Automate Your Website Security Scan with JavaScript Analysis and Email Reporting
detail.loadingPreview
This n8n workflow automates the process of scanning your website's JavaScript files for sensitive information. It identifies API keys, email addresses, and PII, then generates a detailed report and sends it directly to your inbox.
About This Workflow
Ensure your web applications are secure by automating the detection of sensitive data within your JavaScript codebase. This n8n workflow leverages powerful tools to crawl your website, extract JavaScript files, and then analyze their content for potential vulnerabilities. It specifically looks for hardcoded credentials, email addresses, and personally identifiable information (PII) within scripts originating from your target domain. The findings are then compiled into a professional report and delivered directly to your email, enabling prompt action and continuous security monitoring. This solution is designed to be easily configured and integrated into your existing DevOps pipeline.
Key Features
- Automated JavaScript Scanning: Intelligently scans all gathered JavaScript files for sensitive information.
- Vulnerability Detection: Identifies common security risks like API keys, email addresses, and PII.
- Customizable Email Reporting: Generates a detailed, professionally formatted email report of findings.
- Targeted Domain Analysis: Ensures analysis is focused on JavaScript files originating from your specified website.
- Easy Integration: Designed for seamless integration into your existing n8n workflows.
How To Use
- Install Puppeteer: Navigate to
Settings > Community Nodesin n8n and install then8n-nodes-puppeteerpackage. - Configure Form Trigger: Set up the
Form Triggernode (Landing Page Url1) with your website's URL and a clear description. - Set Up Puppeteer: Configure the
Puppeteernode (Puppeteer1) to use the URL from the form trigger and setwaitUntiltonetworkidle2. - Extract JavaScript Links: The
JavaScript Extractornode (JavaScript Extractor1) will automatically extract all JavaScript file URLs from the website's HTML. - Aggregate Results: The
Aggregatenode (Aggregate1) gathers all extracted JavaScript links. - Map Data: The
Data Mappernode (Data Mapper1) prepares the aggregated data for the AI analysis. - Define AI Prompt: Configure the
OpenAI Chat Model(OpenAI Chat Model) andJavaScript Search Agent w/Email Template(JavaScript Search Agent w/Email Template1) nodes. Crucially, input your target website URL and ensure the agent is instructed to analyze the provided JavaScript content for sensitive information and format the output as a professional email. - Format Email Report: The
Format Report for Emailnode (Format Report for Email1) transforms the AI-generated report into an HTML format suitable for email. - Configure Gmail: Set up your Gmail credentials in the
Send a messagenode (Send a message1). Ensure you have added your OAuth and specified the recipient email address. Remember to manually edit the subject line if needed.
Apps Used
Workflow JSON
{
"id": "fc52bf6d-9b73-48fe-b065-5810f57d6b4f",
"name": "Automate Your Website Security Scan with JavaScript Analysis and Email Reporting",
"nodes": 15,
"category": "DevOps",
"status": "active",
"version": "1.0.0"
}Note: This is a sample preview. The full workflow JSON contains node configurations, credentials placeholders, and execution logic.
Get This Workflow
ID: fc52bf6d-9b73...
About the Author
SaaS_Connector
Integration Guru
Connecting CRM, Notion, and Slack to automate your life.
Statistics
Related Workflows
Discover more workflows you might like
Automate Qualys Report Generation and Retrieval
Streamline your Qualys security reporting by automating the generation and retrieval of reports. This workflow ensures timely access to crucial security data without manual intervention.
Automated PR Merged QA Notifications
Streamline your QA process with this automated workflow that notifies your team upon successful Pull Request merges. Leverage AI and vector stores to enrich notifications and ensure seamless integration into your development pipeline.
Robust Concurrency Control for n8n Workflows with Redis
Prevent simultaneous execution of critical n8n workflows or tasks using a centralized, Redis-backed locking mechanism. This reusable utility workflow ensures data integrity and resource management by allowing other workflows to acquire, check, and release locks.