CVE audit automation — local skill + scheduled CI
Partner Support periodically flags CVEs in our images without saying where. We want to find and classify them ourselves, on a regular cadence, and keep artifacts for the team. What: - local skill running govulncheck + pnpm audit + trivy, producing a triage report - scheduled GitLab CI jobs doing the same, publishing JSON + text artifacts and an aggregated SUMMARY.md Why: - clear ownership of CVE status across Go deps, UI deps, and the Docker image - catches new CVEs automatically, independent of partner notifications - gives the team artifacts to act on (fixable vs unfixed, CVSS vectors for real risk, not just severity labels) Scope: - `.claude/commands/cve-audit.md` — local `/cve-audit` command - `.gitlab-ci-security.yml` — scheduled CI jobs - `.gitlab-ci.yml` — include the new file - `.gitignore` — exclude scan outputs Out of scope: - fixing the actual CVEs (separate tickets per batch) - auto-creating issues from findings (possible follow-up)
issue