JavaScriptSentry: Detect Sensitive Information in JavaScript
This workflow contains community nodes that are only compatible with the self-hosted version of n8n.
How It works:
When the user clicks "Execute Workflow" they are prompted for a URL, from there the Puppeteer node extracts JavaScript links from the provided URL.
The links are then filtered down to ones that are relevant to the original URL that was quieried.
From there an AI Agent searches the provided JavaScript links for API Keys, email addresses, and PII leaks.
Finally a report is generated and sent via gmail to a desired destination. The report contains discovered links as well as any sensitive information that may have been found.
Why It's Useful:
This is a great tool for Cybersecurity testing. For Developers, make sure your scripts are clean and you didn't leave anything behind. For Ethical Hackers, this is a great tool for Bug Bounties by discovering sensitive information hidden in JavaScript.
Related Templates
Automatic News Summarization & Email Digest with GPT-4, NewsAPI and Gmail
📰 AI News Digest Agent: Auto News Summarizer & Email Newsletter Create an intelligent news curation system that automat...
Auto-classify Gmail emails with AI and apply labels for inbox organization
Who is this for? Professionals and individuals who receive high volumes of emails, those who want to automatically organ...
Generate Product Ad Copy & CTAs with GPT-4 for Slack and Airtable
⚡ AI Copywriter Pro: Instant Ad Copy & CTA Generator Transform product details into compelling marketing copy in second...
🔒 Please log in to import templates to n8n and favorite templates
Workflow Visualization
Loading...
Preparing workflow renderer
Comments (0)
Login to post comments