Currently supported versions that receive security updates:
| Version | Supported | Notes |
|---|---|---|
| 1.0.x | ✅ | Current stable release |
| < 1.0 | ❌ | Beta versions - upgrade to latest stable |
We take the security of the n8n Synology Package seriously. If you have discovered a security vulnerability, we appreciate your help in disclosing it to us in a responsible manner.
DO NOT create a public GitHub issue for security vulnerabilities.
Instead, please report security vulnerabilities by email to:
When reporting a vulnerability, please provide:
- Description: Clear description of the vulnerability
- Impact: Potential impact and severity assessment
- Steps to Reproduce: Detailed steps to reproduce the issue
- Affected Components: Which part of the package is affected (installer scripts, Docker configuration, etc.)
- Synology DSM Version: Your DSM version and Container Manager version
- Package Version: Version of n8n Synology Package affected
- Suggested Fix: If you have ideas for how to fix it (optional)
- Initial Response: Within 48 hours of receipt
- Assessment: Within 5 business days
- Fix Development: Depends on severity (critical issues prioritized)
- Public Disclosure: After fix is released and users have time to update
We are especially interested in:
- Installation Script Vulnerabilities: Issues in installer, start-stop-status, or backup scripts
- Permission Escalation: Unauthorized access to system resources
- Data Exposure: Unintended exposure of sensitive data (encryption keys, passwords)
- Docker Configuration: Security misconfigurations in docker-compose.yml
- Path Traversal: File system access outside intended directories
- Command Injection: Potential for arbitrary command execution
- Credential Storage: Insecure storage or handling of credentials
- Network Security: Exposed services or insecure default configurations
The following are not considered vulnerabilities for this package:
- Vulnerabilities in n8n itself (report to https://github.com/n8n-io/n8n/security)
- Vulnerabilities in PostgreSQL (report to PostgreSQL security team)
- Issues requiring physical access to the NAS
- Social engineering attacks
- Denial of Service (DoS) attacks that require authenticated access
- Issues in third-party integrations configured by users
To maintain security when using this package:
-
Verify Package Integrity:
- Check SHA256 checksum before installation
- Download only from official sources (GitHub releases or configured repository)
-
Secure Environment:
- Ensure Container Manager is up to date
- Use a dedicated user account for n8n service
- Configure firewall rules before installation
-
Protect Encryption Keys:
# Backup your encryption key immediately after installation cat /var/packages/n8n/target/.env | grep N8N_ENCRYPTION_KEY
Store this key securely - it cannot be recovered if lost!
-
Configure HTTPS:
- Use the provided nginx-reverse-proxy.conf as a template
- Configure SSL certificates through DSM
- Never expose n8n directly to the internet without HTTPS
-
Enable Authentication:
# Edit /var/packages/n8n/target/.env N8N_BASIC_AUTH_ACTIVE=true N8N_BASIC_AUTH_USER=your_admin_user N8N_BASIC_AUTH_PASSWORD=strong_password_here -
Network Security:
- Configure DSM firewall to restrict access to port 5678
- Use VPN for remote access when possible
- Implement IP whitelisting if applicable
-
Regular Updates:
- Monitor for package updates
- Update n8n Docker image regularly:
cd /var/packages/n8n/target docker-compose pull docker-compose up -d
-
Backup Strategy:
- Use the included backup script regularly
- Store backups in a secure, separate location
- Test backup restoration procedures
Before deploying to production:
- Changed default PostgreSQL password
- Backed up N8N_ENCRYPTION_KEY
- Configured HTTPS via reverse proxy
- Enabled authentication (basic auth or n8n's built-in)
- Configured firewall rules
- Set up automated backups
- Reviewed file permissions
- Disabled unnecessary services
- Configured log rotation
- Tested disaster recovery procedure
This package includes several security features:
- Automatic Key Generation: Encryption keys and database passwords are generated automatically during installation
- Permission Management: Strict file permissions (600 for .env, 755 for directories)
- User Isolation: Runs under dedicated n8n-user account
- Network Isolation: Uses Docker network isolation between services
- Health Checks: PostgreSQL health checks before n8n startup
- Secure Defaults: Conservative default configuration
- Audit Logging: Comprehensive logging of all operations
We follow a coordinated vulnerability disclosure policy:
- Private Disclosure: Security issues are kept private until a fix is available
- Fix Development: We work on fixes as quickly as possible
- Release: Security updates are released with clear notes
- Grace Period: Users are given time to update before public disclosure
- Public Disclosure: After the grace period, details may be shared to help the community
We thank the following researchers for responsibly disclosing security issues:
This section will be updated as security researchers help improve our package.
Remember: Security is a shared responsibility. While we strive to make this package secure by default, proper configuration and maintenance by administrators is essential for maintaining security.
For non-security bugs and feature requests, please use the GitHub issue tracker.