N8n Operator

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its n8n workflow-management purpose, but it includes instructions for persistent OpenClaw cron jobs and broad n8n account control that users should review carefully.

Install only if you are comfortable giving the agent API-level control over your n8n instance. Review generated workflows before activation, be especially cautious with delete/execute/credential operations, and do not allow OpenClaw cron-job creation unless you explicitly want persistent scheduled triggering and know how to remove it.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent can change or remove workflows and trigger automations that may call other systems.

Why it was flagged

The skill explicitly exposes mutating workflow operations, including delete, activate, deactivate, and execute. This is expected for an n8n operator, but it can materially affect automations.

Skill content
工作流管理 ... 创建 POST /workflows ... 更新 PUT /workflows/{id} ... 删除 DELETE /workflows/{id} ... 激活 POST /workflows/{id}/activate ... 执行 POST /workflows/{id}/execute
Recommendation

Use it only with the intended n8n instance, review workflow IDs and generated JSON, and require explicit confirmation for delete, activation, execution, or production changes.

What this means

Anyone or any agent using this key may be able to inspect and mutate n8n workflows and related resources allowed by that key.

Why it was flagged

The skill requires an n8n API key and uses it for REST API calls. This is expected for the integration, but the key delegates access to the n8n account.

Skill content
N8N_BASE_URL=http://localhost:5678
N8N_API_KEY=<your-api-key>
...
X-N8N-API-KEY: <N8N_API_KEY>
Recommendation

Use the least-privileged API key available, prefer a test n8n instance first, avoid sharing the key in chat or logs, and rotate it if exposed.

What this means

Workflows may be connected to third-party services such as Slack, email, databases, or APIs, expanding the effect of mistakes or unsafe workflow designs.

Why it was flagged

The skill documents n8n credential-management API operations. Credential creation/listing can be necessary for workflows, but it touches sensitive integration authority.

Skill content
凭证管理 ... 列表 GET /credentials ... 创建 POST /credentials
Recommendation

Confirm every credential use, avoid storing unnecessary third-party secrets, and ensure generated workflows reference only approved credential IDs.

What this means

A scheduled job could continue triggering workflows after the original chat is over, potentially causing repeated external actions or unexpected automation runs.

Why it was flagged

The skill instructs direct modification of OpenClaw's cron configuration to create scheduled webhook triggers. That creates persistent behavior outside the n8n API and the provided text does not show clear approval, cleanup, or scoping safeguards.

Skill content
Gateway Cron 自动触发 n8n Webhook ... 方法:直接编辑 jobs.json 文件 ... C:\Users\lujun\.openclaw\cron\jobs.json ... 添加 cron 任务,通过 `curl.exe POST` 触发 n8n webhook URL
Recommendation

Only allow cron-job creation after explicit approval, inspect the exact jobs.json change, use a clearly named job, define how to disable it, and prefer n8n's own Schedule Trigger when possible.

What this means

If followed, n8n workflows could write files to the host Desktop, and container-level mistakes could have broader effects than a least-privilege setup.

Why it was flagged

The reference recommends mounting a host Desktop directory into n8n and running the container as root for file-writing workflows. It also includes a path restriction, but the setup still increases local file-write and privilege exposure.

Skill content
volumes:
  - C:/Users/lujun/Desktop:/home/node/desktop   # 关键:桌面映射
user: "0:0"    # 关键:解决权限冲突
N8N_RESTRICT_FILE_ACCESS_TO=/tmp;/home/node/desktop
Recommendation

Use a dedicated non-sensitive output directory instead of the Desktop, avoid running the container as root if possible, and keep n8n file access restricted to the smallest needed path.