diff --git a/workflows/Scan Single URLs for Security Vulnerabilities with GPT-4 (JS, PHP, Python)-10801/metada-10801.json b/workflows/Scan Single URLs for Security Vulnerabilities with GPT-4 (JS, PHP, Python)-10801/metada-10801.json new file mode 100644 index 000000000..fb91055da --- /dev/null +++ b/workflows/Scan Single URLs for Security Vulnerabilities with GPT-4 (JS, PHP, Python)-10801/metada-10801.json @@ -0,0 +1 @@ +{"user_name":"Javier Rieiro","user_username":"pyus3r","user_bio":"I’m Javier Rieiro, a hacker pushing the limits of no-code automation in cybersecurity. Here I show how I use n8n to transform bug bounty and pentesting automating reconnaissance, analysis, and reporting with custom workflows. If you want to see how no code meets offensive security, you’re in the right place.\n","user_links":"https://www.linkedin.com/in/javier-rieiro-2900b5354/","user_avatar":"https://gravatar.com/avatar/93c8d915402047bcfe6516fbfe381fb464743130f2a396c95d90d8aece33b134?r=pg&d=retro&size=200","url":"https://n8nworkflows.xyz/workflows/scan-single-urls-for-security-vulnerabilities-with-gpt-4--js--php--python--10801\n","url_n8n":"https://n8n.io/workflows/10801","nodeTypes":{"n8n-nodes-base.code":{"count":3},"n8n-nodes-base.html":{"count":6},"n8n-nodes-base.filter":{"count":3},"n8n-nodes-base.switch":{"count":3},"n8n-nodes-base.splitOut":{"count":4},"n8n-nodes-base.stickyNote":{"count":12},"n8n-nodes-base.formTrigger":{"count":1},"n8n-nodes-base.googleDrive":{"count":3},"@n8n/n8n-nodes-langchain.agent":{"count":3},"n8n-nodes-base.httpRequestTool":{"count":3},"@n8n/n8n-nodes-langchain.lmChatOpenAi":{"count":3}},"categories":[{"id":29,"name":"SecOps"},{"id":49,"name":"AI Summarization"}]} \ No newline at end of file