Scan Single URLs for Security Vulnerabilities with GPT-4 (JS, PHP, Python)

Overview This workflow automates static security analysis for JavaScript, PHP, and Python codebases.
It’s designed for bug bounty hunters and security researchers who need fast, structured, and AI-assisted vulnerability detection across multiple sources.

Features

🤖 AI-Powered Analysis: Specialized agents for each language: AI JavaScript Expert AI PHP Expert AI Python Expert Each agent detects only exploitable vulnerabilities (AST + regex heuristics). Returns strict JSON with: { "results": [ { "url": "file or URL", "code": "lines + snippet", "severity": "medium|high|critical", "vuln": "vulnerability type" } ] }

🧩 Post-Processing: Cleans, formats, and validates JSON results. Generates HTML tables with clear styling for quick visualization.

Output ✅ JSON vulnerability reports per file. 📊 HTML table summaries grouped by language and severity.

Usage Import the workflow into n8n. Configure credentials: OpenAI API key
GitHub API Key Google Drive API Key Run via the provided webhook form. Select analysis mode and input target. View structured vulnerability reports directly in n8n or Google Drive.

Notes Performs static analysis only (no code execution). Detects exploitable findings only; ignores low-impact issues.

0
Downloads
0
Views
7.93
Quality Score
beginner
Complexity
Author:Javier Rieiro(View Original →)
Created:11/15/2025
Updated:11/20/2025

🔒 Please log in to import templates to n8n and favorite templates

Workflow Visualization

Loading...

Preparing workflow renderer

Comments (0)

Login to post comments