n8n-workflow-patterns
Provides proven architectural patterns for building efficient n8n workflows, enhancing automation and integration capabilities.
Install this skill
Security score
The n8n-workflow-patterns skill was audited on May 15, 2026 and we found 20 security issues across 1 threat category. Review the findings below before installing.
Categories Tested
Security Issues
Webhook reference - potential data exfiltration
| 14 | - The task involves webhook processing, API integration, scheduled jobs, database sync, or AI-agent workflow design. |
Webhook reference - potential data exfiltration
| 23 | 1. **Webhook Processing** (Most Common) |
Webhook reference - potential data exfiltration
| 25 | - Pattern: Webhook → Validate → Transform → Respond/Notify |
Webhook reference - potential data exfiltration
| 49 | **Webhook Processing** - Use when: |
Webhook reference - potential data exfiltration
| 51 | - Building integrations (Slack commands, form submissions, GitHub webhooks) |
Webhook reference - potential data exfiltration
| 53 | - Example: "Receive Stripe payment webhook → Update database → Send confirmation" |
Webhook reference - potential data exfiltration
| 86 | - **Webhook** - HTTP endpoint (instant) |
Webhook reference - potential data exfiltration
| 122 | - [ ] Identify the pattern (webhook, API, database, AI, scheduled) |
Webhook reference - potential data exfiltration
| 188 | ### 1. Webhook Data Structure |
Webhook reference - potential data exfiltration
| 189 | **Problem**: Can't access webhook payload data |
Webhook reference - potential data exfiltration
| 242 | - Access webhook data correctly ({{$json.body.field}}) |
Webhook reference - potential data exfiltration
| 261 | 1. Webhook - 35% |
Webhook reference - potential data exfiltration
| 287 | ### Example 1: Simple Webhook → Slack |
Webhook reference - potential data exfiltration
| 289 | 1. Webhook (path: "form-submit", POST) |
Webhook reference - potential data exfiltration
| 314 | 1. Webhook (receive chat message) |
Webhook reference - potential data exfiltration
| 320 | 3. Webhook Response (send AI reply) |
Webhook reference - potential data exfiltration
| 339 | - **webhook_processing.md** - Webhook patterns, data structure, response handling |
Webhook reference - potential data exfiltration
| 356 | **Webhook Processing**: Most common pattern |
Webhook reference - potential data exfiltration
| 357 | - Most common: Form submissions, payment webhooks, chat integrations |
Webhook reference - potential data exfiltration
| 402 | 2. **Webhook processing** is the most common pattern |