Projects

Configure which Jira projects are available for team mappings

Available Jira Projects
No Jira projects found. Make sure Jira is configured.

Loading projects...

No Jira projects configured

Add projects to link them to teams.

UW

Upwind Sync Settings

Configure how vulnerabilities are synced from Upwind

Runtime agent (SENSOR) detects vulnerabilities that are actually running in your clusters via eBPF. These findings are more actionable because they confirm the vulnerable code is in active use.

Static scanner (CLOUD_SCANNER) analyzes container images for potential vulnerabilities. These may include vulnerabilities in packages that aren't actually in use at runtime.

UW

Upwind Resources

Configure which Kubernetes clusters and namespaces are available for team mappings

Available Resources Live from API From sync

Loading resources...

No Upwind resources configured

Add clusters and namespaces to link them to teams.

Data Management

View and manage unassigned findings (data without team mappings)

Loading data counts...

How Data Flows: Repositories added above are scanned for vulnerabilities, secrets, and SBOM data. Findings appear on the global dashboard immediately. You can then create teams and assign resources (directories, CODEOWNERS, etc.) to filter findings down to each team's scope.

Unassigned findings are those from scanned repos that haven't been linked to a team yet.

Vulnerability Findings

Threat Detections

Secret Alerts

SBOM Packages

Purge Unassigned Data

Purge All Unassigned Data

Remove all unassigned findings, threats, secrets, and SBOM packages at once

All findings are assigned to teams

No unassigned data to purge

Confirm Purge

Are you sure you want to permanently delete ? This action cannot be undone.