Back to Home
shawnmcrowley icon

n8n_workflows

by shawnmcrowley

Overview

This N8N server serves as a collection of production-ready automation workflows, exposing them as tools for AI agents (MCP clients) to enable dynamic, AI-driven automation across various platforms and data sources.

Installation

Run Command
docker-compose up -d

Environment Variables

  • DB_TYPE
  • DB_POSTGRESDB_HOST
  • DB_POSTGRESDB_PORT
  • DB_POSTGRESDB_DATABASE
  • DB_POSTGRESDB_SCHEMA
  • DB_POSTGRESDB_USER
  • DB_POSTGRESDB_PASSWORD
  • PGADMIN_DEFAULT_EMAIL
  • PGADMIN_DEFAULT_PASSWORD
  • N8N_HOST
  • N8N_PROTOCOL
  • N8N_WEBHOOK_URL
  • GENERIC_TIMEZONE
  • N8N_RESTRICT_FILE_ACCESS_TO
  • N8N_API_KEY
  • FIRECRAWL_API_KEY
  • OPENWEATHER_KEY
  • ALPHA_VANTAGE_KEY
  • OPENAI_API_KEY
  • AHREFS_API_KEY
  • SEMRUSH_API_KEY
  • BUZZSUMO_API_KEY
  • ANSWERTHEPUBLIC_API_KEY
  • REDDIT_CLIENT_ID
  • REDDIT_CLIENT_SECRET
  • REDIS_HOST
  • REDIS_PORT
  • REDIS_PASSWORD
  • SUPABASE_API_KEY
  • SUPABASE_URL
  • COHERE_API_KEY
  • PERPLEXITY_API_KEY

Security Notes

Critical security risks identified: 1. **Hardcoded Secrets**: Multiple workflow files contain hardcoded API keys (e.g., NYT Article Search, FireCrawl, EODHD, Brave Search). These sensitive credentials are exposed in the source code, posing a significant vulnerability. 2. **Potential XSS in HTML Generation**: Workflows that generate HTML content (e.g., for emails) from dynamic data (e.g., `postgres_api_workflow_with_email-postgres.json`, `url-parsing-and-email-generation-.json`, `firecrawl_webscraping-.json`, `html-newsletter-with-real-time-data-.json`) do not appear to sanitize inputs before embedding them. If malicious content is injected into data sources, it could lead to Cross-Site Scripting (XSS) in email clients or rendered HTML outputs. 3. **Dynamic Workflow Execution**: The `build-your-own-n8n-workflows-mcp-server-.json` workflow allows AI agents to execute other N8N workflows by ID. While attempts are made to manage an 'available' list, this introduces a complex trust boundary. A compromised or maliciously prompted AI agent could potentially execute unintended or harmful workflows, bypassing their `availableInMCP: false` settings. The reliance on `workflowInputs` without strict validation could allow arbitrary parameter injection. 4. **Exposed Admin Interface**: PgAdmin is exposed on `localhost:5050` by default. While not publicly exposed in a standard Docker setup, if the host machine has public access, this becomes a direct attack vector to the PostgreSQL database. 5. **Sensitive Information in Logs**: Depending on the workflow execution and error handling, sensitive data or API responses might be inadvertently logged.

Similar Servers

Stats

Interest Score30
Security Score3
Cost ClassHigh
Avg Tokens800
Stars1
Forks0
Last Update2026-01-18

Tags

N8NAI AgentsWorkflow AutomationMCP ServerPostgreSQL