N8n Workflow Automation 1.0.0

Designs and outputs n8n workflow JSON with robust triggers, idempotency, error handling, logging, retries, and human-in-the-loop review queues. Use when you...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 819 · 15 current installs · 18 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description match the SKILL.md: it designs n8n workflow JSON with retries, idempotency, logging, and review queues. It does not request unrelated binaries, credentials, or system access.
Instruction Scope
All runtime instructions are limited to designing workflow specs, runbooks, and templates. The document explicitly requires asking the user for destinations/credentials before including them and forbids embedding secrets in emitted JSON. It does suggest writing failed items to DB/Sheet in the workflow design (expected), but does not instruct the agent to access local files, other skills' configs, or external endpoints on its own.
Install Mechanism
No install spec and no code files — the skill is instruction-only, so nothing is written to disk or downloaded during install.
Credentials
The skill does not declare any required environment variables or credentials (none are requested up front). The instructions do, correctly, recommend referencing env var names in generated JSON rather than embedding secrets and also tell the agent to stop and ask when credentials are unspecified. Users must supply appropriate credentials when implementing the generated workflows.
Persistence & Privilege
always is false and the skill does not request persistent/system-wide privileges. It does not modify other skills or system configs.
Assessment
This skill is an authoring helper (it produces n8n workflow JSON and a runbook). It is coherent and does not demand credentials itself, but when you use it: 1) never paste secrets or actual credentials into prompts — prefer placeholder env var names; 2) review any generated workflow.json before importing into n8n to ensure no sensitive data is embedded and that node permissions are minimal; 3) provide only the credentials required for the target systems (least privilege) and test generated workflows in a staging environment; 4) when the runbook references storage or review queues, ensure those endpoints are controlled and audited. If you want the skill to generate workflows that interact with specific systems, be prepared to supply safe examples and credential strategy (env var names) rather than secrets.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk97atd6r6z1rh1ytakb090kdrn81nm1y

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

n8n workflow automation with retries, logging, and review queues

PURPOSE

Designs and outputs n8n workflow JSON with robust triggers, idempotency, error handling, logging, retries, and human-in-the-loop review queues.

WHEN TO USE

  • TRIGGERS:
    • Build an n8n workflow that runs every Monday and emails the compliance summary.
    • Add error handling and retries to this workflow, plus a review queue for failures.
    • Create a webhook workflow that logs every run and writes a status row to a tracker.
    • Make this n8n flow idempotent so it does not duplicate records when it reruns.
    • Instrument this workflow with audit logs and a human approval step.
  • DO NOT USE WHEN…
    • You need code-only automation without n8n (use a scripting/CI skill).
    • You need to bypass security controls or hide audit trails.
    • You need to purchase or recommend prohibited items/services.

INPUTS

  • REQUIRED:
    • Workflow intent: trigger type + schedule/timezone + success criteria.
    • Targets: where to write results (email/Drive/Sheet/DB) and required fields.
  • OPTIONAL:
    • Existing n8n workflow JSON to modify.
    • Sample payloads / example records.
    • Definition of dedup keys (what makes a record unique).
  • EXAMPLES:
    • Cron: Monday 08:00 Europe/London; send summary email + Drive upload
    • Webhook: receive JSON; route to folders

OUTPUTS

  • Default (read-only): a workflow design spec (nodes, data contracts, failure modes).
  • If explicitly requested: workflow.json (n8n importable JSON) + runbook.md (from template). Success = workflow is idempotent, logs every run, retries safely, and routes failures to a review queue.

WORKFLOW

  1. Clarify trigger:
    • Cron/webhook/manual; schedule/timezone; concurrency expectations.
  2. Define data contract:
    • input schema, required fields, and validation rules.
  3. Design idempotency:
    • choose dedup key(s) and storage (DB/Sheet) to prevent duplicates on retries.
  4. Add observability:
    • generate run_id, log start/end, store status row and error details.
  5. Implement error handling:
    • per-node error branches, retry with backoff, and final failure notification.
  6. Add human-in-the-loop (HITL) review queue:
    • write failed items to a queue (Sheet/DB) and require approval to reprocess.
  7. “No silent failure” gates:
    • if counts/thresholds fail, stop workflow and alert.
  8. Output:
    • If asked for JSON: produce importable n8n workflow JSON + runbook.
  9. STOP AND ASK THE USER if:
    • destination systems are unknown,
    • no dedup key exists,
    • credential strategy (env vars) is not specified,
    • the workflow needs privileged access not yet approved.

OUTPUT FORMAT

If outputting n8n workflow JSON, conform to:

{
  "name": "<workflow name>",
  "nodes": [ { "name": "Trigger", "type": "n8n-nodes-base.cron", "parameters": {}, "position": [0,0] } ],
  "connections": {},
  "settings": {},
  "active": false
}

Also output runbook.md using assets/runbook-template.md.

SAFETY & EDGE CASES

  • Read-only by default; only emit workflow JSON when explicitly requested.
  • Do not include secrets in JSON; reference env vars/credential names only.
  • Include audit logging + failure notifications; avoid workflows that can silently drop data.
  • Prefer least privilege: call only required APIs and minimize scopes.

EXAMPLES

  • Input: “Cron every Monday, email compliance summary, retry failures.”
    Output: Node map + workflow.json with Cron → Fetch → Aggregate → Email, plus error branches to review queue.

  • Input: “Webhook that logs runs and writes status row.”
    Output: Webhook → Validate → Process → Append status row; on error → log + notify + queue.

Files

3 total
Select a file
Select a file to preview.

Comments

Loading comments…