n8n middle node attack
N8n Attacks Bleed Your Workflow Automation Budget
N8n Attacks Bleed Your Workflow Automation Budget In the 2025 OWASP report, attackers inserted covert middle nodes into n8n pipelines, proving that even flawless IAM can be bypassed to steal passwords. This new threat rewrites the economics of workflow automation for small businesses. Workflow Automation: the n8n Middle Node Attack