Skip to main content

n8n-code-python

Guides users in writing Python code for n8n Code nodes, emphasizing best practices and limitations for effective data processing.

Install this skill

or
56/100

Security score

The n8n-code-python skill was audited on Mar 7, 2026 and we found 16 security issues across 2 threat categories. Review the findings below before installing.

Categories Tested

Security Issues

medium line 52

Webhook reference - potential data exfiltration

SourceSKILL.md
524. **CRITICAL**: Webhook data is under `_json["body"]` (not `_json` directly)
low line 221

Webhook reference - potential data exfiltration

SourceSKILL.md
221webhook_data = _node["Webhook"]["json"]
low line 227

Webhook reference - potential data exfiltration

SourceSKILL.md
227"webhook": webhook_data,
medium line 238

Webhook reference - potential data exfiltration

SourceSKILL.md
238## Critical: Webhook Data Structure
medium line 240

Webhook reference - potential data exfiltration

SourceSKILL.md
240**MOST COMMON MISTAKE**: Webhook data is nested under `["body"]`
low line 247

Webhook reference - potential data exfiltration

SourceSKILL.md
247# ✅ CORRECT - Webhook data is under ["body"]
low line 252

Webhook reference - potential data exfiltration

SourceSKILL.md
252webhook_data = _json.get("body", {})
low line 253

Webhook reference - potential data exfiltration

SourceSKILL.md
253name = webhook_data.get("name")
medium line 256

Webhook reference - potential data exfiltration

SourceSKILL.md
256**Why**: Webhook node wraps all request data under `body` property. This includes POST data, query parameters, and JSON payloads.
medium line 258

Webhook reference - potential data exfiltration

SourceSKILL.md
258**See**: DATA_ACCESS.md for full webhook structure details
medium line 542

Webhook reference - potential data exfiltration

SourceSKILL.md
542### #5: Webhook Body Nesting
low line 545

Webhook reference - potential data exfiltration

SourceSKILL.md
545# ❌ WRONG: Direct access to webhook data
low line 548

Webhook reference - potential data exfiltration

SourceSKILL.md
548# ✅ CORRECT: Webhook data under ["body"]
medium line 728

Webhook reference - potential data exfiltration

SourceSKILL.md
728- [ ] **Webhook data** - Access via `["body"]` if from webhook
low line 582

Base64 decode operation

SourceSKILL.md
582encoded = base64.b64encode(data).decode()
low line 583

Base64 decode operation

SourceSKILL.md
583decoded = base64.b64decode(encoded)
Scanned on Mar 7, 2026
View Security Dashboard
Installation guide →