Back
gh

Zie619/n8n-workflows: all of the workflows of n8n i could find (also from the site itself)

all of the workflows of n8n i could find (also from the site itself) - Zie619/n8n-workflows

by Zie619 github.com 813 words
View original

n8n Workflow Collection


AI-BOM Logo

NEW: Scan Your n8n Workflows for AI Security Risks

AI-BOMOpen Source First Ever

### Your workflows contain AI — do you know what’s hiding in them? We built AI-BOM because we scanned our own 4,343 workflows and found hardcoded API keys, unauthenticated AI agents, and MCP clients connecting to unknown servers — all invisible to existing security tools. AI-BOM is the first and only tool that scans n8n workflows for AI security risks. pip install ai-bom ai-bom scan ./workflows/ One command finds every AI Agent node, LLM integration, MCP client, hardcoded credential, and dangerous tool combination — then gives you a risk score and a compliance-ready report. EU AI Act deadline: August 2025. You need an AI inventory. Get AI-BOM (free & open source) →AI-BOM Mascot AI-BOM by Trusera Securing the Agentic Service Mesh

What does AI-BOM detect in n8n workflows? (click to expand)

RiskSeverityWhat it finds
AI Agent nodesCRITICALAgents connected to LLMs with tool access — can execute code
Hardcoded credentialsCRITICALAPI keys in workflow JSON instead of credential store
Dangerous tool combosCRITICALAgents with Code Execution + HTTP Request = RCE risk
MCP clientsHIGHModel Context Protocol connections to external servers
Unauthenticated webhooksHIGHWebhook triggers exposed to the internet without auth
Agent chainsHIGHExecute Workflow linking agents without input validation

Beyond n8n, AI-BOM also scans source code (Python, JS, TS, Java, Go, Rust, Ruby), Docker configs, cloud infrastructure (Terraform, CloudFormation), and network endpoints — 21+ AI SDKs detected across 7 languages.

Output formats: CycloneDX SBOM | SARIF (GitHub Code Scanning) | HTML Dashboard | Markdown | JSON


What’s New

Latest Updates (November 2025)


Quick Access

Use Online (No Installation)

Visit zie619.github.io/n8n-workflows for instant access to:


Features

### By The Numbers - 4,343 Production-Ready Workflows - 365 Unique Integrations - 29,445 Total Nodes - 15 Organized Categories - 100% Import Success Rate### Performance - < 100ms Search Response - < 50MB Memory Usage - 700x Smaller Than v1 - 10x Faster Load Times - 40x Less RAM Usage

Local Installation

Prerequisites

Quick Start

# Clone the repository
git clone https://github.com/Zie619/n8n-workflows.git
cd n8n-workflows

# Install dependencies
pip install -r requirements.txt

# Start the server
python run.py

# Open in browser
# http://localhost:8000

Docker Installation

# Using Docker Hub
docker run -p 8000:8000 zie619/n8n-workflows:latest

# Or build locally
docker build -t n8n-workflows .
docker run -p 8000:8000 n8n-workflows

Documentation

API Endpoints

EndpointMethodDescription
/GETWeb interface
/api/searchGETSearch workflows
/api/statsGETRepository statistics
/api/workflow/{id}GETGet workflow JSON
/api/categoriesGETList all categories
/api/exportGETExport workflows

Search Features


Architecture

graph LR
    A[User] --> B[Web Interface]
    B --> C[FastAPI Server]
    C --> D[SQLite FTS5]
    D --> E[Workflow Database]
    C --> F[Static Files]
    F --> G[Workflow JSONs]

Tech Stack


Repository Structure

n8n-workflows/
├── workflows/           # 4,343 workflow JSON files
│   └── [category]/     # Organized by integration
├── docs/               # GitHub Pages site
├── src/                # Python source code
├── scripts/            # Utility scripts
├── api_server.py       # FastAPI application
├── run.py              # Server launcher
├── workflow_db.py      # Database manager
└── requirements.txt    # Python dependencies

Contributing

We love contributions! Here’s how you can help:

Ways to Contribute

Development Setup

# Fork and clone
git clone https://github.com/YOUR_USERNAME/n8n-workflows.git

# Create branch
git checkout -b feature/amazing-feature

# Make changes and test
python run.py --debug

# Commit and push
git add .
git commit -m "feat: add amazing feature"
git push origin feature/amazing-feature

# Open PR

Security

Security Features

Reporting Security Issues

Please report security vulnerabilities to the maintainers via Security Advisory.


License

This project is licensed under the MIT License - see the LICENSE file for details.


Support

If you find this project helpful, please consider:

Buy Me a Coffee Star on GitHub


GitHub stars GitHub forks GitHub watchers GitHub issues GitHub last commit


Star us on GitHub — it motivates us a lot!

AI-BOM

AI-BOM — Discover every AI agent, model, and API hiding in your infrastructure.
Open source by Trusera — Securing the Agentic Service Mesh.