Skip to main content

n8n-workflow-patterns

Provides proven architectural patterns for building efficient n8n workflows, enhancing automation and integration capabilities.

Install this skill

or
17/100

Security score

The n8n-workflow-patterns skill was audited on May 15, 2026 and we found 19 security issues across 1 threat category. Review the findings below before installing.

Categories Tested

Security Issues

medium line 18

Webhook reference - potential data exfiltration

SourceSKILL.md
181. **Webhook Processing** (Most Common)
medium line 20

Webhook reference - potential data exfiltration

SourceSKILL.md
20- Pattern: Webhook → Validate → Transform → Respond/Notify
medium line 44

Webhook reference - potential data exfiltration

SourceSKILL.md
44**Webhook Processing** - Use when:
medium line 46

Webhook reference - potential data exfiltration

SourceSKILL.md
46- Building integrations (Slack commands, form submissions, GitHub webhooks)
medium line 48

Webhook reference - potential data exfiltration

SourceSKILL.md
48- Example: "Receive Stripe payment webhook → Update database → Send confirmation"
medium line 81

Webhook reference - potential data exfiltration

SourceSKILL.md
81- **Webhook** - HTTP endpoint (instant)
medium line 117

Webhook reference - potential data exfiltration

SourceSKILL.md
117- [ ] Identify the pattern (webhook, API, database, AI, scheduled)
medium line 183

Webhook reference - potential data exfiltration

SourceSKILL.md
183### 1. Webhook Data Structure
medium line 184

Webhook reference - potential data exfiltration

SourceSKILL.md
184**Problem**: Can't access webhook payload data
medium line 237

Webhook reference - potential data exfiltration

SourceSKILL.md
237- Access webhook data correctly ({{$json.body.field}})
medium line 256

Webhook reference - potential data exfiltration

SourceSKILL.md
2561. Webhook - 35%
medium line 282

Webhook reference - potential data exfiltration

SourceSKILL.md
282### Example 1: Simple Webhook → Slack
low line 284

Webhook reference - potential data exfiltration

SourceSKILL.md
2841. Webhook (path: "form-submit", POST)
low line 309

Webhook reference - potential data exfiltration

SourceSKILL.md
3091. Webhook (receive chat message)
low line 315

Webhook reference - potential data exfiltration

SourceSKILL.md
3153. Webhook Response (send AI reply)
medium line 334

Webhook reference - potential data exfiltration

SourceSKILL.md
334- **webhook_processing.md** - Webhook patterns, data structure, response handling
medium line 351

Webhook reference - potential data exfiltration

SourceSKILL.md
351**Webhook Processing**: Most common pattern
medium line 352

Webhook reference - potential data exfiltration

SourceSKILL.md
352- Most common: Form submissions, payment webhooks, chat integrations
medium line 397

Webhook reference - potential data exfiltration

SourceSKILL.md
3972. **Webhook processing** is the most common pattern
Scanned on May 15, 2026
View Security Dashboard
Installation guide →