For financial institutions, threat modeling must shift away from diagrams focused purely on code to a life cycle view ...
The flaw allows authenticated n8n users with workflow-creation or modification permissions to bypass the intended security sandbox.