n8n Automation
Analysis
This instruction-only n8n skill is coherent, but deserves review because it uses a potentially full-access n8n API key and documents commands that can create, trigger, activate, or delete automations.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
### Create Workflow (from JSON) ... -d @workflow.json "$N8N_API_URL/workflows" ... ### Delete Workflow ... curl -s -X DELETE ... "$N8N_API_URL/workflows/{id}"The runtime instructions document direct raw REST calls for creating and deleting workflows. These are purpose-aligned but high-impact, and the artifact does not include explicit safeguards such as confirmation, ID verification, dry-run guidance, or rollback instructions.
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
The artifact has limited provenance information, but it also contains no executable code or install step, so the provenance issue is a notice rather than a standalone security concern.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
export N8N_API_KEY="your-api-key-here" ... Tips: API key has full access on non-enterprise plans
The skill asks for an n8n API key and explicitly warns that the key can be full-access. That is high-impact delegated account authority for workflows and connected automations.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Debug Failed Execution: Fetch execution details → find the failing node; Check node parameters and input data
Execution details, node parameters, and input data can contain private operational payloads. Reading them is relevant to debugging n8n workflows, but users should recognize that sensitive workflow data may enter the agent context.
Trigger Workflow (via webhook) ... curl -s -X POST "$N8N_API_URL/../webhook/{webhook-path}" ... Tips: Webhook URLs are separate from API URLs (no auth header needed)The skill documents unauthenticated webhook triggering, which is normal for many n8n workflows but means the webhook path and payload are the effective control boundary.
