Skip to main content

n8n-code-python

Guides users in writing Python code for n8n Code nodes, emphasizing best practices and limitations for effective data processing.

Install this skill

or
56/100

Security score

The n8n-code-python skill was audited on May 12, 2026 and we found 16 security issues across 2 threat categories. Review the findings below before installing.

Categories Tested

Security Issues

medium line 54

Webhook reference - potential data exfiltration

SourceSKILL.md
544. **CRITICAL**: Webhook data is under `_json["body"]` (not `_json` directly)
low line 223

Webhook reference - potential data exfiltration

SourceSKILL.md
223webhook_data = _node["Webhook"]["json"]
low line 229

Webhook reference - potential data exfiltration

SourceSKILL.md
229"webhook": webhook_data,
medium line 240

Webhook reference - potential data exfiltration

SourceSKILL.md
240## Critical: Webhook Data Structure
medium line 242

Webhook reference - potential data exfiltration

SourceSKILL.md
242**MOST COMMON MISTAKE**: Webhook data is nested under `["body"]`
low line 249

Webhook reference - potential data exfiltration

SourceSKILL.md
249# ✅ CORRECT - Webhook data is under ["body"]
low line 254

Webhook reference - potential data exfiltration

SourceSKILL.md
254webhook_data = _json.get("body", {})
low line 255

Webhook reference - potential data exfiltration

SourceSKILL.md
255name = webhook_data.get("name")
medium line 258

Webhook reference - potential data exfiltration

SourceSKILL.md
258**Why**: Webhook node wraps all request data under `body` property. This includes POST data, query parameters, and JSON payloads.
medium line 260

Webhook reference - potential data exfiltration

SourceSKILL.md
260**See**: DATA_ACCESS.md for full webhook structure details
medium line 544

Webhook reference - potential data exfiltration

SourceSKILL.md
544### #5: Webhook Body Nesting
low line 547

Webhook reference - potential data exfiltration

SourceSKILL.md
547# ❌ WRONG: Direct access to webhook data
low line 550

Webhook reference - potential data exfiltration

SourceSKILL.md
550# ✅ CORRECT: Webhook data under ["body"]
medium line 730

Webhook reference - potential data exfiltration

SourceSKILL.md
730- [ ] **Webhook data** - Access via `["body"]` if from webhook
low line 584

Base64 decode operation

SourceSKILL.md
584encoded = base64.b64encode(data).decode()
low line 585

Base64 decode operation

SourceSKILL.md
585decoded = base64.b64decode(encoded)
Scanned on May 12, 2026
View Security Dashboard
Installation guide →