Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation to bypass security defenses.
Where is operational tooling going?
Threat actors have been observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or ...
AWS Hackathon 2026 詐騙識別防範 — 使用 n8n workflow + Groq LLM Router + Discord Bot,自動分析訊息中的網址、電話號碼及截圖是否為詐騙 ...
Researchers at Pillar Security have found two new critical vulnerabilities in self-hosted and cloud n8n deployments. N8n is a popular open-source workflow automation platform powering hundreds of ...
⚡ Electrical Maintenance Component AI System - A comprehensive Streamlit-based SaaS platform for managing electrical maintenance operations. Petronas EMCAI/ ├── app.py # Main Streamlit application ├── ...
Automation has long been part of the discipline, helping teams structure data, streamline reporting, and reduce repetitive work. Now, AI agent platforms combine workflow orchestration with large ...
Pillar Security discovers two critical vulnerabilities (CVSS 10.0) in popular workflow automation platform affecting hundreds of thousands of deployments – enabling attackers to decrypt stored ...
A JavaScript sandbox bug rated CVSS 9.9 enables attackers to bypass AST‑based protections, while a Python execution bypass affects internal‑mode deployments common in enterprise setups. Two critical ...
The two bugs impacted n8n’s sandbox mechanism and could be exploited via weaknesses in the AST sanitization logic. Two critical- and high-severity vulnerabilities in the n8n AI workflow automation ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results