Overview
This workflow automates static security analysis for JavaScript, PHP, and Python codebases.
It’s designed for bug bounty hunters and security researchers who need fast, structured, and AI-assisted vulnerability detection across multiple sources.
Features
-
🤖 AI-Powered Analysis:
- Specialized agents for each language:
- AI JavaScript Expert
- AI PHP Expert
- AI Python Expert
- Each agent detects only exploitable vulnerabilities (AST + regex heuristics).
- Returns strict JSON with:
{
"results": [
{
"url": "file or URL",
"code": "lines + snippet",
"severity": "medium|high|critical",
"vuln": "vulnerability type"
}
]
}
-
🧩 Post-Processing:
- Cleans, formats, and validates JSON results.
- Generates HTML tables with clear styling for quick visualization.
Output
- ✅ JSON vulnerability reports per file.
- 📊 HTML table summaries grouped by language and severity.
Usage
- Import the workflow into n8n.
- Configure credentials:
- OpenAI API key
- GitHub API Key
- Google Drive API Key
- Run via the provided webhook form.
- Select analysis mode and input target.
- View structured vulnerability reports directly in n8n or Google Drive.
Notes
- Performs static analysis only (no code execution).
- Detects exploitable findings only; ignores low-impact issues.