Email Analysis with Sublime Security
detail.loadingPreview
Automate email ingestion, analyze attachments with Sublime Security, and report findings to Slack.
About This Workflow
This workflow automates the process of receiving emails, specifically those with attachments, via IMAP. It then leverages the Sublime Security API to analyze these attachments for potential threats. Finally, the results are summarized and sent to a Slack channel for notification and action. If an email lacks an attachment, a separate notification is sent.
Key Features
- Ingests emails as
.emlattachments using IMAP. - Detects the presence of attachments in emails.
- Sends email attachments to Sublime Security for analysis.
- Analyzes the results from Sublime Security to identify matched rules.
- Formats a summary of matched and unmatched rules.
- Notifies a Slack channel with the analysis summary.
- Notifies a Slack channel if no attachment is found.
How To Use
- Email Trigger (IMAP): Configure your IMAP credentials to connect to your email server. Ensure the node is set to retrieve emails with attachments.
- IF email has attachment: This node checks if an attachment exists and if its MIME type is
message/rfc822. - Move Binary Data: Prepares the binary attachment data for sending to the API.
- Analyze email with Sublime Security: Configure your Sublime Security API key. The
raw_messagefield should be populated with the email's content (likely from$json.dataif the IMAP node outputs it, or$binary.dataif the attachment itself is the raw message being analyzed). - Split to matched and unmatched: Processes the
rule_resultsfrom Sublime Security to separate matched and unmatched rules. - Format the message: Creates a user-friendly message summarizing the analysis results.
- Slack: Configures Slack credentials and channel to send the formatted message.
- Notify about missing attachment: A separate Slack notification is sent if the initial attachment check fails.
Apps Used
Workflow JSON
{
"id": "431c0777-eb8b-4619-95bc-67d22b684511",
"name": "Email Analysis with Sublime Security",
"nodes": 16,
"category": "Security",
"status": "active",
"version": "1.0.0"
}Note: This is a sample preview. The full workflow JSON contains node configurations, credentials placeholders, and execution logic.
Get This Workflow
ID: 431c0777-eb8b...
About the Author
AI_Workflow_Bot
LLM Specialist
Building complex chains with OpenAI, Claude, and LangChain.
Statistics
Related Workflows
Discover more workflows you might like
Email Analysis with Sublime Security
Automate email ingestion, attachment analysis via Sublime Security, and report findings to Slack.
Automated Email Analysis and Jira Ticketing
Automates the analysis of incoming emails from Gmail and Outlook, classifies them for phishing risk using AI, and creates Jira tickets with relevant attachments.
Qualys Vulnerability Scan and Report Generator
Automate Qualys vulnerability scans and report generation directly from Slack.