[{"data":1,"prerenderedAt":702},["ShallowReactive",2],{"website-api-page-legal-security":3,"page-template-legal-details-page-template":85,"i-ph:arrow-left-light":142,"i-ph:spinner-gap-thin":146,"i-ph:arrow-right":148,"mainMenu":150,"i-n8n:box":314,"i-n8n:boxes":316,"i-n8n:sparkle":318,"i-n8n:layers":320,"i-n8n:connection":322,"i-n8n:pieces":324,"i-n8n:blocks":326,"i-n8n:files":328,"i-n8n:drives":330,"i-n8n:docs":332,"i-n8n:copyright":334,"i-n8n:note":336,"i-ph:caret-down":338,"i-n8n:chat":340,"i-n8n:discord":342,"i-n8n:blog":344,"i-n8n:users":346,"i-n8n:contribute":348,"i-n8n:score":350,"i-n8n:shield":352,"i-n8n:lightning":354,"i-n8n:help":356,"footer":358,"githubCount":485,"i-uil:github":486,"sub-footer":488,"i-n8n:arrow-link":700},{"id":4,"documentId":5,"url":6,"hideFooterCta":7,"hideFooterTestimonials":7,"createdAt":8,"updatedAt":9,"publishedAt":10,"pageTitle":11,"pageType":12,"templateId":12,"templateVariant":12,"SEO":13,"content":65,"editorialView":84,"searchPageConfig":12},1089,"g6jesljsn3geqxrdmsqna0of","/legal/security",true,"2025-12-04T12:30:18.212Z","2026-04-23T09:49:46.518Z","2026-04-23T09:49:46.850Z","",null,{"id":14,"metaTitle":15,"metaDescription":16,"keywords":12,"metaRobots":12,"structuredData":12,"metaViewport":12,"canonicalURL":12,"metaImage":17,"metaSocial":64},974,"Security","This page gathers n8n’s key security docs: compliance info, SOC reports, encryption practices, audits, and data protection details.",{"id":18,"documentId":12,"name":19,"alternativeText":20,"caption":20,"width":21,"height":22,"formats":23,"hash":58,"ext":25,"mime":28,"size":59,"url":60,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":62,"updatedAt":63,"publishedAt":12,"focalPoint":12},251,"n8n-og-image","Automate without limits",1200,630,{"large":24,"small":34,"medium":42,"thumbnail":50},{"ext":25,"url":26,"hash":27,"mime":28,"name":29,"path":12,"size":30,"width":31,"height":32,"sizeInBytes":33},".png","https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/large_og_image_website_3_afd66761a9.png","large_og_image_website_3_afd66761a9","image/png","large_n8n-og-image",405.17,1000,525,405172,{"ext":25,"url":35,"hash":36,"mime":28,"name":37,"path":12,"size":38,"width":39,"height":40,"sizeInBytes":41},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/small_og_image_website_3_afd66761a9.png","small_og_image_website_3_afd66761a9","small_n8n-og-image",122.22,500,263,122223,{"ext":25,"url":43,"hash":44,"mime":28,"name":45,"path":12,"size":46,"width":47,"height":48,"sizeInBytes":49},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/medium_og_image_website_3_afd66761a9.png","medium_og_image_website_3_afd66761a9","medium_n8n-og-image",250,750,394,250002,{"ext":25,"url":51,"hash":52,"mime":28,"name":53,"path":12,"size":54,"width":55,"height":56,"sizeInBytes":57},"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/thumbnail_og_image_website_3_afd66761a9.png","thumbnail_og_image_website_3_afd66761a9","thumbnail_n8n-og-image",39.59,245,129,39592,"og_image_website_3_afd66761a9",122.62,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/og_image_website_3_afd66761a9.png","strapi-provider-upload-azure-storage","2022-05-24T09:14:17.151Z","2025-04-24T07:38:57.057Z",[],[66,71,80],{"__component":67,"id":68,"tagline":12,"title":69,"description":12,"themeVariant":70},"components.hero-basic-section",465,"Security at n8n","orange",{"__component":72,"id":73,"title":74,"subtitle":12,"compact":7,"settings":75},"components.newsletter-form",70,"Sign up to receive regular security updates",{"id":76,"anchorLink":12,"sectionMargin":77,"sectionSize":78,"sectionGapX":79},1975,"bottom-md","full",false,{"__component":81,"id":82,"fileUrl":12,"fileLabel":12,"content":83},"components.content-sections",171,"\u003Ch3 style=\"margin-left:0px;\">Table of content:\u003C/h3>\u003Cul>\u003Cli data-list-item-id=\"e98bb6c0f82fc664282aa792c6930a6ac\">\u003Ca href=\"#compliance\">Compliance\u003C/a>\u003C/li>\u003Cli data-list-item-id=\"e6c77d7b6e37f91adb3eeec0827beef92\">\u003Ca href=\"#customer-data-protection-encryption\">Customer data protection &amp; encryption\u003C/a>\u003C/li>\u003Cli data-list-item-id=\"efb3247ac8f970e6a35199ea0b872ca98\">\u003Ca href=\"#cloud-hosting-storage\">Cloud hosting &amp; storage\u003C/a>\u003C/li>\u003Cli data-list-item-id=\"ea6d6f2ad016d94dcc7008277040f454e\">\u003Ca href=\"#secure-development-practices\">Secure development practices\u003C/a>\u003C/li>\u003Cli data-list-item-id=\"e1c60dc1e2792a9cfe947e589061e7741\">\u003Ca href=\"#access-controls\">Access controls\u003C/a>\u003C/li>\u003Cli data-list-item-id=\"e741bd3a3f470d8c5a0ae462930d038e0\">\u003Ca href=\"#corporate-security\">Corporate security\u003C/a>\u003C/li>\u003Cli data-list-item-id=\"e92a55fb326b8e591455c4652e640116d\">\u003Ca href=\"#threat-vulnerability-management\">Threat &amp; vulnerability management\u003C/a>\u003C/li>\u003C/ul>\u003Cp style=\"margin-left:0px;\">Based in Berlin, prioritizing security and privacy is baked into our culture. Many of the world's most well-known Enterprises trust n8n with their data – we don’t take that lightly. Here are some of the measures, systems, and controls we’ve put in place – both at product and company level – to ensure security always underpins everything we do.\u003C/p>\u003Ch2 style=\"margin-left:0px;\" id=\"compliance\">Compliance\u003C/h2>\u003Cp style=\"margin-left:0px;\">n8n aligns its security program to SOC 2, a standard framework for security compliance. That means we have implemented processes and follow procedures that uphold high standards of security for our customers' data. We undergo continuous evaluation and annual audits by an independent auditor as part of ongoing compliance with this standard.\u003C/p>\u003Cp>\u003Cimg src=\"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/SOC_2_badge_150px_8f4490eace.png\" alt=\"SOC2 badge 150px.png\" width=\"150\" height=\"149\">\u003C/p>\u003Ch3 style=\"margin-left:0px;\">SOC 2 report\u003C/h3>\u003Cp style=\"margin-left:0px;\">Our SOC 2 report is available to enterprise customers. Others can refer to our SOC 3 report and the details about our security program below.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">SOC 3 report\u003C/h3>\u003Cp style=\"margin-left:0px;\">You can \u003Ca href=\"https://drive.google.com/file/d/1xxueZc7CXiSbj7v-avcAJuK6_K18j5ck/view\" target=\"_blank\">download our SOC 3 report here\u003C/a>. The report contains the auditor’s opinion, management assertion, and system description.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Documentation\u003C/h3>\u003Cp style=\"margin-left:0px;\">For more details about privacy, security and how we comply with GDPR at n8n, please visit our \u003Ca href=\"https://docs.n8n.io/privacy-security/\" target=\"_blank\">docs\u003C/a>.\u003C/p>\u003Ch2 style=\"margin-left:0px;\" id=\"customer-data-protection-encryption\">Customer data protection &amp; encryption\u003C/h2>\u003Ch3 style=\"margin-left:0px;\">User accounts, authentication, and authorization\u003C/h3>\u003Ch4 style=\"margin-left:0px;\">n8n Cloud\u003C/h4>\u003Cp style=\"margin-left:0px;\">When you sign up for an n8n cloud account, you create an account directly with n8n. When you create an account on n8n.cloud with a username and password, n8n implements best practices for account management. For example, n8n salts and hashes your password, then stores the hashed password in a database that’s encrypted at rest.\u003C/p>\u003Ch4 style=\"margin-left:0px;\">Self-hosted\u003C/h4>\u003Cp style=\"margin-left:0px;\">n8n salts and hashes the passwords of self-hosted users on account creation. However, encrypting other data at rest is the responsibility of the user. Refer to \u003Ca href=\"https://docs.n8n.io/privacy-security/security/#self-hosted-n8n\" target=\"_blank\">Data Encryption | Self-hosted n8n\u003C/a> for more information.\u003C/p>\u003Cp style=\"margin-left:0px;\">n8n supports custom session timeouts on self-hosted.\u003C/p>\u003Ch4 style=\"margin-left:0px;\">Third-party accounts\u003C/h4>\u003Cp style=\"margin-left:0px;\">A key part of n8n's functionality is linking third-party services. When you link an account from a third-party application, you may need to either authorize n8n OAuth application access to your account, or provide an API key or other credentials.\u003C/p>\u003Cp style=\"margin-left:0px;\">n8n recommends using \u003Ca href=\"https://oauth.net/2/\" target=\"_blank\">OAuth\u003C/a> for third-party applications that support it. The OAuth protocol allows n8n to request scoped access to specific resources in your third-party account without you having to provide long-term credentials directly. n8n must request short-term access tokens at regular intervals, and most applications provide a way to revoke n8n's access to your account at any time.\u003C/p>\u003Cp style=\"margin-left:0px;\">Some third-party applications don't provide an OAuth interface. To access these services, you must provide the required authorization mechanism (often an API key). As a best practice, if your application provides such functionality, n8n recommends limiting that API key's access to only the resources you need to access within n8n.\u003C/p>\u003Cp style=\"margin-left:0px;\">When you use credentials in a workflow, n8n loads them into the execution environment of your n8n instance. For n8n Cloud, customer instances are logically isolated from one another. n8n doesn't log or export credentials by default. If you log their values you can always delete the data for that execution. The platform deletes execution data automatically based on your account’s retention settings.\u003C/p>\u003Cp style=\"margin-left:0px;\">You can delete your OAuth grants or key-based credentials at any time. Deleting OAuth grants within n8n doesn't revoke n8n’s access to your account. You must revoke that access wherever you manage OAuth grants in your third-party application.\u003C/p>\u003Ch4 style=\"margin-left:0px;\">User authentication\u003C/h4>\u003Cp style=\"margin-left:0px;\">A username and password are required to authenticate into the app, with MFA optional for external uses. SSO, SAML, and LDAP are available with n8n’s Enterprise plan.\u003C/p>\u003Ch4 style=\"margin-left:0px;\">Role-based authorization\u003C/h4>\u003Cp style=\"margin-left:0px;\">Advanced RBAC permissions are available on all paid plans to ensure governance, including designating super admin user roles.\u003C/p>\u003Ch2 style=\"margin-left:0px;\" id=\"cloud-hosting-storage\">Cloud hosting &amp; storage\u003C/h2>\u003Cp style=\"margin-left:0px;\">n8n cloud uses Microsoft Azure for hosting. The physical hardware powering n8n, and the data stored by the platform, is currently hosted in the European Union. Microsoft controls and secures this location. We’re preparing to host in additional locations too. You can read more about \u003Ca href=\"https://learn.microsoft.com/en-us/azure/security/fundamentals/physical-security\" target=\"_blank\">Azure’s security practices\u003C/a> and \u003Ca href=\"https://learn.microsoft.com/en-us/azure/compliance/\" target=\"_blank\">compliance certifications\u003C/a>.\u003C/p>\u003Cp style=\"margin-left:0px;\">n8n further secures access to Azure resources through a series of controls, including:\u003C/p>\u003Cul>\u003Cli data-list-item-id=\"eb5c6a61b5b2a27467b933cc6d7fbc6e0\">Using multi-factor authentication to access Azure\u003C/li>\u003Cli data-list-item-id=\"e05cf9ba752fc952333d8682415b3c948\">Hosting services within a private network that’s inaccessible to the public internet.\u003C/li>\u003C/ul>\u003Cp style=\"margin-left:0px;\">n8n stores all OAuth tokens, key-based credentials, and the rest of your Cloud instance's database on a disk that's encrypted at rest using Azure server side encryption (at the time of writing, using AES256 and a FIPS-140-2 compliant implementation). For n8n cloud, this database also resides in a private network. Backups of that database are also encrypted.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Data encryption\u003C/h3>\u003Ch4 style=\"margin-left:0px;\">n8n Cloud\u003C/h4>\u003Cp style=\"margin-left:0px;\">When you use the n8n web application, it encrypts traffic between your client and n8n services in transit. The same applies for traffic related to the public API or webhook trigger nodes. n8n uses Cloudflare to manage and renew SSL certificates.\u003C/p>\u003Cp style=\"margin-left:0px;\">Data encryption at rest: n8n encrypts customer data at rest in your instance's mounted volume. n8n uses Azure Storage server-side encryption (using AES256 and a FIPS-140-2 compliant implementation). Azure Storage has achieved a wide range of compliance certifications. Refer to \u003Ca href=\"https://learn.microsoft.com/en-us/azure/storage/common/storage-compliance-offerings\" target=\"_blank\">Azure Storage compliance offerings\u003C/a> for more information.\u003C/p>\u003Ch4 style=\"margin-left:0px;\">Self-hosted n8n\u003C/h4>\u003Cp style=\"margin-left:0px;\">\u003Cstrong>Self-hosters must:\u003C/strong>\u003C/p>\u003Cul>\u003Cli data-list-item-id=\"e301ccebcd86661cd97710bc73f722aed\">Ensure data is encrypted in transit by setting up a reverse proxy in front of the n8n instance to handle TLS.\u003C/li>\u003Cli data-list-item-id=\"e72215331602a09e0cc1dba1088d3d613\">Handle encrypting data at rest. This can be achieved by using encrypted partitions, or encryption at the hardware level, and ensuring n8n and its database is written to that location. Cloud providers typically offer storage systems with disk encryption built-in.\u003C/li>\u003C/ul>\u003Ch3>Network protection\u003C/h3>\u003Cp style=\"margin-left:0px;\">An operational audit system constantly monitors n8n's cloud infrastructure and sends alerts to appropriate personnel when necessary. We only use configurations that implement approved networking ports and protocols, including firewalls. For example, we maintain a Web Application Firewall to protect n8n’s web application from malicious traffic and outside threats. And an Intrusion Detection System to detect potential intrusions.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Audit logging\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n collects and stores all your server logs in a central location. Authorized users can query the log info as necessary to trace actions to individual users. We keep audit log history and historical activity records for at least 12 months, with at least the last three months immediately available for analysis.\u003C/p>\u003Ch2 style=\"margin-left:0px;\" id=\"secure-development-practices\">Secure development practices\u003C/h2>\u003Ch3 style=\"margin-left:0px;\">Version control system\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n uses a version control system to manage source code, documentation, release labeling, and other change management tasks. Any employee must get their access approved by a system admin to make code changes.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Code review process\u003C/h3>\u003Cp style=\"margin-left:0px;\">When n8n's application code changes, someone other than the person who made the change reviews and tests the new code.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Separate testing and production environments\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n uses separate environments for testing and production for our application.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Restricted production code changes\u003C/h3>\u003Cp style=\"margin-left:0px;\">Only authorized n8n personnel can push or make changes to production code.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Static Application Security Testing (SAST)\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n uses static application security testing (SAST) or an equivalent tool as part of the CI/CD pipeline to detect vulnerabilities in its code base. When vulnerabilities are identified, corrections are implemented before release as appropriate based on the nature of the vulnerability.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Systems Monitoring\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n monitors its code, infrastructure, and core applications for known vulnerabilities and addresses critical vulnerabilities promptly.\u003C/p>\u003Ch2 style=\"margin-left:0px;\" id=\"access-controls\">Access controls\u003C/h2>\u003Ch3 style=\"margin-left:0px;\">Strictly ‘need-to-know’ access to data\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n grants employees access to systems containing sensitive data on a least-privilege basis. This means employees only have access to the data they need to perform their job. The company reviews system access quarterly, on any change in role, and upon termination.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Restricted production code access\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n uses GitHub to store and version all production code. Employees use multi-factor authentication to access the GitHub organization. And only authorized n8n personnel can deploy or make changes to production code.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Required multi-factor authentication\u003C/h3>\u003Cp style=\"margin-left:0px;\">We require MFA wherever it is available.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Encrypted web-based access\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n uses encryption to protect user authentication and admin sessions of the internal admin tool transmitted over the Internet. All connections happen over SSL/TLS with a valid certificate from a reliable Certificate Authority.\u003C/p>\u003Ch2 style=\"margin-left:0px;\" id=\"corporate-security\">Corporate security\u003C/h2>\u003Ch3 style=\"margin-left:0px;\">Rigorous hiring process\u003C/h3>\u003Cp style=\"margin-left:0px;\">Job candidates must pass through multiple stages of comprehensive background checks and interviews to ensure they comply with relevant laws, regulations, and ethics. All new employees must sign our data protection policy on hire.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Strict offboarding process\u003C/h3>\u003Cp style=\"margin-left:0px;\">When an employee leaves n8n, we use a termination checklist to ensure that the employee's system access, including physical access, gets removed within one business day and all organization assets (physical or electronic) get returned.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Workstation security\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n provides hardware to all new hires. These machines run a local agent that sets the configuration of the operating system to hardened standards, including\u003C/p>\u003Cul>\u003Cli data-list-item-id=\"efc472dcef43fa59d3b3273f43187344d\">Automatic OS updates\u003C/li>\u003Cli data-list-item-id=\"ed297ce12d69680dac8d5a1776175fb7c\">Hard disk encryption\u003C/li>\u003Cli data-list-item-id=\"e12152c2e9bf4d454a6a0a8181297f3fa\">A password manager\u003C/li>\u003Cli data-list-item-id=\"ebd336b6333541931beb795ac45e5e268\">Anti-malware software\u003C/li>\u003Cli data-list-item-id=\"ec68710526ff4bda372e4a8ddee913e74\">Screen lock of no more than 15 minutes\u003C/li>\u003C/ul>\u003Ch3 style=\"margin-left:0px;\">Employee security training &amp; awareness\u003C/h3>\u003Cp style=\"margin-left:0px;\">Employees receive privacy and security training during onboarding and annually thereafter. In addition, all new employees and contractors sign contracts that include terms around data protection policy and confidentiality.\u003C/p>\u003Ch2 style=\"margin-left:0px;\" id=\"threat-vulnerability-management\">Threat &amp; vulnerability management\u003C/h2>\u003Ch3 style=\"margin-left:0px;\">Vulnerability scans\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n conducts third-party vulnerability scans of its production environment at least once every 90 days.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Penetration tests\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n conducts third-party penetration tests of its production environment at least once a year.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Intrusion detection\u003C/h3>\u003Cp style=\"margin-left:0px;\">N8n operates an intrusion detection system (IDS) to detect potential intrusions and alert personnel when a potential intrusion is detected. Including a continuously updated anti-malware solution that scans continuously to detect, remove, or block all types of known malware.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Phishing simulations\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n conducts periodic phishing simulations as part of the company's security awareness initiatives.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Threat intelligence\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n has implemented mechanisms to collect threat information and produce threat intelligence (e.g., commercial cyber threat intelligence tools, security product/vendor intelligence feeds, open source feeds, etc.) in accordance with defined threat intelligence objectives.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Backup, recovery, and business continuity\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n stores customer data in a secure production account in Azure, using a combination of Azure Blob Storage and PostgreSQL databases. n8n automatically backs up all customer and system data daily to protect against catastrophic loss due to unforeseen events that impact the entire system. This process backs up or replicates data to a separate region in the same country. And the backups are encrypted in the same way as live production data.\u003C/p>\u003Cp style=\"margin-left:0px;\">n8n’s backup service monitors the entire backup process, and any failures automatically trigger an alert to the Incident Response Team.\u003C/p>\u003Cp style=\"margin-left:0px;\">n8n has a defined and regularly tested Business Continuity Plan outlining the procedures to respond, recover, resume, and restore operations following a major natural disaster or catastrophic system failure.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Disaster recovery plan\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n has formulated a detailed disaster recovery plan outlining the roles, responsibilities, and detailed procedures for recovering systems in case of failure.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Security logs\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n collects and stores server logs in a central location. The system can be queried in an ad hoc fashion by authorized users.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Information security policy\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n has an Information Security Policy to define security obligations for employees and contractors, together with its disciplinary process for violations of the policy.\u003C/p>\u003Ch3 style=\"margin-left:0px;\">Vulnerability disclosure\u003C/h3>\u003Cp style=\"margin-left:0px;\">n8n has a dedicated process for employees to report security, confidentiality, integrity, and availability failures, incidents, and concerns.\u003C/p>\u003Cp style=\"margin-left:0px;\">In addition, n8n maintains customer-accessible support documentation where you can find support contact information. We’re committed to ensuring n8n is a safe and secure tool for all our users. So should you find any operational or security failures, incidents, system problems, concerns, or other issues/complaints, please don’t hesitate to contact the relevant n8n personnel.\u003C/p>\u003Cp style=\"margin-left:0px;\">More info on \u003Ca href=\"https://n8n.notion.site/n8n-vulnerability-disclosure-program\" target=\"_blank\">the n8n Vulnerability Disclosure Program here\u003C/a>.&nbsp;\u003C/p>\u003Cp style=\"margin-left:0px;\">\u003Ca href=\"https://n8n.io/report-a-vulnerability/\">Submit a vulnerability here\u003C/a>.&nbsp;\u003C/p>",[],{"id":86,"documentId":87,"url":88,"hideFooterCta":79,"hideFooterTestimonials":79,"createdAt":89,"updatedAt":90,"publishedAt":91,"pageTitle":12,"pageType":92,"templateId":93,"templateVariant":12,"SEO":12,"content":94,"editorialView":141,"searchPageConfig":12},1044,"whflmnroq13erv4k1neij7pi","/legal/:page","2026-02-03T16:02:30.686Z","2026-04-08T11:57:57.696Z","2026-04-08T11:57:58.017Z","template","legal-details-page-template",[95],{"__component":96,"id":97,"links":98},"components.sidebar-navigation",51,[99,103,106,110,114,118,122,126,130,134,137],{"id":100,"url":101,"label":102,"hint":12},464,"/legal/self-serve-terms/","n8n Self-Serve Terms",{"id":68,"url":104,"label":105,"hint":12},"/legal/master-enterprise-terms/","n8n Master Enterprise Terms",{"id":107,"url":108,"label":109,"hint":12},466,"/legal/eula/","End User License Agreement",{"id":111,"url":112,"label":113,"hint":12},467,"/legal/ai-terms/","n8n AI Terms",{"id":115,"url":116,"label":117,"hint":12},468,"/legal/customer-acceptable-use-policy/","n8n Customer Acceptable Use Policy",{"id":119,"url":120,"label":121,"hint":12},469,"/legal/privacy/","Privacy Policy",{"id":123,"url":124,"label":125,"hint":12},470,"/legal/recruiting-privacy-policy/","Privacy Policy for Recruiting",{"id":127,"url":128,"label":129,"hint":12},471,"/legal/data-processing-agreement/","Data Processing Agreement",{"id":131,"url":132,"label":133,"hint":12},472,"/legal/sub-processors/","Sub-processors",{"id":135,"url":136,"label":15,"hint":12},473,"/legal/security/",{"id":138,"url":139,"label":140,"hint":12},474,"https://trust.n8n.io/","n8n Trust Center",[],{"left":143,"top":143,"width":144,"height":144,"rotate":143,"vFlip":79,"hFlip":79,"body":145},0,256,"\u003Cpath fill=\"currentColor\" d=\"M222 128a6 6 0 0 1-6 6H54.49l61.75 61.76a6 6 0 1 1-8.48 8.48l-72-72a6 6 0 0 1 0-8.48l72-72a6 6 0 0 1 8.48 8.48L54.49 122H216a6 6 0 0 1 6 6\"/>",{"left":143,"top":143,"width":144,"height":144,"rotate":143,"vFlip":79,"hFlip":79,"body":147},"\u003Cpath fill=\"currentColor\" d=\"M132 32v32a4 4 0 0 1-8 0V32a4 4 0 0 1 8 0m92 92h-32a4 4 0 0 0 0 8h32a4 4 0 0 0 0-8m-47.92 46.43a4 4 0 1 0-5.65 5.65l22.62 22.63a4 4 0 0 0 5.66-5.66ZM128 188a4 4 0 0 0-4 4v32a4 4 0 0 0 8 0v-32a4 4 0 0 0-4-4m-48.08-17.57l-22.63 22.62a4 4 0 0 0 5.71 5.66l22.62-22.63a4 4 0 1 0-5.65-5.65ZM68 128a4 4 0 0 0-4-4H32a4 4 0 0 0 0 8h32a4 4 0 0 0 4-4m-5-70.71A4 4 0 0 0 57.29 63l22.63 22.57a4 4 0 1 0 5.65-5.65Z\"/>",{"left":143,"top":143,"width":144,"height":144,"rotate":143,"vFlip":79,"hFlip":79,"body":149},"\u003Cpath fill=\"currentColor\" d=\"m221.66 133.66l-72 72a8 8 0 0 1-11.32-11.32L196.69 136H40a8 8 0 0 1 0-16h156.69l-58.35-58.34a8 8 0 0 1 11.32-11.32l72 72a8 8 0 0 1 0 11.32\"/>",{"id":151,"documentId":152,"createdAt":153,"updatedAt":154,"publishedAt":155,"menuItems":156},1,"x5igzoueyirmhrv6wjhupd2d","2025-12-11T14:08:14.828Z","2026-04-08T15:22:03.916Z","2026-04-08T15:22:03.739Z",[157,185,232,256,306,310],{"id":158,"url":159,"label":160,"subMenuLabel":161,"subMenuLayout":162,"subMenu":163},3,"/features","Product","Discover n8n","default",[164,168,174,179],{"id":151,"url":159,"label":165,"shortDescription":166,"description":12,"icon":167},"Product overview","Automate business processes without limits on your logic.","box",{"id":169,"url":170,"label":171,"shortDescription":172,"description":12,"icon":173},2,"/integrations","Integrations","Seamlessly move and transform data between different apps with n8n.","pieces",{"id":158,"url":175,"label":176,"shortDescription":177,"description":12,"icon":178},"/workflows","Templates","Explore +8500 workflow automation templates.","boxes",{"id":180,"url":181,"label":182,"shortDescription":183,"description":12,"icon":184},4,"/ai","AI","Get to prod faster — and with more flexibility than coding alone.","sparkle",{"id":180,"url":12,"label":186,"subMenuLabel":187,"subMenuLayout":188,"subMenu":189},"Use cases","Explore case study","columns",[190,194,199,204,209,213,218,222,227],{"id":191,"url":192,"label":193,"shortDescription":12,"description":12,"icon":184},5,"/ai-agents","Building AI agents",{"id":195,"url":196,"label":197,"shortDescription":12,"description":12,"icon":198},6,"/rag","RAG","layers",{"id":200,"url":201,"label":202,"shortDescription":12,"description":12,"icon":203},7,"/itops","IT operations","connection",{"id":205,"url":206,"label":207,"shortDescription":12,"description":12,"icon":208},8,"/secops","Security operations","shield",{"id":210,"url":211,"label":212,"shortDescription":12,"description":12,"icon":203},10,"/automate-lead-management","Lead automation",{"id":214,"url":215,"label":216,"shortDescription":12,"description":12,"icon":217},11,"/supercharge-your-crm","Supercharge your CRM","contribute",{"id":219,"url":220,"label":221,"shortDescription":12,"description":12,"icon":173},12,"/limitless-integrations","Limitless integrations",{"id":223,"url":224,"label":225,"shortDescription":12,"description":12,"icon":226},13,"/saas","Backend prototyping","blocks",{"id":228,"url":229,"label":230,"shortDescription":12,"description":12,"icon":231},28,"/case-studies","Case studies","files",{"id":191,"url":233,"label":234,"subMenuLabel":12,"subMenuLayout":12,"subMenu":235},"https://docs.n8n.io/","Docs",[236,241,246,251],{"id":237,"url":238,"label":239,"shortDescription":12,"description":12,"icon":240},14,"https://docs.n8n.io/hosting","Self-host n8n","drives",{"id":242,"url":243,"label":244,"shortDescription":12,"description":12,"icon":245},15,"https://docs.n8n.io","Documentation","docs",{"id":247,"url":248,"label":249,"shortDescription":12,"description":12,"icon":250},16,"https://docs.n8n.io/choose-n8n/faircode-license","Our license","copyright",{"id":252,"url":253,"label":254,"shortDescription":12,"description":12,"icon":255},17,"https://docs.n8n.io/release-notes/","Release notes","note",{"id":195,"url":12,"label":257,"subMenuLabel":12,"subMenuLayout":188,"subMenu":258},"Community",[259,264,269,274,279,284,288,293,297,301],{"id":260,"url":261,"label":262,"shortDescription":12,"description":12,"icon":263},18,"https://community.n8n.io/","Forum","chat",{"id":265,"url":266,"label":267,"shortDescription":12,"description":12,"icon":268},19,"https://discord.gg/XPKeKXeB7d","Discord","discord",{"id":270,"url":271,"label":272,"shortDescription":12,"description":12,"icon":273},20,"/careers","Careers","lightning",{"id":275,"url":276,"label":277,"shortDescription":12,"description":12,"icon":278},21,"https://blog.n8n.io/","Blog","blog",{"id":280,"url":281,"label":282,"shortDescription":12,"description":12,"icon":283},22,"/creators","Creators","users",{"id":285,"url":286,"label":287,"shortDescription":12,"description":12,"icon":217},23,"https://docs.n8n.io/help-community/contributing/","Contribute",{"id":289,"url":290,"label":291,"shortDescription":12,"description":12,"icon":292},24,"/partners","Partners","score",{"id":294,"url":295,"label":296,"shortDescription":12,"description":12,"icon":208},61,"https://experts.n8n.io/","Hire an expert",{"id":298,"url":299,"label":300,"shortDescription":12,"description":12,"icon":273},26,"/community/events","Events",{"id":302,"url":303,"label":304,"shortDescription":12,"description":12,"icon":305},25,"/support","Support","help",{"id":151,"url":307,"label":308,"subMenuLabel":12,"subMenuLayout":12,"subMenu":309},"/enterprise","Enterprise",[],{"id":169,"url":311,"label":312,"subMenuLabel":12,"subMenuLayout":12,"subMenu":313},"/pricing","Pricing",[],{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":315},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M2.742 5.833 10 10m0 0 7.258-4.167M10 10v8.333m7.5-5V6.666a1.667 1.667 0 0 0-.833-1.441L10.833 1.89a1.666 1.666 0 0 0-1.666 0L3.333 5.225A1.667 1.667 0 0 0 2.5 6.666v6.667a1.667 1.667 0 0 0 .833 1.442l5.834 3.333a1.666 1.666 0 0 0 1.666 0l5.834-3.333a1.667 1.667 0 0 0 .833-1.442z\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":317},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M2.475 10.767a1.666 1.666 0 0 0-.808 1.425v2.7a1.666 1.666 0 0 0 .808 1.425l2.5 1.5a1.667 1.667 0 0 0 1.716 0L10 15.833V11.25l-4.167-2.5-3.358 2.017zM5.833 13.75l-3.95-2.375M5.833 13.75 10 11.25M5.833 13.75v4.308M10 11.25v4.583l3.308 1.984a1.667 1.667 0 0 0 1.717 0l2.5-1.5a1.667 1.667 0 0 0 .808-1.425v-2.7a1.665 1.665 0 0 0-.808-1.425L14.167 8.75 10 11.25zM14.167 13.75 10 11.25M14.166 13.75l3.95-2.375M14.166 13.75v4.308\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath\n    d=\"M6.642 3.683a1.667 1.667 0 0 0-.809 1.425V8.75L10 11.25l4.167-2.5V5.108a1.665 1.665 0 0 0-.809-1.425l-2.5-1.5a1.667 1.667 0 0 0-1.716 0l-2.5 1.5zM10 6.668 6.05 4.293M10 6.668l3.95-2.375M10 11.251V6.668\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":319},"\u003Cg fill=\"none\">\u003Cpath d=\"M8.28 12.918a1.667 1.667 0 0 0-1.197-1.197l-5.112-1.319a.416.416 0 0 1 0-.801l5.112-1.32a1.667 1.667 0 0 0 1.198-1.196l1.318-5.113a.417.417 0 0 1 .803 0l1.317 5.113a1.667 1.667 0 0 0 1.198 1.197L18.029 9.6a.417.417 0 0 1 0 .803l-5.112 1.318a1.667 1.667 0 0 0-1.198 1.197l-1.318 5.113a.416.416 0 0 1-.803 0l-1.317-5.113zM16.666 2.5v3.333M18.333 4.168H15M3.333 14.168v1.667M4.167 15H2.5\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":321},"\u003Cg fill=\"none\">\u003Cpath d=\"M10.833 11.45a1.667 1.667 0 0 1-1.667 0L2.083 7.392a.833.833 0 0 1 0-1.45l7.083-4.059a1.667 1.667 0 0 1 1.667 0l7.083 4.059a.833.833 0 0 1 0 1.45l-7.083 4.058zM16.666 11.902l1.25.705a.833.833 0 0 1 0 1.45l-7.083 4.058a1.667 1.667 0 0 1-1.667 0l-7.083-4.058a.834.834 0 0 1 0-1.45l1.25-.705\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":323},"\u003Cg fill=\"none\">\u003Cpath d=\"M7.5 2.5H4.167c-.92 0-1.667.746-1.667 1.667V7.5c0 .92.746 1.667 1.667 1.667H7.5c.92 0 1.667-.747 1.667-1.667V4.167c0-.92-.747-1.667-1.667-1.667zM5.833 9.168v3.333A1.667 1.667 0 0 0 7.5 14.168h3.334M15.834 10.832H12.5c-.92 0-1.666.746-1.666 1.667v3.333c0 .92.746 1.667 1.666 1.667h3.334c.92 0 1.666-.746 1.666-1.667v-3.333c0-.92-.746-1.667-1.666-1.667z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":325},"\u003Cg fill=\"none\">\u003Cpath d=\"M8.333 18.333v-12.5A.833.833 0 0 0 7.5 5H3.333a1.667 1.667 0 0 0-1.667 1.667v10a1.667 1.667 0 0 0 1.667 1.666h10A1.667 1.667 0 0 0 15 16.667V12.5a.834.834 0 0 0-.834-.833h-12.5M17.5 1.668h-5a.833.833 0 0 0-.834.833v5c0 .46.374.834.834.834h5c.46 0 .833-.373.833-.834v-5a.833.833 0 0 0-.833-.833z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":327},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M18.333 6.418c0-.5-.333-1-.666-1.25l-5.25-3.25a1.433 1.433 0 0 0-1.417 0l-8.584 5c-.416.166-.75.666-.75 1.166v5.5c0 .417.334 1 .667 1.25l5.25 3.25a1.434 1.434 0 0 0 1.417 0l8.583-5c.417-.25.75-.833.75-1.25V6.418z\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath d=\"M8.333 18.249v-6.584L1.75 7.582M8.334 11.668l9.916-5.75M11.666 16.5V9.75M15 14.582v-6.75\" stroke=\"#fff\"\n        stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":144,"height":144,"rotate":143,"vFlip":79,"hFlip":79,"body":329},"\u003Crect width=\"256\" height=\"256\" fill=\"none\"/>\u003Cpath d=\"M168,224H56a8,8,0,0,1-8-8V72a8,8,0,0,1,8-8h80l40,40V216A8,8,0,0,1,168,224Z\" fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"16\"/>\u003Cpath d=\"M80,64V40a8,8,0,0,1,8-8h80l40,40V184a8,8,0,0,1-8,8H176\" fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"16\"/>\u003Cline x1=\"88\" y1=\"152\" x2=\"136\" y2=\"152\" fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"16\"/>\u003Cline x1=\"88\" y1=\"184\" x2=\"136\" y2=\"184\" fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"16\"/>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":331},"\u003Cg fill=\"none\">\u003Cpath d=\"M16.666 1.668H3.333c-.92 0-1.667.746-1.667 1.667v3.333c0 .92.747 1.667 1.667 1.667h13.334c.92 0 1.666-.747 1.666-1.667V3.335c0-.92-.746-1.667-1.666-1.667zM16.666 11.668H3.333c-.92 0-1.667.746-1.667 1.667v3.333c0 .92.747 1.667 1.667 1.667h13.334c.92 0 1.666-.747 1.666-1.667v-3.333c0-.92-.746-1.667-1.666-1.667zM5 5h.008M5 15h.008\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":333},"\u003Cg fill=\"none\">\u003Cpath d=\"M10 5.832v11.667M13.334 10H15M13.334 6.668H15M2.5 15a.833.833 0 0 1-.833-.833V3.333A.833.833 0 0 1 2.5 2.5h4.167A3.333 3.333 0 0 1 10 5.833 3.333 3.333 0 0 1 13.333 2.5H17.5a.833.833 0 0 1 .833.833v10.834A.833.833 0 0 1 17.5 15h-5a2.5 2.5 0 0 0-2.5 2.5A2.5 2.5 0 0 0 7.5 15h-5zM5 10h1.667M5 6.668h1.667\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":335},"\u003Cg fill=\"none\">\u003Cpath d=\"M10 18.335a8.333 8.333 0 1 0 0-16.667 8.333 8.333 0 0 0 0 16.667z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M12.358 12.36a3.334 3.334 0 1 1 0-4.717\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":337},"\u003Cg fill=\"none\">\u003Cpath d=\"M12.5 10H8.334M12.5 6.668H8.334M15.834 14.167v-10A1.667 1.667 0 0 0 14.167 2.5H3.333\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M6.667 17.5h10a1.666 1.666 0 0 0 1.666-1.667V15a.833.833 0 0 0-.833-.833H9.166a.834.834 0 0 0-.833.833v.833A1.666 1.666 0 0 1 6.666 17.5zm0 0A1.667 1.667 0 0 1 5 15.833V4.167a1.667 1.667 0 0 0-3.333 0v1.666a.833.833 0 0 0 .833.834H5\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":144,"height":144,"rotate":143,"vFlip":79,"hFlip":79,"body":339},"\u003Cpath fill=\"currentColor\" d=\"m213.66 101.66l-80 80a8 8 0 0 1-11.32 0l-80-80a8 8 0 0 1 11.32-11.32L128 164.69l74.34-74.35a8 8 0 0 1 11.32 11.32\"/>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":341},"\u003Cg fill=\"none\">\u003Cpath d=\"M11.666 7.501A1.667 1.667 0 0 1 10 9.168H5l-3.333 3.333V3.335a1.667 1.667 0 0 1 1.666-1.667H10a1.666 1.666 0 0 1 1.666 1.667V7.5zM15 7.5h1.667a1.666 1.666 0 0 1 1.666 1.667v9.166L15 15h-5a1.667 1.667 0 0 1-1.666-1.667V12.5\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":343},"\u003Cg fill=\"none\">\u003Cpath d=\"M12.945 14.446 14.075 16c.775-.025 3.7-.6 4.725-2.4 0-3.836-1.667-8.304-2.4-8.981-1.516-1.218-4-1.419-4-1.419s-.198.441-.25.99\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M12.6 12c.773 0 1.4-.716 1.4-1.6 0-.883-.627-1.6-1.4-1.6-.773 0-1.4.717-1.4 1.6 0 .884.627 1.6 1.4 1.6zM7.85 4.19c-.052-.55-.25-.99-.25-.99s-2.484.2-4 1.418c-.733.677-2.4 5.145-2.4 8.981 1.025 1.8 3.95 2.375 4.725 2.4l1.13-1.553\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M4.205 13.105s1.92 1.697 5.795 1.697 5.795-1.697 5.795-1.697M15.22 5.371C13.257 4.153 10.85 4 10 4c-.849 0-3.256.153-5.22 1.371M7.4 12c.773 0 1.4-.716 1.4-1.6 0-.883-.627-1.6-1.4-1.6-.773 0-1.4.717-1.4 1.6 0 .884.627 1.6 1.4 1.6z\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":345},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M12.5 15H8.334M15 11.668H8.334M3.333 18.335h13.334a1.667 1.667 0 0 0 1.666-1.667V3.335a1.667 1.667 0 0 0-1.666-1.667h-10A1.667 1.667 0 0 0 5 3.335v13.333a1.667 1.667 0 0 1-1.667 1.667zm0 0a1.667 1.667 0 0 1-1.667-1.667v-7.5a1.667 1.667 0 0 1 1.667-1.667H5\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath\n    d=\"M14.167 5h-5a.833.833 0 0 0-.833.833V7.5c0 .46.373.833.833.833h5c.46 0 .833-.373.833-.833V5.833A.833.833 0 0 0 14.167 5z\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":347},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M13.333 17.5v-1.667A3.333 3.333 0 0 0 10 12.5H5a3.333 3.333 0 0 0-3.333 3.333V17.5M13.334 2.605a3.333 3.333 0 0 1 0 6.454M18.334 17.501v-1.667a3.334 3.334 0 0 0-2.5-3.225M7.5 9.167a3.333 3.333 0 1 0 0-6.667 3.333 3.333 0 0 0 0 6.667z\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":349},"\u003Cg fill=\"none\">\u003Cpath d=\"M12.5 10.832a2.5 2.5 0 0 0-5 0\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath\n    d=\"M3.333 16.251v-12.5a2.083 2.083 0 0 1 2.084-2.083h10.416a.833.833 0 0 1 .834.833v15a.834.834 0 0 1-.834.834H5.418a2.083 2.083 0 0 1-2.083-2.084zm0 0a2.083 2.083 0 0 1 2.084-2.083h11.25\"\n    stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\n  \u003Cpath d=\"M10 8.333A1.667 1.667 0 1 0 10 5a1.667 1.667 0 0 0 0 3.333z\" stroke=\"#fff\" stroke-linecap=\"round\"\n        stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":351},"\u003Cg fill=\"none\">\u003Cpath d=\"m12.897 10.742 1.263 7.105a.416.416 0 0 1-.675.392l-2.983-2.24a.834.834 0 0 0-.998 0l-2.988 2.239a.417.417 0 0 1-.675-.39l1.261-7.106\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M10 11.668a5 5 0 1 0 0-10 5 5 0 0 0 0 10z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":353},"\u003Cg fill=\"none\">\u003Cpath d=\"M16.667 10.835c0 4.167-2.917 6.25-6.384 7.458a.833.833 0 0 1-.558-.008c-3.475-1.2-6.391-3.283-6.391-7.45V5.002a.833.833 0 0 1 .833-.834c1.667 0 3.75-1 5.2-2.266a.975.975 0 0 1 1.266 0c1.459 1.275 3.534 2.266 5.2 2.266a.833.833 0 0 1 .834.834v5.833zM6.667 10h.008M10 10h.008M13.334 10h.008\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"left":143,"top":143,"width":289,"height":302,"rotate":143,"vFlip":79,"hFlip":79,"body":355},"\u003Cg fill=\"none\">\u003Cpath\n    d=\"M20.2299 11.5785C20.2015 11.4583 20.1438 11.3469 20.062 11.2544C19.9803 11.1618 19.8769 11.0908 19.7611 11.0478L14.3602 9.0219L15.7345 2.14721C15.7657 1.98748 15.744 1.82197 15.6728 1.67564C15.6016 1.5293 15.4847 1.4101 15.3398 1.33602C15.1949 1.26193 15.0299 1.23698 14.8696 1.26493C14.7093 1.29288 14.5624 1.37222 14.4511 1.49096L3.95111 12.741C3.86583 12.8308 3.80413 12.9404 3.77154 13.0599C3.73895 13.1795 3.73647 13.3052 3.76432 13.4259C3.79218 13.5466 3.84951 13.6585 3.93118 13.7517C4.01285 13.8448 4.11632 13.9163 4.23236 13.9597L9.63517 15.9857L8.26454 22.8528C8.23342 23.0126 8.2551 23.1781 8.3263 23.3244C8.3975 23.4708 8.51436 23.59 8.65926 23.664C8.80415 23.7381 8.9692 23.7631 9.12952 23.7351C9.28983 23.7072 9.43671 23.6278 9.54798 23.5091L20.048 12.2591C20.1317 12.1692 20.1921 12.0601 20.2238 11.9415C20.2555 11.8228 20.2576 11.6981 20.2299 11.5785ZM10.253 20.5625L11.2345 15.6519C11.2697 15.4777 11.2418 15.2968 11.156 15.1412C11.0701 14.9857 10.9319 14.8656 10.7658 14.8025L5.81204 12.9416L13.7452 4.44221L12.7645 9.35284C12.7294 9.527 12.7572 9.70797 12.8431 9.86352C12.9289 10.0191 13.0672 10.1391 13.2333 10.2022L18.1833 12.0585L10.253 20.5625Z\"\n    fill=\"#fff\"/>\u003C/g>",{"left":143,"top":143,"width":270,"height":270,"rotate":143,"vFlip":79,"hFlip":79,"body":357},"\u003Cg fill=\"none\">\u003Cpath d=\"M10 18.335a8.333 8.333 0 1 0 0-16.667 8.333 8.333 0 0 0 0 16.667zM4.108 4.11l3.534 3.533M12.358 7.643l3.534-3.534M12.358 12.36l3.534 3.533M7.642 12.36l-3.534 3.533\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003Cpath d=\"M10 13.335a3.333 3.333 0 1 0 0-6.667 3.333 3.333 0 0 0 0 6.667z\" stroke=\"#fff\" stroke-linecap=\"round\" stroke-linejoin=\"round\"/>\u003C/g>",{"id":151,"documentId":359,"content":20,"copyright":360,"createdAt":361,"updatedAt":362,"publishedAt":363,"testimonials":364,"ctaBox":366,"socialLinks":373,"navigation":425,"bottomLinks":471},"zfq1in9y6ikz2ibhh2o6yafr","© 2026 n8n &nbsp; | &nbsp; All rights reserved.","2025-12-12T07:46:36.173Z","2026-04-21T15:25:49.085Z","2026-04-21T15:25:48.819Z",{"id":365},35,{"id":151,"content":367,"button":368},"\u003Ch2>Simple enough to see.\u003Cbr>Powerful enough to ship.\u003C/h2>\u003Cp>Join the teams building AI automation they can actually explain.\u003C/p>",{"id":369,"text":370,"url":371,"type":372},99,"Start building","https://app.n8n.cloud/register","primary",[374,386,396,405,415],{"id":151,"url":375,"label":376,"image":377},"https://twitter.com/n8n_io","Twitter",{"id":378,"documentId":12,"name":379,"alternativeText":12,"caption":12,"width":289,"height":275,"formats":12,"hash":380,"ext":381,"mime":382,"size":383,"url":384,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":385,"updatedAt":385,"publishedAt":12,"focalPoint":12},2250,"twitter.svg","twitter_f8db5c2135",".svg","image/svg+xml",0.64,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/twitter_f8db5c2135.svg","2024-11-22T11:32:41.445Z",{"id":169,"url":387,"label":388,"image":389},"https://github.com/n8n-io/n8n","GitHub",{"id":390,"documentId":12,"name":391,"alternativeText":12,"caption":12,"width":302,"height":302,"formats":12,"hash":392,"ext":381,"mime":382,"size":393,"url":394,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":395,"updatedAt":395,"publishedAt":12,"focalPoint":12},2248,"github.svg","github_e1f217d7a3",0.84,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/github_e1f217d7a3.svg","2024-11-22T11:30:12.205Z",{"id":158,"url":397,"label":267,"image":398},"https://discord.gg/n8n",{"id":399,"documentId":12,"name":400,"alternativeText":12,"caption":12,"width":289,"height":265,"formats":12,"hash":401,"ext":381,"mime":382,"size":402,"url":403,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":404,"updatedAt":404,"publishedAt":12,"focalPoint":12},2249,"discord.svg","discord_253947c90b",1.24,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/discord_253947c90b.svg","2024-11-22T11:30:32.106Z",{"id":180,"url":406,"label":407,"image":408},"https://www.linkedin.com/company/n8n/","Linkedin",{"id":409,"documentId":12,"name":410,"alternativeText":12,"caption":12,"width":302,"height":302,"formats":12,"hash":411,"ext":381,"mime":382,"size":412,"url":413,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":414,"updatedAt":414,"publishedAt":12,"focalPoint":12},2247,"linkedin.svg","linkedin_d710e84d63",0.58,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/linkedin_d710e84d63.svg","2024-11-22T11:29:49.214Z",{"id":191,"url":416,"label":417,"image":418},"https://www.youtube.com/c/n8n-io","youtube",{"id":419,"documentId":12,"name":420,"alternativeText":12,"caption":12,"width":289,"height":252,"formats":12,"hash":421,"ext":381,"mime":382,"size":422,"url":423,"previewUrl":12,"provider":61,"provider_metadata":12,"createdAt":424,"updatedAt":424,"publishedAt":12,"focalPoint":12},2246,"youtube.svg","youtube_de4bdef50a",0.48,"https://n8niostorageaccount.blob.core.windows.net/n8nio-strapi-blobs-stage/assets/youtube_de4bdef50a.svg","2024-11-22T11:29:27.359Z",[426,428,430,431,434,437,440,443,447,450,453,456,460,463,465,468],{"id":151,"url":271,"label":272,"hint":427},"Hiring",{"id":169,"url":229,"label":429,"hint":12},"Case Studies",{"id":195,"url":290,"label":291,"hint":12},{"id":180,"url":432,"label":433,"hint":12},"/contact","Contact",{"id":237,"url":435,"label":436,"hint":12},"/reports/ai-agent-development-tools","AI agent report",{"id":158,"url":438,"label":439,"hint":12},"/affiliates","Affiliate program",{"id":200,"url":441,"label":442,"hint":12},"https://merch.n8n.io","Merch",{"id":444,"url":445,"label":446,"hint":12},356,"/ai-benchmark/","AI benchmark ",{"id":448,"url":449,"label":296,"hint":12},414,"https://experts.n8n.io",{"id":210,"url":451,"label":452,"hint":12},"/press","Press",{"id":191,"url":454,"label":455,"hint":12},"/vs/","n8n alternatives",{"id":457,"url":458,"label":459,"hint":12},9,"https://internal.users.n8n.cloud/form/n8n-usability-test-signup","Join user tests, get a gift",{"id":223,"url":461,"label":462,"hint":12},"/legal/","Legal",{"id":219,"url":464,"label":300,"hint":12},"https://luma.com/n8n-events",{"id":242,"url":466,"label":467,"hint":12},"/brandguidelines/","Brand guidelines",{"id":214,"url":469,"label":470,"hint":12},"/tools/","Tools",[472,476,478,481],{"id":473,"url":474,"label":475,"hint":12},136,"/imprint/","Imprint",{"id":477,"url":136,"label":15,"hint":12},137,{"id":479,"url":120,"label":480,"hint":12},138,"Privacy",{"id":482,"url":483,"label":484,"hint":12},139,"/report-a-vulnerability/","Report a vulnerability",186237,{"left":143,"top":143,"width":289,"height":289,"rotate":143,"vFlip":79,"hFlip":79,"body":487},"\u003Cpath fill=\"currentColor\" d=\"M12 2.247a10 10 0 0 0-3.162 19.487c.5.088.687-.212.687-.475c0-.237-.012-1.025-.012-1.862c-2.513.462-3.163-.613-3.363-1.175a3.64 3.64 0 0 0-1.025-1.413c-.35-.187-.85-.65-.013-.662a2 2 0 0 1 1.538 1.025a2.137 2.137 0 0 0 2.912.825a2.1 2.1 0 0 1 .638-1.338c-2.225-.25-4.55-1.112-4.55-4.937a3.9 3.9 0 0 1 1.025-2.688a3.6 3.6 0 0 1 .1-2.65s.837-.262 2.75 1.025a9.43 9.43 0 0 1 5 0c1.912-1.3 2.75-1.025 2.75-1.025a3.6 3.6 0 0 1 .1 2.65a3.87 3.87 0 0 1 1.025 2.688c0 3.837-2.338 4.687-4.562 4.937a2.37 2.37 0 0 1 .674 1.85c0 1.338-.012 2.413-.012 2.75c0 .263.187.575.687.475A10.005 10.005 0 0 0 12 2.247\"/>",{"id":151,"documentId":489,"createdAt":490,"updatedAt":490,"publishedAt":491,"columns":492},"zoopqgk9x2v1frf37f0i4zwo","2025-12-12T10:56:49.848Z","2025-12-12T10:56:49.650Z",[493,527,568,612,657],{"id":151,"columnName":494,"autofillOptions":495,"bottomLink":170,"bottomLinkLabel":496,"links":497},"Popular integrations","popular_integrations","Show more integrations",[498,501,504,507,510,512,515,518,521,524],{"id":247,"url":499,"label":500,"hint":12},"/integrations/google-sheets/","Google Sheets",{"id":252,"url":502,"label":503,"hint":12},"/integrations/telegram/","Telegram",{"id":260,"url":505,"label":506,"hint":12},"/integrations/mysql/","MySQL",{"id":265,"url":508,"label":509,"hint":12},"/integrations/slack/","Slack",{"id":270,"url":511,"label":267,"hint":12},"/integrations/discord/",{"id":275,"url":513,"label":514,"hint":12},"/integrations/postgres/","Postgres",{"id":280,"url":516,"label":517,"hint":12},"/integrations/notion/","Notion",{"id":285,"url":519,"label":520,"hint":12},"/integrations/gmail/","Gmail",{"id":289,"url":522,"label":523,"hint":12},"/integrations/airtable/","Airtable",{"id":302,"url":525,"label":526,"hint":12},"/integrations/google-drive/","Google Drive",{"id":169,"columnName":528,"autofillOptions":12,"bottomLink":529,"bottomLinkLabel":496,"links":530},"Trending combinations","/integrations/",[531,534,538,541,545,549,553,557,561,565],{"id":298,"url":532,"label":533,"hint":12},"/integrations/hubspot/and/salesforce/","HubSpot and Salesforce",{"id":535,"url":536,"label":537,"hint":12},27,"/integrations/twilio/and/whatsapp-business-cloud/","Twilio and WhatsApp",{"id":228,"url":539,"label":540,"hint":12},"/integrations/github/and/jira-software/","GitHub and Jira",{"id":542,"url":543,"label":544,"hint":12},29,"/integrations/asana/and/slack/","Asana and Slack",{"id":546,"url":547,"label":548,"hint":12},30,"/integrations/asana/and/salesforce/","Asana and Salesforce",{"id":550,"url":551,"label":552,"hint":12},31,"/integrations/jira-software/and/slack/","Jira and Slack",{"id":554,"url":555,"label":556,"hint":12},32,"/integrations/jira-software/and/salesforce/","Jira and Salesforce",{"id":558,"url":559,"label":560,"hint":12},33,"/integrations/github/and/slack/","GitHub and Slack",{"id":562,"url":563,"label":564,"hint":12},34,"/integrations/hubspot/and/quickbooks-online/","HubSpot and QuickBooks",{"id":365,"url":566,"label":567,"hint":12},"/integrations/hubspot/and/slack/","HubSpot and Slack",{"id":158,"columnName":569,"autofillOptions":570,"bottomLink":529,"bottomLinkLabel":571,"links":572},"Top integration categories","top_integration_categories","Explore more categories",[573,577,581,585,588,592,596,600,604,608],{"id":574,"url":575,"label":576,"hint":12},36,"/integrations/categories/communication/","Communication",{"id":578,"url":579,"label":580,"hint":12},37,"/integrations/categories/development/","Development",{"id":582,"url":583,"label":584,"hint":12},38,"/integrations/categories/cybersecurity/","Cybersecurity",{"id":586,"url":587,"label":182,"hint":12},39,"/integrations/categories/ai/",{"id":589,"url":590,"label":591,"hint":12},40,"/integrations/categories/data-and-storage/","Data & Storage",{"id":593,"url":594,"label":595,"hint":12},41,"/integrations/categories/marketing/","Marketing",{"id":597,"url":598,"label":599,"hint":12},42,"/integrations/categories/productivity/","Productivity",{"id":601,"url":602,"label":603,"hint":12},43,"/integrations/categories/sales/","Sales",{"id":605,"url":606,"label":607,"hint":12},44,"/integrations/categories/utility/","Utility",{"id":609,"url":610,"label":611,"hint":12},45,"/integrations/categories/miscellaneous/","Miscellaneous",{"id":180,"columnName":613,"autofillOptions":614,"bottomLink":615,"bottomLinkLabel":616,"links":617},"Trending templates","top_templates","/workflows/","Explore 800+ workflow templates",[618,622,626,630,634,638,641,645,649,653],{"id":619,"url":620,"label":621,"hint":12},46,"/workflows/1750-creating-an-api-endpoint/","Creating an API endpoint",{"id":623,"url":624,"label":625,"hint":12},47,"/workflows/1954-ai-agent-chat/","AI agent chat",{"id":627,"url":628,"label":629,"hint":12},48,"/workflows/1951-scrape-and-summarize-webpages-with-ai/","Scrape and summarize webpages with AI",{"id":631,"url":632,"label":633,"hint":12},49,"/workflows/1747-joining-different-datasets/","Joining different datasets",{"id":635,"url":636,"label":637,"hint":12},50,"/workflows/1534-back-up-your-n8n-workflows-to-github/","Back Up Your n8n Workflows To Github",{"id":97,"url":639,"label":640,"hint":12},"/workflows/1700-very-quick-quickstart/","Very quick quickstart",{"id":642,"url":643,"label":644,"hint":12},52,"/workflows/1862-openai-gpt-3-company-enrichment-from-website-content/","OpenAI GPT-3: Company Enrichment from website content",{"id":646,"url":647,"label":648,"hint":12},53,"/workflows/1748-pulling-data-from-services-that-n8n-doesnt-have-a-pre-built-integration-for/","Pulling data from services that n8n doesn’t have a pre-built integration for",{"id":650,"url":651,"label":652,"hint":12},54,"/workflows/1435-convert-json-to-an-excel-file/","Convert JSON to an Excel file",{"id":654,"url":655,"label":656,"hint":12},55,"/workflows/1934-telegram-ai-chatbot/","Telegram AI Chatbot",{"id":191,"columnName":658,"autofillOptions":12,"bottomLink":276,"bottomLinkLabel":659,"links":660},"Top guides","Show guides",[661,665,669,673,677,681,684,688,692,696],{"id":662,"url":663,"label":664,"hint":12},56,"https://blog.n8n.io/telegram-bots/","Telegram bots",{"id":666,"url":667,"label":668,"hint":12},57,"https://blog.n8n.io/open-source-chatbot/","Open-source chatbot",{"id":670,"url":671,"label":672,"hint":12},58,"https://blog.n8n.io/open-source-llm/","Open-source LLM",{"id":674,"url":675,"label":676,"hint":12},59,"https://blog.n8n.io/open-source-low-code-platforms/","Open-source low-code platforms",{"id":678,"url":679,"label":680,"hint":12},60,"https://blog.n8n.io/free-zapier-alternatives/","Zapier alternatives",{"id":294,"url":682,"label":683,"hint":12},"https://blog.n8n.io/make-vs-zapier/","Make vs Zapier",{"id":685,"url":686,"label":687,"hint":12},62,"https://blog.n8n.io/ai-agents/","AI agents",{"id":689,"url":690,"label":691,"hint":12},63,"https://blog.n8n.io/ai-coding-assistants/","AI coding assistants",{"id":693,"url":694,"label":695,"hint":12},64,"https://blog.n8n.io/create-chatgpt-discord-bot/","ChatGPT Discord bot",{"id":697,"url":698,"label":699,"hint":12},65,"https://blog.n8n.io/best-ai-chatbot/","Best AI chatbot",{"left":143,"top":143,"width":210,"height":210,"rotate":143,"vFlip":79,"hFlip":79,"body":701},"\u003Cg fill=\"none\">\u003Cpath\n    fill=\"#fff\"\n    fill-rule=\"evenodd\"\n    d=\"M7.678 1.36H.481V0H10v9.52H8.64v-7.2L.962 10 0 9.038 7.678 1.36Z\"\n  />\u003C/g>",1777563021564]