back to home

greenbone / gvmd

Greenbone Vulnerability Manager - The database backend for the Greenbone Community Edition

352 stars
176 forks
25 issues
CShellXSLT

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing greenbone/gvmd in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/greenbone/gvmd)
Preview:Analyzed by RepoMind

Repository Overview (README excerpt)

Crawler view

Greenbone Vulnerability Manager The Greenbone Vulnerability Manager is the central management service between security scanners and the user clients. It manages the storage of any vulnerability management configurations and of the scan results. Access to data, control commands and workflows is offered via the XML-based Greenbone Management Protocol (GMP). Controlling scanners like the OPENVAS Scanner* is done via the Open Scanner Protocol (OSP). • Releases • Installation and Usage • Support • Maintainer • Contributing • Code style and formatting • CMake formatting • License Releases All release files are signed with the Greenbone Community Feed integrity key. This gpg key can be downloaded at https://www.greenbone.net/GBCommunitySigningKey.asc and the fingerprint is . Installation and Usage This module can be configured, built and installed with following commands: For detailed installation requirements and instructions, please see the file INSTALL.md. The file also contains instructions for setting up and for connecting to vulnerability scanners and to the *GSA* web interface. In case everything was installed using the defaults, then starting the manager daemon can be done with this simple command: To see all available command line options of gvmd enter this command: If you are not familiar or comfortable building from source code, we recommend that you use the Greenbone Enterprise TRIAL, a prepared virtual machine with a readily available setup. Information regarding the virtual machine is available at . Support For any question on the usage of please use the Greenbone Community Forum. If you found a problem with the software, please create an issue on GitHub. If you are a Greenbone customer you may alternatively or additionally forward your issue to the Greenbone Support Portal. Maintainer This project is maintained by Greenbone AG. Contributing Your contributions are highly appreciated. Please create a pull request on GitHub. Bigger changes need to be discussed with the development team via the issues section at GitHub first. Code style and formatting Before creating a pull request, it is recommended to run the following command: This reformats the new code to ensure that it follows the code style and formatting guidelines. CMake formatting All CMake files are formatted using gersemi. To install gersemi on a Debian based system the following commands can be used: To format all CMake files run the command: License Copyright (C) 2009-2026 Greenbone AG Licensed under the GNU Affero General Public License v3.0 or later.