n8n Supply Chain Attack: Malicious Nodes Stealing Creds

The n8n supply chain attack exploits comunity created nodes to steal OAuth tokens and API keys from automation workflows. Because n8n often functions as a centralized integration/automation hub, a single compromised node can expose multiple connected SaaS platforms, enabling large-scale credential abuse without traditional endpoint compromise.

Introduction

The n8n supply chain attack highlights a growing blind spot in enterprise security: workflow automation platforms are now high-value targets. By abusing malicious community nodes, attackers were able to quietly exfiltrate OAuth tokens and API keys from n8n environments that many organizations treat as trusted internal tooling. The incident makes one thing clear: automation platforms are no longer low-risk productivity tools but part of the core enterprise attack surface.

Why This n8n Supply Chain Attack Matters

What makes this attack especially effective is where n8n sits hidden in modern environments. Workflow automation platforms are designed to connect everything: advertising systems, payment processors, CRMs, analytics tools, and internal APIs. Over time, they become centralized credential hubs with broad, persistent access.

In the n8n supply chain attack, adversaries leveraged this reality. Instead of compromising endpoints or exploiting perimeter services, they targeted the automation fabric itself. Once a malicious node was installed, it operated with the same privileges as the n8n system integrations, silently harvesting credentials as workflows executed. From an attacker’s perspective, this is an efficient way to harvest credentials allowing attackers to move across an organization without triggering many traditional security controls.

How the Attack Works in Practice

The attack abuses n8n’s extensibility model, which allows users to install third-party npm packages known as community nodes. These nodes often provide integrations for popular services like Google Ads or payment platforms, and users install them expecting normal functionality.

The malicious packages involved in this campaign were carefully designed to look legitimate. After installation, they presented standard configuration screens and prompted users to authenticate their accounts. OAuth tokens and API keys were then stored inside n8n’s credential store, just like any trusted integration.

The real damage occurred during workflow execution. At runtime, the malicious node decrypted the stored OAuth tokens using n8n’s master key and exfiltrated them to attacker-controlled infrastructure. Because community nodes are not sandboxed, they can read environment variables, access the filesystem, and make arbitrary outbound network requests. There is no technical distinction between trusted core nodes and third-party ones, which makes OAuth token exfiltration attacks particularly hard to detect.

This design choice, while flexible, dramatically increases the n8n community nodes security risk when governance and monitoring are weak.

The Real Impact: Automation Platform Credential Theft

The consequences of this attack go far beyond n8n itself. In many enterprise deployments, a single n8n instance may hold credentials for Google Ads, Stripe, Salesforce, analytics platforms, and internal services. Compromising one malicious package can therefore expose an entire portfolio of connected systems.

This form of automation platform credential theft enables fraud, data exfiltration, and abuse of business-critical SaaS platforms without exploiting endpoints or user devices. It also complicates incident response, because abuse may initially appear as legitimate API activity coming from trusted automation infrastructure.

Notably, this campaign involved multiple malicious packages with overlapping authorship, and at least one was updated shortly before disclosure which makes evident that this was an active and evolving operation rather than a one-off experiment. It also represents the first publicly documented supply chain attack targeting the n8n ecosystem, signaling a broader attacker shift toward workflow automation platforms.

Reducing Risk from n8n Community Nodes

Mitigating this class of attack requires treating automation platforms as privileged infrastructure. Organizations running self-hosted n8n should strongly consider disabling community nodes entirely if they are not essential. Where third-party nodes are required, an allow-listed model is far safer than open installation.

From a monitoring perspective, detection efforts should focus on behavior rather than package names alone. Malicious nodes reveal themselves through runtime actions; accessing credential stores and initiating outbound connections that do not align with documented integration behavior. Monitoring n8n hosts for unexpected network destinations, especially shortly after new node installations, is a practical and effective control.

Guidance from vendors and researchers, including analysis from The Hacker News and Endor Labs, reinforces the need for stronger governance around third-party automation components.

Indicators of Compromise to Watch For

In practice, the most reliable indicators are behavioral. Security teams should be suspicious of n8n workflows that access credentials at runtime and then communicate with previously unseen domains. Network telemetry showing n8n servers initiating outbound connections to destinations unrelated to expected SaaS APIs is a strong signal of compromise.

Integrity indicators also matter. Community nodes with unusual or auto-generated package names, especially those claiming to integrate with high-value services, deserve scrutiny. Any confirmed installation of known malicious packages should be treated as a security incident requiring immediate credential rotation and investigation.

Additional reporting and technical details are available from CSO Online and SC World.

Persistence and Remediation

Persistence in this attack is straightforward but dangerous. As long as the malicious community node remains installed and referenced by active workflows, it continues to run and exfiltrate credentials. No additional malware or OS-level persistence is required.

Effective remediation starts with a complete inventory of installed community nodes across all environments. Any suspicious or confirmed malicious packages should be removed, affected workflows disabled, and all associated OAuth tokens and API keys rotated. Reviewing historical outbound traffic from n8n during the exposure window can help determine the scope of exfiltration and abuse. Coordination with impacted SaaS providers is also essential to invalidate tokens and investigate downstream misuse.

Strategic Takeaways for Workflow Automation Security

The n8n supply chain attack underscores a broader lesson: workflow automation platforms now belong alongside CI/CD systems and identity providers in enterprise threat models. Organizations should formally include tools like n8n in vulnerability management, third-party risk assessments, and security architecture reviews.

Long-term, secrets management strategies should assume compromise. Short-lived OAuth tokens, tightly scoped permissions, and rapid revocation workflows significantly reduce blast radius when an integration is abused. This incident should also trigger an internal review of how automation tools are adopted, who owns them, and how third-party components are approved.


Explore the latest insights on supply chain risk, identity security, and automation platforms in the Blog, or review my detailed Services to see how I can help you assess and harden your environment.

For implementation resources, check out the Security Guides, or get in touch through the Contact page to discuss a tailored security strategy for your organization.

Scroll to Top