Critical-risk tools in n8n MCP Server
8 of the 43 tools in n8n MCP Server are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
n8n_delete_credentialDestructive 4/5Permanently delete a credential by ID.
-
n8n_delete_datatable_rowsDestructive 4/5Delete rows matching a filter. The filter is required (JSON string).
-
n8n_delete_executionDestructive 4/5Permanently delete an execution record by ID.
-
n8n_delete_projectDestructive 4/5Delete a project by ID (Enterprise feature).
-
n8n_delete_tagDestructive 4/5Delete a tag by ID. This does not affect workflows that used this tag.
-
n8n_delete_userDestructive 4/5Delete a user by ID (requires owner role). Workflows owned by this user must be transferred first.
-
n8n_delete_variableDestructive 4/5Delete an environment variable by ID.
-
n8n_delete_workflowDestructive 4/5Permanently delete a workflow by ID.
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on n8n MCP Server
Enforce policy on n8n MCP Server
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init