n8n
Security Scanner
Workflow automation platform with AI capabilities. Dedicated adapter for JSON workflow scanning.
What Inkog Detects in n8n
n8n-specific vulnerability patterns that traditional security tools miss.
Workflow Loop Detection
CRITICALn8n workflows with circular connections can create infinite execution loops.
Credential Exposure
CRITICALAPI keys and tokens embedded in n8n workflow configurations can be exposed.
Agent Node Analysis
HIGHAI agent nodes in n8n workflows without proper bounds can consume excessive resources.
Missing Authorization
HIGHn8n workflow actions without user permission checks can perform unauthorized operations.
n8n Analysis Features
- Workflow loop detection
- Agent node analysis
- Split/batch validation
- Credential exposure checks
Get Started
Scan your n8n application in seconds.
Run the scanner
inkog scan ./workflows --framework n8nReview findings
Inkog traces data flow through your n8n code and reports vulnerabilities with severity levels and line numbers.
Fix and verify
Apply the suggested fixes based on severity and re-scan to verify.
n8n Compliance Reports
Automated mapping to global AI governance frameworks.
EU AI Act
Article 14, 15, 12
NIST AI RMF
MAP/MEASURE/MANAGE
OWASP LLM
Top 10 Coverage
ISO 42001
AI Management