ToolTrust
C44/100
leonardsellem

n8n-mcp-server

mcp0.1.8

@leonardsellem

MCP server that provides tools and resources for interacting with n8n API

By leonardsellem | 38 findings | Scanned 3/24/2026 | tooltrust-scanner/v0.2.1

1 Critical11 High15 Medium11 Low

Security Findings (38)

  • CriticalArbitrary Code Execution

    n8n_execute_workflow:tool name or description implies arbitrary script/code execution (evaluate_script, execute javascript, etc.)

    Rule: AS-006Fix: This tool can execute arbitrary code or shell commands on the host system. Remove it unless strictly required. If kept: (1) restrict access to trusted users/agents only, (2) require human approval before each invocation (Claude Desktop: set approval_required: true; other clients: enable equivalent confirmation), (3) use the most restrictive sandbox or read-only mode available, and (4) never expose this tool to untrusted input sources.
  • HighExcessive Permission Surface ×10
    • n8n_get_workflow:tool declares exec permission
    • n8n_delete_workflow:tool declares exec permission
    • n8n_activate_workflow:tool declares exec permission
    • n8n_deactivate_workflow:tool declares exec permission
    • n8n_execute_workflow:tool declares exec permission
    • n8n_list_executions:tool declares exec permission
    • n8n_get_execution:tool declares exec permission
    • n8n_delete_execution:tool declares exec permission
    • n8n_retry_execution:tool declares network permission
    • n8n_retry_execution:tool declares exec permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • HighInsecure Secret Handling

    n8n_get_credential_schema:input parameter "credentialType" appears to accept a secret or credential

    Rule: AS-010Fix: Avoid accepting raw credentials as input parameters. Use secret managers (e.g. 1Password CLI, AWS Secrets Manager) and ensure credentials are never logged or stored in agent traces.
  • MediumExcessive Permission Surface ×15
    • n8n_create_workflow:tool declares fs permission
    • n8n_update_workflow:tool declares fs permission
    • n8n_delete_workflow:tool declares fs permission
    • n8n_update_workflow_tags:tool declares fs permission
    • n8n_delete_execution:tool declares fs permission
    • n8n_create_credential:tool declares fs permission
    • n8n_create_credential:tool declares db permission
    • n8n_update_credential:tool declares fs permission
    • n8n_delete_credential:tool declares fs permission
    • n8n_create_tag:tool declares fs permission
    • n8n_update_tag:tool declares fs permission
    • n8n_delete_tag:tool declares fs permission
    • n8n_get_user:tool declares fs permission
    • n8n_delete_user:tool declares fs permission
    • n8n_update_user_role:tool declares fs permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • LowDoS Resilience — Missing Rate Limit / Timeout ×9
    • n8n_get_workflow:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • n8n_delete_workflow:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • n8n_activate_workflow:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • n8n_deactivate_workflow:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • n8n_execute_workflow:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • n8n_list_executions:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • n8n_get_execution:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • n8n_delete_execution:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • n8n_retry_execution:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    Rule: AS-011Fix: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.
  • LowExcessive Permission Surface ×2
    • n8n_activate_workflow:tool declares http permission
    • n8n_execute_workflow:tool declares http permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.

Scan this tool yourself

Reproduce this audit locally or block risky tools in CI.

Install once, then scan any MCP server:

$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash
$ tooltrust-scanner scan --server "npx -y n8n-mcp-server"

Adjust the package name if your npm registry name differs from the tool ID. View source

Add badge to your README

Copy this Markdown to show your ToolTrust grade on GitHub.

[![ToolTrust Grade C](https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-directory/main/docs/badges/grade-c.svg)](https://github.com/AgentSafe-AI/tooltrust-directory)