Just curious what people are using n8n for.

I just finished setting up a workflow that sends me a Telegram message every night about photography opportunities for the next day. It puts together weather data, POIs (which I defined for my location), sun/moon position, milky way visibility, cloud cover, etc. The message then simply tells me if it’s worth it going out in the morning.

      • EarMaster@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        11
        ·
        19 hours ago

        Almost all of them affect authenticated users. The only ones that allow unauthenticated users access are for old versions. So to be honest: I am not that much concerned.

        • non_burglar@lemmy.world
          link
          fedilink
          English
          arrow-up
          9
          ·
          16 hours ago

          You aren’t concerned about a severity 10 vuln? Those are found in software with exceptionally bad qa and abandonware. That should give you pause about how hard n8n is “going fast and breaking things”.

        • statelesz@slrpnk.net
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          15 hours ago

          Well, this “authenticated user” could be your fucking LLM and this is really concerning. Besides that a single CVE 10 is also very concerning no matter how old the affected version is.

    • greyscale@lemmy.grey.ooo
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      4
      ·
      17 hours ago

      I’m not a slop jockey and I’m watching people plug these kinds of things into public data and having it do operations with financial/business impacts.

      I’d rather employ a gremlin to write scripts.