- Strength: Strong, verified compliance posture with SOC 2 Type II, ISO 27001, and GDPR/HIPAA documentation. The open-source, self-hostable nature provides maximum data control.
Trust Score Trend
12-month rolling window
Week 1 of 2 — Trust score tracking has begun
Return next week for historical trend visualization.
This Week's Intelligence
No new events — monitoring active.
Initial audit baseline: The platform's strong enterprise features and compliance are critically undermined by a poor security patching posture, including a known exploited vulnerability.
- ACTImmediately engage vendor for a patch timeline on all critical/high CVEs.
- ACTDevelop a hardening guide for self-hosted instances, starting with disabling the Git node.
- ACTRequest a written DPA from the vendor to clarify AI training data rights.
Cumulative Intelligence
Patterns and signals detected over time — based on 50+ community data points from GitHub, X/Twitter, Reddit, Hacker News, Stack Overflow
Patterns Detected
- Initial audit baseline established this week.
Early Warnings
- Detailed community analysis available in report body
Long-term Trends
- Trend tracking begins this week; subsequent audits will surface directional changes.
Strategic Insights
Enterprise Verdict
Detailed community analysis available in report body
- Patch 8 unresolved HIGH/CRITICAL CVE(s) before enterprise rollout
Before You Sign
Procurement checklist — complete these before committing budget.
Enterprise Contract Requirements
7 clauses generated from audit findings — add these to your vendor agreement before signing.
Must-Add Clauses (Top 3 Priority)
- AI Training Data Exclusion CRITICAL
- Data Processing Agreement (GDPR Article 28) CRITICAL
- IP Ownership & Indemnification HIGH
CRITICAL
Data & AI Training
AI Training Data Exclusion
Vendor shall not use Customer Data, including code, prompts, or generated outputs, to train, fine-tune, or evaluate any AI or machine learning model. This prohibition extends to all sub-processors and affiliates. Violation constitutes a material breach.
CRITICAL
GDPR / Data Processing
Data Processing Agreement (GDPR Article 28)
A Data Processing Agreement compliant with GDPR Article 28 must be executed prior to any data transfer. The DPA must identify all sub-processors, specify data retention periods, and provide for the right to audit.
HIGH
Intellectual Property
IP Ownership & Indemnification
All code, suggestions, completions, and outputs generated for Customer constitute Customer's intellectual property. Vendor shall indemnify and defend Customer against any third-party IP infringement claims arising from use of the Service.
HIGH
Liability
Liability Cap
Vendor's aggregate liability for any claim shall not exceed the greater of (a) fees paid in the 12 months preceding the claim or (b) $500,000. This cap shall not apply to breaches of confidentiality or indemnification obligations.
HIGH
Exit & Portability
Data Export & Exit Rights
Upon termination, Vendor shall provide Customer with a complete export of all Customer Data in machine-readable format (JSON or CSV) within 30 days at no charge. Vendor shall retain Customer Data for 90 days post-termination solely for export purposes.
MEDIUM
Contract Terms
Auto-Renewal Opt-Out
This Agreement shall not auto-renew unless Customer provides written confirmation no later than 60 days before the renewal date. Vendor shall provide written notice of upcoming renewal no later than 90 days before the renewal date.
MEDIUM
Security
Security Incident Notification
Vendor shall notify Customer of any confirmed or suspected security incident affecting Customer Data within 48 hours of discovery. Notification shall include nature of the incident, data affected, and remediation steps taken.
Risk Assessment
Seven-category enterprise risk analysis derived from community and vendor signals. Each card shows the evidence tier and the underlying finding.
Vendor viability score: 65/100. No community-reported outages or reliability incidents found in recent data.
Vendor financial stability score: 65/100. Enterprises should negotiate fixed-rate contracts and monitor pricing changes.
Data export status unclear. Integration score: 0/100. Webhooks available, reducing lock-in risk.
Compliance score: 100/100. GDPR: dpa_available. Encryption at rest: yes.
SOC 2: type_ii. ISO 27001: certified. Overall compliance score: 100/100.
No training on user data detected. Code ownership terms unclear. Legal/ToS risk score: 65/100.
Legal & IP Risk
Data & Migration Lock-in Risk
Exit & Migration Risk
How hard is it to leave? Assess lock-in before you commit.
- Auto-renewal terms and data export rights not publicly documented — verify before signing.
Vendor Financial Health
No public financial data available for n8n. Treat as elevated viability risk for long-term enterprise contracts; request audited financials or escrow agreement if vendor is critical infrastructure.
TCO Calculator
Custom TCO Assessment Required
This vendor's enterprise pricing data is currently under review by our analyst network or requires custom scoping. Contact us for a free, independent TCO assessment tailored to your organization's deployment size.
Request TCO Assessment →Pricing Tier Risk Analysis
Per-tier compliance posture data is being collected for this vendor. Check back after the next weekly refresh, or contact the vendor directly to request enterprise tier documentation (SOC 2, DPA, audit logs).
Community Evidence
Sentiment analysis and recurring issues from developer & enterprise community signals this week. 🟢 Vendor Data 🟠 Community Signal
Community Evidence This Week
Specific signals from GitHub, Hacker News, Reddit, Stack Overflow, and the web — what the community is actually saying
Due Diligence Alerts
Priority reviews, recommended inquiries, and verified strengths — based on 106+ community data points
Search Interest & Popularity Signals
Real-time data from Google Trends and VS Code Marketplace. Reflects public search momentum — not a quality indicator.
Source: Google Trends · Interest is relative to the peak in the period (100 = peak). Does not reflect absolute search volume.
Evaluation Landscape
Community members actively discussing a switch away from n8n — these tools are appearing as migration targets in developer forums and enterprise discussions. Where counts are significant, migration intent is a procurement signal worth investigating.
Scoring Methodology
Every score is a weighted composite. The exact formula is transparent below.
Overall Trust Score (0–100)
Sub-Score Breakdown
| Dimension | Score | Weight Factors | Data Sources |
|---|---|---|---|
| Security & Compliance | 40/100 | Certifications (30%), Vulnerability disclosure (25%), Data encryption (20%), Bug bounty (15%), Incident history (10%) | Vendor docs, SOC 2 filings, CVE database |
| Legal & IP Risk | 45/100 | ToS data training clauses (35%), IP indemnification (25%), Liability caps (20%), Data portability (20%) | Terms of Service, DPA, Privacy Policy |
Data Sources This Week
Independent analysis — signals aggregated from GitHub, Reddit, HN, Stack Overflow, Twitter/X, G2 & Capterra. Not affiliated with any vendor. Corrections?
Download PDF Report
Create a free account to download the full enterprise audit PDF.
Sign up — it's free →Already have an account? Log in