“`html

Intruders have effectively penetrated n8n’s communal node ecosystem using a harmful npm package masqueraded as a genuine Google Ads integration tool.

This assault exposes a significant flaw in the manner workflow automation platforms manage third-party integrations and user credentials.

The harmful package, designated n8n-nodes-hfgjf-irtuinvcm-lasdqewriit, deceived developers into inputting their Google Ads OAuth credentials via a seemingly bona fide credential form.

attack overview
attack overview

Reasons n8n Is an Attractive Target

Upon submission, the malicious code stealthily acquired these credentials and transmitted them to a server controlled by the attacker during the execution of workflows.

This supply chain incursion signifies a novel escalation in cybersecurity risks, taking advantage of the confidence that developers have in community-supported integrations within automation platforms.

n8n functions as a centralized credential repository, preserving OAuth tokens and API keys for numerous integrated services, including Google Ads, Stripe, and Salesforce, in one location.


google
Malicious Google Ads node shown in the n8n node palette after installing the compromised package.
Malicious Google Ads node displayed in the n8n node palette post-installation of the compromised package.

This renders the compromise of even a single community node tremendously valuable to attackers, granting them access to the complete digital ecosystem of an organization.

The architecture of the n8n platform renders it especially susceptible. Community nodes operate with full operating system permissions, can read environment variables, and have file system access.

installing n8n community package via GUI.
installing n8n community package through GUI.

Make outbound network calls essentially inherit the same trust level as that of the core platform itself.

Extent of the Issue

Endorlabs researchers discovered at least eight malevolent npm packages aimed at the n8n ecosystem. The main harmful package alone garnered over 3,400 weekly downloads before its removal.

malicious npm package as listed in the npm registry
malicious npm package as recorded in the npm registry

Numerous packages have been expunged from the npm registry, monitored through security alerts including GHSA-77g5-qpc3-x24r.

EndorLabs encourages organizations to place a priority on official n8n nodes rather than community alternatives, and to diligently audit packages prior to installation.

Scrutinize package specifics for red flags such as inadequate descriptions, unusual names, and extremely low download counts.

Tracking outbound network traffic from n8n instances and utilizing isolated service accounts with limited privileges can also significantly alleviate exposure risk.

This attack mirrors earlier supply chain breaches targeting GitHub Actions workflows, indicating that threat actors continually modify their strategies to capitalize on emerging automation platforms.

As workflow automation grows increasingly central to business functions, organizations must navigate the balance between convenience and the security ramifications of community-supplied integrations.

“`