|
Some checks failed
Build and Test / Check formatting (push) Has been cancelled
Build and Test / scan-build (clang static analyzer) (push) Has been cancelled
Build and Test / Build gvmd (oldstable) (push) Has been cancelled
Build and Test / Build gvmd (with container scanning) (push) Has been cancelled
Build and Test / Build gvmd (with openvasd) (push) Has been cancelled
Build and Test / Build gvmd (stable) (push) Has been cancelled
Build and Test / Build gvmd (testing) (push) Has been cancelled
Build and Test / Unit Tests (push) Has been cancelled
Build and Test / Check CMake Formatting (push) Has been cancelled
Build Documentation / Build XML documentation and upload coverage (push) Has been cancelled
Build Documentation / Build GMP documentation (push) Has been cancelled
CodeQL / Analyze (push) Has been cancelled
Build and Push Container Images / Build and Push Container Images (credential stores) (push) Has been cancelled
Build and Push Container Images / Build and Push Container Images (agents) (push) Has been cancelled
Build and Push Container Images / Build and Push Container Images (container scanning) (push) Has been cancelled
Build and Push Container Images / Build and Push Container Images (default) (push) Has been cancelled
SBOM upload / SBOM-upload (push) Has been cancelled
Build and Push Container Images / notify (push) Has been cancelled
Build and Push Container Images / trigger-replication (push) Has been cancelled
Build and Push Container Images / Update Automatix (push) Has been cancelled
|
||
|---|---|---|
| .devcontainer | ||
| .docker | ||
| .github | ||
| cmake | ||
| config | ||
| docs | ||
| src | ||
| tools | ||
| .clang-format | ||
| .codecov.yml | ||
| .dockerignore | ||
| .gersemirc | ||
| .gitignore | ||
| .mergify.yml | ||
| cliff.toml | ||
| CMakeLists.txt | ||
| CMakePresets.json | ||
| COPYING | ||
| INSTALL.md | ||
| README.md | ||
| VERSION.in | ||
Greenbone Vulnerability Manager
The Greenbone Vulnerability Manager is the central management service between security scanners and the user clients.
It manages the storage of any vulnerability management configurations and of the scan results. Access to data, control commands and workflows is offered via the XML-based Greenbone Management Protocol (GMP). Controlling scanners like the OPENVAS Scanner* is done via the Open Scanner Protocol (OSP).
Releases
All release files are signed with
the Greenbone Community Feed integrity key.
This gpg key can be downloaded at https://www.greenbone.net/GBCommunitySigningKey.asc
and the fingerprint is 8AE4 BE42 9B60 A59B 311C 2E73 9823 FAA6 0ED1 E580.
Installation and Usage
This module can be configured, built and installed with following commands:
cmake .
make install
For detailed installation requirements and instructions, please see the file
INSTALL.md. The file also contains instructions for setting up
gvmd and for connecting gvmd to vulnerability scanners and to the
GSA web interface.
In case everything was installed using the defaults, then starting the manager daemon can be done with this simple command:
gvmd
To see all available command line options of gvmd enter this command:
gvmd --help
If you are not familiar or comfortable building from source code, we recommend that you use the Greenbone Enterprise TRIAL, a prepared virtual machine with a readily available setup. Information regarding the virtual machine is available at https://www.greenbone.net/en/testnow.
Support
For any question on the usage of gvmd please use the Greenbone Community
Forum. If you found a problem with the
software, please create an issue on
GitHub. If you are a Greenbone customer you may alternatively or additionally
forward your issue to the Greenbone Support Portal.
Maintainer
This project is maintained by Greenbone AG.
Contributing
Your contributions are highly appreciated. Please create a pull request on GitHub. Bigger changes need to be discussed with the development team via the issues section at GitHub first.
Code style and formatting
Before creating a pull request, it is recommended to run the following command:
make format
This reformats the new code to ensure that it follows the code style and formatting guidelines.
CMake formatting
All CMake files are formatted using gersemi. To install gersemi on a Debian based system the following commands can be used:
sudo apt install pipx
pipx install gersemi
To format all CMake files run the command:
gersemi -i cmake .
License
Copyright (C) 2009-2025 Greenbone AG
Licensed under the GNU Affero General Public License v3.0 or later.
