n8n_workflows
by shawnmcrowley
Overview
This N8N server serves as a collection of production-ready automation workflows, exposing them as tools for AI agents (MCP clients) to enable dynamic, AI-driven automation across various platforms and data sources.
Installation
docker-compose up -dEnvironment Variables
- DB_TYPE
- DB_POSTGRESDB_HOST
- DB_POSTGRESDB_PORT
- DB_POSTGRESDB_DATABASE
- DB_POSTGRESDB_SCHEMA
- DB_POSTGRESDB_USER
- DB_POSTGRESDB_PASSWORD
- PGADMIN_DEFAULT_EMAIL
- PGADMIN_DEFAULT_PASSWORD
- N8N_HOST
- N8N_PROTOCOL
- N8N_WEBHOOK_URL
- GENERIC_TIMEZONE
- N8N_RESTRICT_FILE_ACCESS_TO
- N8N_API_KEY
- FIRECRAWL_API_KEY
- OPENWEATHER_KEY
- ALPHA_VANTAGE_KEY
- OPENAI_API_KEY
- AHREFS_API_KEY
- SEMRUSH_API_KEY
- BUZZSUMO_API_KEY
- ANSWERTHEPUBLIC_API_KEY
- REDDIT_CLIENT_ID
- REDDIT_CLIENT_SECRET
- REDIS_HOST
- REDIS_PORT
- REDIS_PASSWORD
- SUPABASE_API_KEY
- SUPABASE_URL
- COHERE_API_KEY
- PERPLEXITY_API_KEY
Security Notes
Critical security risks identified: 1. **Hardcoded Secrets**: Multiple workflow files contain hardcoded API keys (e.g., NYT Article Search, FireCrawl, EODHD, Brave Search). These sensitive credentials are exposed in the source code, posing a significant vulnerability. 2. **Potential XSS in HTML Generation**: Workflows that generate HTML content (e.g., for emails) from dynamic data (e.g., `postgres_api_workflow_with_email-postgres.json`, `url-parsing-and-email-generation-.json`, `firecrawl_webscraping-.json`, `html-newsletter-with-real-time-data-.json`) do not appear to sanitize inputs before embedding them. If malicious content is injected into data sources, it could lead to Cross-Site Scripting (XSS) in email clients or rendered HTML outputs. 3. **Dynamic Workflow Execution**: The `build-your-own-n8n-workflows-mcp-server-.json` workflow allows AI agents to execute other N8N workflows by ID. While attempts are made to manage an 'available' list, this introduces a complex trust boundary. A compromised or maliciously prompted AI agent could potentially execute unintended or harmful workflows, bypassing their `availableInMCP: false` settings. The reliance on `workflowInputs` without strict validation could allow arbitrary parameter injection. 4. **Exposed Admin Interface**: PgAdmin is exposed on `localhost:5050` by default. While not publicly exposed in a standard Docker setup, if the host machine has public access, this becomes a direct attack vector to the PostgreSQL database. 5. **Sensitive Information in Logs**: Depending on the workflow execution and error handling, sensitive data or API responses might be inadvertently logged.
Similar Servers
n8n
AI-powered workflow automation platform, enabling users to build and run workflows using various integrations, with a focus on AI models and tools for task execution and conversational agents.
n8n-mcp
The n8n-MCP server enhances n8n's workflow automation by providing a Model Context Protocol interface, allowing AI agents to discover, validate, and manage n8n nodes and workflows with rich, structured documentation and metadata.
mcp-n8n-builder
Programmatic creation and management of n8n workflows by AI assistants via the Model Context Protocol (MCP).
project-nova
Manages Paperless-NGX documents by providing an MCP server that exposes an SSE endpoint for integration with n8n, enabling AI agents to search, upload, and manage documents, tags, correspondents, and document types.