Skip to main content

n8n-workflow-patterns

Provides proven architectural patterns for building n8n workflows, enhancing integration and automation capabilities.

Install this skill

or
12/100

Security score

The n8n-workflow-patterns skill was audited on Feb 28, 2026 and we found 20 security issues across 1 threat category. Review the findings below before installing.

Categories Tested

Security Issues

medium line 3

Webhook reference - potential data exfiltration

SourceSKILL.md
3description: Proven workflow architectural patterns from real n8n workflows. Use when building new workflows, designing workflow structure, choosing workflow patterns, planning workflow architecture,
medium line 16

Webhook reference - potential data exfiltration

SourceSKILL.md
161. **[Webhook Processing](webhook_processing.md)** (Most Common)
medium line 18

Webhook reference - potential data exfiltration

SourceSKILL.md
18- Pattern: Webhook → Validate → Transform → Respond/Notify
medium line 42

Webhook reference - potential data exfiltration

SourceSKILL.md
42**Webhook Processing** - Use when:
medium line 44

Webhook reference - potential data exfiltration

SourceSKILL.md
44- Building integrations (Slack commands, form submissions, GitHub webhooks)
medium line 46

Webhook reference - potential data exfiltration

SourceSKILL.md
46- Example: "Receive Stripe payment webhook → Update database → Send confirmation"
medium line 79

Webhook reference - potential data exfiltration

SourceSKILL.md
79- **Webhook** - HTTP endpoint (instant)
medium line 115

Webhook reference - potential data exfiltration

SourceSKILL.md
115- [ ] Identify the pattern (webhook, API, database, AI, scheduled)
medium line 181

Webhook reference - potential data exfiltration

SourceSKILL.md
181### 1. Webhook Data Structure
medium line 182

Webhook reference - potential data exfiltration

SourceSKILL.md
182**Problem**: Can't access webhook payload data
medium line 233

Webhook reference - potential data exfiltration

SourceSKILL.md
233- Access webhook data correctly ({{$json.body.field}})
medium line 252

Webhook reference - potential data exfiltration

SourceSKILL.md
2521. Webhook - 35%
medium line 278

Webhook reference - potential data exfiltration

SourceSKILL.md
278### Example 1: Simple Webhook → Slack
low line 280

Webhook reference - potential data exfiltration

SourceSKILL.md
2801. Webhook (path: "form-submit", POST)
low line 305

Webhook reference - potential data exfiltration

SourceSKILL.md
3051. Webhook (receive chat message)
low line 311

Webhook reference - potential data exfiltration

SourceSKILL.md
3113. Webhook Response (send AI reply)
medium line 330

Webhook reference - potential data exfiltration

SourceSKILL.md
330- **[webhook_processing.md](webhook_processing.md)** - Webhook patterns, data structure, response handling
medium line 347

Webhook reference - potential data exfiltration

SourceSKILL.md
347**Webhook Processing**: Most common pattern
medium line 348

Webhook reference - potential data exfiltration

SourceSKILL.md
348- Most common: Form submissions, payment webhooks, chat integrations
medium line 393

Webhook reference - potential data exfiltration

SourceSKILL.md
3932. **Webhook processing** is the most common pattern
Scanned on Feb 28, 2026
View Security Dashboard