n8n-expression-syntax
Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFEPROMPT_INJECTIONNO_CODE
Full Analysis
- Indirect Prompt Injection (LOW): The skill provides instructions for interpolating untrusted data (e.g., from webhooks) directly into SQL queries, HTTP requests, and Slack messages. While this is standard n8n usage, the examples lack sanitization or escaping patterns, which can lead to injection vulnerabilities in workflows. * Ingestion points: Webhook body access ($json.body) in SKILL.md and EXAMPLES.md. * Boundary markers: Absent in provided examples. * Capability inventory: SQL query execution (EXAMPLES.md Example 2) and HTTP network requests (EXAMPLES.md Example 3). * Sanitization: Not demonstrated in the guide.
- Data Exposure (SAFE): Mentions of environment variables ($env.API_KEY) are instructional and do not leak actual credentials.
- No Code (SAFE): The skill is entirely composed of Markdown documentation and does not include any scripts or executable code.
Audit Metadata