n8n-code-javascript
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Indirect Prompt Injection] (SAFE): The skill documents how to process untrusted data from webhooks and CRM sources. 1. Ingestion points: Webhook body and CRM data properties. 2. Boundary markers: Not explicitly specified in the README. 3. Capability inventory: Uses $helpers.httpRequest and $getWorkflowStaticData. 4. Sanitization: Promotes defensive coding practices like null-checks and structured return formats.
- [Remote Code Execution] (SAFE): Documents standard, intended use of the n8n Code node environment. References only verified platform-native libraries such as Luxon and JMESPath.
- [Data Exfiltration] (SAFE): Mentions network capabilities ($helpers.httpRequest) and static storage; however, these are standard for automation and no patterns for exfiltrating sensitive local files (e.g., .ssh or .aws config) were identified.
Audit Metadata