n8n-hebrew-workflows
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill recommends installing the Node.js package
israeli-bank-scrapersand specifically suggests a fork@sergienko4/israeli-bank-scrapersto bypass Cloudflare bot detection. The use of individual user forks for financial data processing introduces a supply chain risk. - [COMMAND_EXECUTION]: The instructions guide the user to enable the
Execute Commandnode in n8n 2.0 using theN8N_COMMUNITY_PACKAGES_ALLOW_TOOL_USAGEenvironment variable. While presented as a migration path for legacy workflows, this configuration significantly expands the attack surface by allowing shell command execution from within the automation platform. - [PROMPT_INJECTION]: The skill identifies an indirect prompt injection surface in the bank transaction categorization workflow in
SKILL.md(Step 7). - Ingestion points: External transaction descriptions fetched via
israeli-bank-scrapersand payment data received throughWebhooknodes. - Boundary markers: Absent in the provided prompt examples; external data is interpolated directly into the task instructions for the AI Agent.
- Capability inventory: The skill uses
Codenodes for arbitrary JavaScript execution andHTTP Requestnodes for network operations, which could be triggered by instructions embedded in transaction data. - Sanitization: No sanitization or filtering is applied to the Hebrew transaction descriptions before they are processed by the LLM.
Audit Metadata