n8n-workflows Main Commit ee25413 allows attackers to execute a directory traversal via the download_workflow function within api_server.py
How AI Introduced This
Yes. The AI-authored commit ff958e486e1f8de4f7fd43c70ef357b8d6eaf433 created api_server.py and introduced `download_workflow` using attacker-controlled `filename` in `os.path.join("workflows", filename)` with no validation or canonicalization. A later human refactor preserved that unsafe path construction, but the vulnerable design originated in the Claude Code-generated commit.
▶Attribution Chain
▶Bug-Introducing Commits(1)
⚡ Complete workflow naming convention overhaul and documentation system optimization
Deep Verification
by investigator-overrideYes. The AI-authored commit ff958e486e1f8de4f7fd43c70ef357b8d6eaf433 created api_server.py and introduced `download_workflow` using attacker-controlled `filename` in `os.path.join("workflows", filename)` with no validation or canonicalization. A later human refactor preserved that unsafe path construction, but the vulnerable design originated in the Claude Code-generated commit.
▶AI Signals(1)
| Claude Code | Co-author trailer | Co-Authored-By: Claude <noreply@anthropic.com> | 95% |