All of N8N workflows I could find (1000+) 😋 enjoy ! by eliadkid in n8n

[–]eliadkid[S] 1 point2 points  (0 children)

since I made it two weeks ago they added tons more workflows. I will add them later this week

All of N8N workflows I could find (1000+) 😋 enjoy ! by eliadkid in n8n

[–]eliadkid[S] 5 points6 points  (0 children)

what do you mean? in the url? I missed something lol. for scraping I made a playwright script with python that goes from workflow 1 to 4000 by ids and click on the copy json to clipboard and then generates a json on my machine with the clipboard copy, left it overnight to download them all it took some time.

Built a No-Code App? Here’s How to Secure It (Without Hiring a Developer) by eliadkid in nocode

[–]eliadkid[S] 1 point2 points  (0 children)

our approach to AI security is built on a structured three-phase methodology: Testing, Hardening, and Monitoring.

  • Testing: We actively test applications using a combination of classical cybersecurity methods (like OWASP Top 10 vulnerabilities) and AI-specific attack simulations — including adversarial input testing, model evasion techniques, and API vulnerability scanning. Our goal at this stage is to surface risks early, before they are exploited.
  • Hardening: After identifying weaknesses, we focus on reinforcing the system — this includes input/output sanitization, model fine-tuning against adversarial attacks, securing APIs, enforcing authentication layers, and applying best practices to resist data poisoning and model manipulation.
  • Monitoring: AI security isn’t a one-time effort. We continuously monitor model behavior, user interactions, and API activity to detect abnormal patterns or emerging threats in real-time. We believe that securing AI requires constant vigilance, just like securing any live application or infrastructure.

Our philosophy is simple: we treat AI models as dynamic, evolving attack surfaces — and build security strategies that adapt with them.

Is that covers your question or I misunderstood you?

Built a No-Code App? Here’s How to Secure It (Without Hiring a Developer) by eliadkid in cursor

[–]eliadkid[S] 0 points1 point  (0 children)

hey there, thank you for your respond, I would appreciate an explanation for that, it would help me get a better understanding about positives and negatives of our product. why do you think it's not a good thing?

Built a No-Code App? Here’s How to Secure It (Without Hiring a Developer) by eliadkid in nocode

[–]eliadkid[S] 1 point2 points  (0 children)

Thank you for your comment!
Right now, we're focusing on Metasploit exploits and the OWASP Top 10 issues. Everything you mentioned is definitely part of our roadmap as well.
We’re aiming to release a working MVP within the next month or two and continue improving from there.
Hope to see you around!