n8n-workflow-patterns
Provides proven architectural patterns for building n8n workflows, enhancing integration and automation capabilities.
Install this skill
Security score
The n8n-workflow-patterns skill was audited on Feb 28, 2026 and we found 20 security issues across 1 threat category. Review the findings below before installing.
Categories Tested
Security Issues
Webhook reference - potential data exfiltration
| 3 | description: Proven workflow architectural patterns from real n8n workflows. Use when building new workflows, designing workflow structure, choosing workflow patterns, planning workflow architecture, |
Webhook reference - potential data exfiltration
| 16 | 1. **[Webhook Processing](webhook_processing.md)** (Most Common) |
Webhook reference - potential data exfiltration
| 18 | - Pattern: Webhook → Validate → Transform → Respond/Notify |
Webhook reference - potential data exfiltration
| 42 | **Webhook Processing** - Use when: |
Webhook reference - potential data exfiltration
| 44 | - Building integrations (Slack commands, form submissions, GitHub webhooks) |
Webhook reference - potential data exfiltration
| 46 | - Example: "Receive Stripe payment webhook → Update database → Send confirmation" |
Webhook reference - potential data exfiltration
| 79 | - **Webhook** - HTTP endpoint (instant) |
Webhook reference - potential data exfiltration
| 115 | - [ ] Identify the pattern (webhook, API, database, AI, scheduled) |
Webhook reference - potential data exfiltration
| 181 | ### 1. Webhook Data Structure |
Webhook reference - potential data exfiltration
| 182 | **Problem**: Can't access webhook payload data |
Webhook reference - potential data exfiltration
| 233 | - Access webhook data correctly ({{$json.body.field}}) |
Webhook reference - potential data exfiltration
| 252 | 1. Webhook - 35% |
Webhook reference - potential data exfiltration
| 278 | ### Example 1: Simple Webhook → Slack |
Webhook reference - potential data exfiltration
| 280 | 1. Webhook (path: "form-submit", POST) |
Webhook reference - potential data exfiltration
| 305 | 1. Webhook (receive chat message) |
Webhook reference - potential data exfiltration
| 311 | 3. Webhook Response (send AI reply) |
Webhook reference - potential data exfiltration
| 330 | - **[webhook_processing.md](webhook_processing.md)** - Webhook patterns, data structure, response handling |
Webhook reference - potential data exfiltration
| 347 | **Webhook Processing**: Most common pattern |
Webhook reference - potential data exfiltration
| 348 | - Most common: Form submissions, payment webhooks, chat integrations |
Webhook reference - potential data exfiltration
| 393 | 2. **Webhook processing** is the most common pattern |
Install this skill with one command
/learn @mattnigh/n8n-workflow-patterns