Skip to main content

n8n-workflow-patterns

Provides proven architectural patterns for building efficient n8n workflows, enhancing automation and integration capabilities.

Install this skill

or
12/100

Security score

The n8n-workflow-patterns skill was audited on May 15, 2026 and we found 20 security issues across 1 threat category. Review the findings below before installing.

Categories Tested

Security Issues

medium line 14

Webhook reference - potential data exfiltration

SourceSKILL.md
14- The task involves webhook processing, API integration, scheduled jobs, database sync, or AI-agent workflow design.
medium line 23

Webhook reference - potential data exfiltration

SourceSKILL.md
231. **Webhook Processing** (Most Common)
medium line 25

Webhook reference - potential data exfiltration

SourceSKILL.md
25- Pattern: Webhook → Validate → Transform → Respond/Notify
medium line 49

Webhook reference - potential data exfiltration

SourceSKILL.md
49**Webhook Processing** - Use when:
medium line 51

Webhook reference - potential data exfiltration

SourceSKILL.md
51- Building integrations (Slack commands, form submissions, GitHub webhooks)
medium line 53

Webhook reference - potential data exfiltration

SourceSKILL.md
53- Example: "Receive Stripe payment webhook → Update database → Send confirmation"
medium line 86

Webhook reference - potential data exfiltration

SourceSKILL.md
86- **Webhook** - HTTP endpoint (instant)
medium line 122

Webhook reference - potential data exfiltration

SourceSKILL.md
122- [ ] Identify the pattern (webhook, API, database, AI, scheduled)
medium line 188

Webhook reference - potential data exfiltration

SourceSKILL.md
188### 1. Webhook Data Structure
medium line 189

Webhook reference - potential data exfiltration

SourceSKILL.md
189**Problem**: Can't access webhook payload data
medium line 242

Webhook reference - potential data exfiltration

SourceSKILL.md
242- Access webhook data correctly ({{$json.body.field}})
medium line 261

Webhook reference - potential data exfiltration

SourceSKILL.md
2611. Webhook - 35%
medium line 287

Webhook reference - potential data exfiltration

SourceSKILL.md
287### Example 1: Simple Webhook → Slack
low line 289

Webhook reference - potential data exfiltration

SourceSKILL.md
2891. Webhook (path: "form-submit", POST)
low line 314

Webhook reference - potential data exfiltration

SourceSKILL.md
3141. Webhook (receive chat message)
low line 320

Webhook reference - potential data exfiltration

SourceSKILL.md
3203. Webhook Response (send AI reply)
medium line 339

Webhook reference - potential data exfiltration

SourceSKILL.md
339- **webhook_processing.md** - Webhook patterns, data structure, response handling
medium line 356

Webhook reference - potential data exfiltration

SourceSKILL.md
356**Webhook Processing**: Most common pattern
medium line 357

Webhook reference - potential data exfiltration

SourceSKILL.md
357- Most common: Form submissions, payment webhooks, chat integrations
medium line 402

Webhook reference - potential data exfiltration

SourceSKILL.md
4022. **Webhook processing** is the most common pattern
Scanned on May 15, 2026
View Security Dashboard
Installation guide →