{"workflow":{"id":13072,"name":"Get a daily cybersecurity news digest on Telegram and Slack with GPT-4","views":274,"recentViews":1,"totalViews":274,"createdAt":"2026-01-28T19:53:59.834Z","description":"# Daily Cyber News Digest to Telegram\n\nWorkflow Created By: Abdullah Dilshad 📧 iamabdullahdishad@gmail.com\n\nStay informed with automated daily summaries.\nThis workflow aggregates cyber news from multiple trusted sources, uses AI to intelligently select and summarize the top 5 most relevant articles, and delivers a clean, concise digest directly to your Telegram chat every morning at 10:00 AM.\n\n# What This Workflow Does\nCollects Data: Fetches cybersecurity news from multiple global APIs.\n\nFilters Noise: Uses AI to discard irrelevant updates.\n\nSummarizes: Generates short, professional summaries (1–2 sentences).\n\nDelivers: Automatically sends a formatted digest to Telegram within message length limits.\n\n# How It Works\n1. Schedule Trigger\n\nRuns automatically every day at 10:00 AM (customizable).\n\n2. News Collection\n\nFetches articles using the keyword \"cyber\" from:\n\nGNews\n\nNewsAPI\n\n3. Data Processing\n\nMerges articles from both sources into a single, unified dataset.\n\n4. AI-Powered Selection\n\nOpenAI analyzes all fetched articles.\n\nIntelligently selects the Top 5 most relevant cybersecurity stories.\n\n5. Smart Summarization\n\nEach article is condensed into 1–2 clear sentences.\n\nIncludes: Publication date, Source name, and Article link.\n\n6. Telegram Delivery\n\nSends a clean, formatted digest to your specified Telegram chat.\n\nEnsures the total message length stays under Telegram’s 4096-character limit.\n\n#  Setup Instructions\nGet API Keys\n\nSign up for free API keys from GNews.io and NewsAPI.org.\n\nConnect Accounts\n\nAdd your Telegram and OpenAI credentials in n8n.\n\nConfigure Telegram\n\nEnter your Telegram Chat ID in the \"Send a Text Message\" node.\n\nCustomize the Schedule\n\nChange the trigger time if you prefer delivery at a different hour.\n\n# Customization & Use Cases\nThis workflow is fully reusable and scalable. You can replace the keyword \"cyber\" to track any topic relevant to your needs.\n\nExample Topics:\n\n🤖 Artificial Intelligence (AI)\n\n💰 Cryptocurrency & Blockchain\n\n🚀 Startups & Venture Capital\n\n📱 Consumer Technology\n\n🏭 Industry-specific updates\n\n## Note:\n This workflow is designed to be adapted for individual tracking, team updates, or competitor analysis.","workflow":{"meta":{"instanceId":"bfacda153e8709a9430b720dd5a8a4a06be849da9d98ce6a6489a3fc73192d0c","templateCredsSetupCompleted":true},"nodes":[{"id":"15528050-2707-48e2-94a4-193e4a1294bd","name":"Daily Schedule Trigger","type":"n8n-nodes-base.scheduleTrigger","position":[-16,816],"parameters":{"rule":{"interval":[{"triggerAtHour":10}]}},"typeVersion":1.3},{"id":"f019e429-4053-4b2d-90b7-7320d1e7bf8a","name":"GNews API","type":"n8n-nodes-base.httpRequest","onError":"continueRegularOutput","position":[384,640],"parameters":{"url":"https://gnews.io/api/v4/search","options":{"timeout":10000},"sendQuery":true,"queryParameters":{"parameters":[{"name":"q","value":"cybersecurity OR cyber attack OR data breach OR vulnerability"},{"name":"lang","value":"en"},{"name":"max","value":"20"},{"name":"apikey","value":"f01c51e789cb83eafeca20025ccd44ce"}]}},"typeVersion":4.3,"continueOnFail":true},{"id":"70fd3b63-a38c-47cd-a2d9-d1ceaf5a23f5","name":"NewsAPI","type":"n8n-nodes-base.httpRequest","position":[384,816],"parameters":{"url":"https://newsapi.org/v2/everything","options":{"timeout":10000},"sendQuery":true,"queryParameters":{"parameters":[{"name":"q","value":"cybersecurity OR \"data breach\" OR \"security vulnerability\""},{"name":"pageSize","value":"20"},{"name":"sortBy","value":"publishedAt"},{"name":"apikey","value":"8b1896e394d74847adb2603a4ec74b5b"}]}},"typeVersion":4.3,"continueOnFail":true},{"id":"5cebb572-1f03-4eff-b316-866c2ebca86b","name":"AI Threat Analysis Agent","type":"@n8n/n8n-nodes-langchain.agent","position":[2480,720],"parameters":{"text":"=Articles:\n{{ JSON.stringify($json.articles) }}\n\nErrors:\n{{ JSON.stringify($json.errors) }}\n\nTasks:\n1. Select the 5 most important cybersecurity stories\n2. Write a concise summary for each (2–3 lines)\n3. Add a short headline per story\n4. End with a one-line note if any data sources failed\n","options":{"systemMessage":"You are a professional cybersecurity news analyst.\n\nYou receive:\n• A list of normalized cybersecurity news articles\n• A list of API errors (if any)\n\nYour job is to produce a clear, concise, factual daily cybersecurity news digest.\n\nRules:\n- Focus on impact, severity, and relevance\n- Prefer data breaches, ransomware, nation-state attacks, and critical vulnerabilities\n- Ignore marketing fluff or low-impact news\n- Do NOT hallucinate facts\n- If some sources failed, mention it briefly at the end\n- Maintain a professional tone\n\nMust Must Must Rank stories by severity: Critical, High, Medium."}},"typeVersion":1},{"id":"7a6e6022-1d0a-4842-a31b-fed226020f83","name":"OpenAI GPT-4","type":"@n8n/n8n-nodes-langchain.lmChatOpenAi","position":[2432,944],"parameters":{"model":"gpt-4-turbo-preview","options":{"maxTokens":2000,"temperature":0.3}},"credentials":{"openAiApi":{"id":"nUPsQPjT3iWf3KjD","name":"OpenAi account 2"}},"typeVersion":1},{"id":"07e8cf7a-6e57-45b1-8be9-1ca319ba19cb","name":"Send to Telegram","type":"n8n-nodes-base.telegram","position":[3072,336],"webhookId":"1bee439d-1747-4d7d-9aed-d24b42e0dfc7","parameters":{"text":"={{ $json.textMessage }}","chatId":"YOUR_TELEGRAM_CHAT_ID","additionalFields":{"parse_mode":"Markdown","appendAttribution":false}},"credentials":{"telegramApi":{"id":"Rr5v61Ma77FsXq7w","name":"Telegram account"}},"typeVersion":1.2},{"id":"52879507-58ca-4ace-aaf7-55c3e2eaf37b","name":"Send to Slack","type":"n8n-nodes-base.slack","position":[3072,544],"webhookId":"82b14db7-48af-414e-bad1-df502a42d487","parameters":{"text":"={{ $json.digest }}","select":"channel","channelId":{"__rl":true,"mode":"list","value":"YOUR_SLACK_CHANNEL_ID"},"otherOptions":{},"authentication":"oAuth2"},"typeVersion":2.2},{"id":"e513106f-1677-4f82-a9c5-684a3fbdc540","name":"Archive to Google Sheets","type":"n8n-nodes-base.googleSheets","position":[3088,976],"parameters":{"columns":{"value":{"Date":"={{ $now.format('yyyy-MM-dd') }}","Digest":"={{ $json.digest }}","Timestamp":"={{ $now.format('yyyy-MM-dd HH:mm:ss') }}","Article Count":"={{ $('Prepare Data for AI').item.json.articleCount }}","Character Count":"={{ $json.digestLength }}"},"mappingMode":"defineBelow"},"options":{},"operation":"append","sheetName":{"__rl":true,"mode":"list","value":"Sheet1"},"documentId":{"__rl":true,"mode":"list","value":"YOUR_GOOGLE_SHEET_ID"}},"credentials":{"googleSheetsOAuth2Api":{"id":"rWjnFysNZukLClxN","name":"Google Sheets account"}},"typeVersion":4.5},{"id":"a3ff18c2-7429-4754-9b02-1bf0d0bbfc49","name":"Sources Note","type":"n8n-nodes-base.stickyNote","position":[272,544],"parameters":{"color":4,"width":768,"height":616,"content":"##  News Sources\nFetching from multiple APIs with error handling"},"typeVersion":1},{"id":"f4f85638-5e78-40e1-ac95-0c4b1333bc7f","name":"Processing Note","type":"n8n-nodes-base.stickyNote","position":[1056,544],"parameters":{"color":5,"width":1324,"height":616,"content":"##  Data Processing\nDeduplication, normalization & error handling"},"typeVersion":1},{"id":"7159c15b-f467-4141-9663-23b832e8fdbc","name":"AI Note","type":"n8n-nodes-base.stickyNote","position":[2400,544],"parameters":{"color":6,"width":544,"height":616,"content":" AI Analysis\nGPT-4 powered threat intelligence analysis with categorization"},"typeVersion":1},{"id":"5d5b275d-e1a6-4ac2-b51f-918eb9c1ee4d","name":"Delivery Note","type":"n8n-nodes-base.stickyNote","position":[2976,192],"parameters":{"color":3,"width":316,"height":972,"content":"## 📤 Multi-Channel Delivery\nTelegram, Slack, Email + Archive to Google Sheets"},"typeVersion":1},{"id":"bc7d80ce-08f5-44c5-957f-4bf56d485584","name":"Workflow Overview","type":"n8n-nodes-base.stickyNote","position":[-864,-368],"parameters":{"color":7,"width":720,"height":1556,"content":"# Advanced Cyber Threat Intelligence Digest System\n\n**Created by: Abdullah Dilshad**\niamabdullahdishad@gmail.com\n\n##  Key Features\n\n###  **Multi-Source Aggregation**\n- GNews API for mainstream news\n- NewsAPI for comprehensive coverage\n- Reddit r/cybersecurity for community insights\n- Expandable to RSS feeds, CISA alerts, CVE databases\n\n###  **Smart Deduplication**\n- Levenshtein distance algorithm\n- 80% similarity threshold\n- Prevents duplicate stories from multiple sources\n\n###  **AI-Powered Analysis**\n- GPT-4 threat prioritization\n- Automatic categorization (Breach, Vulnerability, Tool, Research)\n- Severity rating (Critical, High, Medium)\n- Actionable summaries for security teams\n\n###  **Robust Error Handling**\n- Retry logic with continueOnFail\n- Admin alerts for failures\n- Timeout protection (10s)\n- Fallback mechanisms\n\n###  **Multi-Channel Distribution**\n- **Telegram**: Instant mobile notifications\n- **Slack**: Team collaboration channels\n- **Email**: Executive-friendly HTML format\n- **Google Sheets**: Searchable historical archive\n\n###  **Quality Assurance**\n- Message length validation\n- Character count monitoring\n- Warning alerts for oversized digests\n- Source count tracking\n\n---\n\n##  Perfect For\n\n **Security Operations Centers (SOCs)**\n **Cybersecurity Teams**\n **IT Security Managers**\n **Incident Response Teams**\n **CISOs & Security Leadership**\n **Security Researchers**\n **Penetration Testers**\n\n Time: ~20 minutes\n\n**Requirements**:\n- n8n instance (cloud or self-hosted)\n- OpenAI API key\n- GNews API key (free tier available)\n- NewsAPI key (free tier available)\n- Telegram Bot Token\n- (Optional) Slack workspace access\n- (Optional) Google Sheets for archiving\n- (Optional) Email SMTP credentials"},"typeVersion":1},{"id":"124bdd41-e279-4309-b5ec-ebc149b08d2f","name":"Reddit Cybersecurity","type":"n8n-nodes-base.httpRequest","position":[384,1008],"parameters":{"url":"https://api.worldnewsapi.com/search-news","options":{"timeout":10000},"sendQuery":true,"queryParameters":{"parameters":[{"name":"text","value":"cybersecurity OR \"data breach\" OR \"security vulnerability\""},{"name":"language","value":"en"},{"name":"api-key","value":"c574a03e9f694107b581f614b1761333"}]}},"typeVersion":4.3,"continueOnFail":true},{"id":"10948406-b0ae-44b8-8e37-3fc3677ab6da","name":"Merge","type":"n8n-nodes-base.merge","position":[1264,800],"parameters":{"numberInputs":3},"typeVersion":3.2},{"id":"351c3659-f6e0-46f1-8208-cf21fffd9a88","name":"If1","type":"n8n-nodes-base.if","position":[752,816],"parameters":{"options":{},"conditions":{"options":{"version":3,"leftValue":"","caseSensitive":true,"typeValidation":"strict"},"combinator":"or","conditions":[{"id":"3a787eeb-576d-41b4-9f85-196e1e19fc3d","operator":{"type":"string","operation":"exists","singleValue":true},"leftValue":"={{ $json.error }}","rightValue":""},{"id":"4c53315c-a83f-451e-963a-97cb775ec69d","operator":{"type":"number","operation":"gte"},"leftValue":"={{ $json.statusCode }}","rightValue":400}]}},"typeVersion":2.3},{"id":"b17da31b-4bd1-4cbe-888e-0d9098fb6cdc","name":"If","type":"n8n-nodes-base.if","position":[736,640],"parameters":{"options":{},"conditions":{"options":{"version":3,"leftValue":"","caseSensitive":true,"typeValidation":"strict"},"combinator":"or","conditions":[{"id":"3a787eeb-576d-41b4-9f85-196e1e19fc3d","operator":{"type":"string","operation":"exists","singleValue":true},"leftValue":"={{ $json.error }}","rightValue":""},{"id":"4c53315c-a83f-451e-963a-97cb775ec69d","operator":{"type":"number","operation":"gte"},"leftValue":"={{ $json.statusCode }}","rightValue":400}]}},"typeVersion":2.3},{"id":"4844174b-9c00-4d43-8751-348e848ce1b9","name":"If2","type":"n8n-nodes-base.if","position":[752,1008],"parameters":{"options":{},"conditions":{"options":{"version":3,"leftValue":"","caseSensitive":true,"typeValidation":"strict"},"combinator":"or","conditions":[{"id":"3a787eeb-576d-41b4-9f85-196e1e19fc3d","operator":{"type":"string","operation":"exists","singleValue":true},"leftValue":"={{ $json.error }}","rightValue":""},{"id":"4c53315c-a83f-451e-963a-97cb775ec69d","operator":{"type":"number","operation":"gte"},"leftValue":"={{ $json.statusCode }}","rightValue":400}]}},"typeVersion":2.3},{"id":"83c11b26-7d84-4686-8bdf-8eeff43f144d","name":"Code in JavaScript","type":"n8n-nodes-base.code","position":[1200,32],"parameters":{"jsCode":"return [{\n  json: {\n    source: 'GNews',\n    error: $json.error?.message || 'Request failed',\n    statusCode: $json.statusCode || null,\n    timestamp: new Date().toISOString()\n  }\n}];"},"typeVersion":2},{"id":"94188453-31b5-4114-9a26-e271e9e8ba9b","name":"Code in JavaScript1","type":"n8n-nodes-base.code","position":[1200,192],"parameters":{"jsCode":"return [{\n  json: {\n    source: 'NewsAPI',\n    error: $json.error?.message || 'Request failed',\n    statusCode: $json.statusCode || null,\n    timestamp: new Date().toISOString()\n  }\n}];"},"typeVersion":2},{"id":"7eafd036-aa31-49ac-aa86-521e71a6fcf2","name":"Code in JavaScript2","type":"n8n-nodes-base.code","position":[1200,352],"parameters":{"jsCode":"return [{\n  json: {\n    source: 'World News',\n    error: $json.error?.message || 'Request failed',\n    statusCode: $json.statusCode || null,\n    timestamp: new Date().toISOString()\n  }\n}];"},"typeVersion":2},{"id":"75dcf7b4-3372-48a1-bc3a-d4322cacb7de","name":"Merge1","type":"n8n-nodes-base.merge","position":[1568,128],"parameters":{"numberInputs":3},"typeVersion":3.2},{"id":"154c384c-9410-4935-93e4-b4c7de035128","name":"Normalize Articles","type":"n8n-nodes-base.code","position":[1536,816],"parameters":{"jsCode":"const normalized = [];\n\nfor (const item of items) {\n  const source =\n    item.json.source ||\n    item.json.provider ||\n    item.json.news ||\n    'Unknown';\n\n  const articles = item.json.articles || [];\n\n  for (const article of articles) {\n    normalized.push({\n      json: {\n        source,\n        title: article.title || '',\n        description: article.description || '',\n        content: article.content || '',\n        url: article.url || '',\n        image: article.image || null\n      }\n    });\n  }\n}\n\nreturn normalized;"},"typeVersion":2},{"id":"f2b43de5-ea1e-4b2a-a890-903a769ab249","name":"Final Context Builder","type":"n8n-nodes-base.code","position":[2144,800],"parameters":{"jsCode":"const articles = [];\nconst errors = [];\n\nfor (const item of items) {\n  if (item.json.title) {\n    articles.push(item.json);\n  } else if (item.json.error) {\n    errors.push(item.json);\n  }\n}\n\nreturn [{\n  json: {\n    articles,\n    errors,\n    generatedAt: new Date().toISOString()\n  }\n}];\n"},"typeVersion":2},{"id":"1d8fdda6-3e84-4887-a2cd-681819992d78","name":"Merge Articles + Errors","type":"n8n-nodes-base.merge","position":[1872,800],"parameters":{},"typeVersion":3.2},{"id":"5ae19667-b8f5-4eb6-81c7-fca6d6b714ab","name":"Manipulating Outputs","type":"n8n-nodes-base.code","position":[2768,720],"parameters":{"jsCode":"const aiText = items[0].json.output;\n\n// 1️⃣ Unified text message (Telegram / Slack / Email)\nconst message =\n`🛡️ Daily Cybersecurity Brief\n\n${aiText}\n\n🕒 Generated: ${new Date().toLocaleString()}`;\n\n// 2️⃣ Basic row format for Sheets (1 row per digest)\nconst sheetRow = {\n  date: new Date().toISOString(),\n  content: aiText\n};\n\nreturn [{\n  json: {\n    textMessage: message,\n    sheetRow,\n    metadata: {\n      generatedAt: new Date().toISOString(),\n      length: aiText.length\n    }\n  }\n}];\n"},"typeVersion":2},{"id":"00647085-0652-4429-8774-bd5090b29c20","name":"AI Note1","type":"n8n-nodes-base.stickyNote","position":[1056,-80],"parameters":{"color":6,"width":688,"height":616,"content":"## Handeling Errors\n"},"typeVersion":1},{"id":"e2e8e939-6455-4634-a353-6b814e41a3b3","name":"Send a message","type":"n8n-nodes-base.gmail","position":[3088,752],"webhookId":"a54aef01-8ba6-46ba-99a4-27ddb600cada","parameters":{"message":"Hello","options":{},"subject":"Hello"},"credentials":{"gmailOAuth2":{"id":"HaBdC5mlVCpXSmOU","name":"Gmail account"}},"typeVersion":2.2}],"pinData":{"GNews API":[{"articles":[{"id":"d396f729022ad1324d10b671e5484260","url":"https://www.marketing-interactive.com/nike-investigates-alleged-data-breach-following-leak-claims","lang":"en","image":"https://marketing-interactive-assets.b-cdn.net/article_images/nike-investigates-alleged-data-breach-following-leak-claims/1769477631_nike%20leak.jpg","title":"Nike investigates alleged data breach following leak claims","source":{"id":"d894d2a2b7c9ae7ff7505a197738f18c","url":"https://www.marketing-interactive.com","name":"Marketing Interactive","country":"sg"},"content":"Global sportswear brand Nike is reportedly investigating a potential data breach after a cyber attack group claimed it had leaked data linked to the company's business operations.\nIn a statement reported by Reuters, Nike said that it takes consumer p... [1557 chars]","description":"Global sportswear brand Nike is reportedly investigating a potential data breach after a cyber attack group claimed it had leaked data linked to the company's business operations.","publishedAt":"2026-01-29T04:57:37Z"},{"id":"4ddcc4a4c2ab9eec36802a53996a221f","url":"https://www.forbes.com/sites/forbes-listmaker/2026/01/28/unlocking-hidden-savings-in-your-supply-chain/","lang":"en","image":"https://imageio.forbes.com/specials-images/imageserve/69602e5d5d5a2ad8807c8e18/0x0.jpg?format=jpg&height=900&width=1600&fit=bounds","title":"Unlocking Hidden Savings In Your Supply Chain","source":{"id":"a0300bc9a6e9d5b317bd6f614767231f","url":"https://www.forbes.com","name":"Forbes","country":"us"},"content":"In today’s uncertain economic climate, brands are seeking strategic opportunities to reduce costs and strengthen resilience. According to a 2025 study by Boston Consulting Group, cost management was the top organization priority for corporate leaders... [6293 chars]","description":"Cyber risk is scaling faster than most playbooks. As data sprawls across data centers, clouds, SaaS, and the edge, leaders don’t just ask, “Can we prevent a breach?”","publishedAt":"2026-01-28T16:17:36Z"},{"id":"5c06291a411f0c1a2973c1032ca9aea6","url":"https://www.foxnews.com/tech/grubhub-confirms-data-breach-amid-extortion-claims","lang":"en","image":"https://static.foxnews.com/foxnews.com/content/uploads/2026/01/grubhub-delivery-person.jpg","title":"Grubhub confirms data breach amid extortion claims","source":{"id":"8da923084554b2821233d6c5c5f02c97","url":"https://www.foxnews.com","name":"Fox News","country":"us"},"content":"NEWYou can now listen to Fox News articles!\nFood delivery platform Grubhub has confirmed a recent data breach after unauthorized actors accessed parts of its internal systems.\nThe disclosure comes as sources tell BleepingComputer the company is now f... [9188 chars]","description":"Food delivery platform brings in cybersecurity firm and notifies law enforcement but declines to answer key questions about timing and scope.","publishedAt":"2026-01-27T17:30:58Z"},{"id":"42d97ba1ccf820488c6559c1895fdc10","url":"https://www.tomsguide.com/computing/online-security/nike-currently-investigating-a-potential-cybersecurity-incident-as-1-4tb-of-data-allegedly-stolen","lang":"en","image":"https://cdn.mos.cms.futurecdn.net/BMXPRsyi2MsY8itQGaR9uT-2000-80.jpg","title":"Nike currently 'investigating a potential cybersecurity incident' as 1.4TB of data allegedly stolen","source":{"id":"dcc4f4c6eb081eb8a9ee9cca215517f5","url":"https://www.tomsguide.com","name":"Tom's Guide","country":"us"},"content":"1.4TB of data was allegedly stolen from Nike by hacker group WorldLeaks\nOnly internal Nike data is included; no customer records\nThe hackers focus on data theft rather than encryption and traditional ransomware\nThe massively popular sportswear compan... [2008 chars]","description":"Nike is currently looking into the alleged breach, with the hacker group WorldLeaks claiming to have stolen 1.4TB of data.","publishedAt":"2026-01-27T14:16:46Z"},{"id":"0f5ead65d18dec7db782e5f5ae325704","url":"https://www.thestar.com.my/tech/tech-news/2026/01/27/nike-says-it-is-investigating-possible-data-breach","lang":"en","image":"https://apicms.thestar.com.my/uploads/images/2026/01/27/3740076.jpg","title":"Nike says it is investigating possible data breach","source":{"id":"1e30d944d63d9090db5a2c2e28a8772f","url":"https://www.thestar.com.my","name":"The Star","country":"my"},"content":"NEW YORK, Jan 26 (Reuters) - Nike says it is ‌investigating a potential data breach, after a group known for cyber ‌attacks reportedly claimed to have leaked a trove of data related to its business operations.\n\"We always take consumer privacy and dat... [1449 chars]","description":"NEW YORK, Jan 26 (Reuters) - Nike says it is ‌investigating a potential data breach, after a group known for cyber ‌attacks reportedly claimed to have leaked a trove of data related to its business operations.","publishedAt":"2026-01-26T23:33:00Z"},{"id":"40ee0c23f5e9d8d669c98aeef1a5b1ae","url":"https://www.reuters.com/sustainability/boards-policy-regulation/nike-says-it-is-investigating-possible-data-breach-2026-01-26/","lang":"en","image":"https://www.reuters.com/resizer/v2/FIYEMZSQMNLANEXQ7GX2Y7O5TU.jpg?auth=a5140467402e7412d900ae84f4c9e95048fecfcabd29ad791dd24f7c5fa2010f&height=1005&width=1920&quality=80&smart=true","title":"Nike says it is investigating possible data breach","source":{"id":"da5c26287bdd02563a2c32b55cb12051","url":"https://www.reuters.com","name":"Reuters","country":"us"},"content":"NEW YORK, Jan 26 (Reuters) - Nike (NKE.N), opens new tab says it is investigating a potential data breach, after a group known for cyber attacks reportedly claimed to have leaked a trove of data related to its business operations.\n\"We always take con... [2764 chars]","description":"Nike says it is investigating a potential data breach, after a group known for cyber attacks reportedly claimed to have leaked a trove of data related to its business operations.","publishedAt":"2026-01-26T17:05:58Z"},{"id":"125bacff4d111a33aafa3ccf0b30e8c5","url":"https://www.spokesman.com/stories/2026/jan/26/nike-says-it-is-investigating-possible-data-breach/","lang":"en","image":"https://thumb.spokesman.com/3r3Tvu5Fl4Dm6D8ySac4v9JZSXE=/1200x630/smart/media.spokesman.com/photos/2026/01/26/6977b7efdd9b2.image.jpg","title":"Nike says it is investigating possible data breach","source":{"id":"c8c865ed042eb14694b8d596e22efe99","url":"https://www.spokesman.com","name":"Spokane Spokesman-Review","country":"us"},"content":"NEW YORK - Nike says it is investigating a potential data breach, after a group known for cyber attacks reportedly claimed to have leaked a trove of data related to its business operations.\n“We always take consumer privacy ‌and data security very ser... [1375 chars]","description":"Nike says it is investigating a potential data breach, after a group known for cyber attacks reportedly claimed to have leaked a trove of data related to its business operations.","publishedAt":"2026-01-26T09:05:00Z"},{"id":"3044bb5dc339c6f884b6aa109cb5b0d2","url":"https://www.freepressjournal.in/tech/149-million-passwords-of-instagram-netflix-x-roblox-leaked-online-how-to-know-if-you-are-affected","lang":"en","image":"https://media.assettype.com/freepressjournal/2024-07/dc213766-2a06-41cf-8df6-99afd00ef1dc/FotoJet (5).jpg","title":"149 Million Passwords Of Instagram, Netflix, X, Roblox Leaked Online: How To Know If You Are Affected","source":{"id":"7eeaf9a839918543cc708f2d331c3be4","url":"https://www.freepressjournal.in","name":"Free Press Journal","country":"in"},"content":"In an alarming data leak, over 149 million unique logins and passwords, has been exposed online in a publicly accessible database. Discovered by cybersecurity researcher Jeremiah Fowler, the unsecured repository contained credentials harvested from i... [2996 chars]","description":"Over 149 million logins and passwords were found exposed in an unsecured online database, cybersecurity researcher Jeremiah Fowler revealed. Affected services include Gmail, Facebook, Instagram, Netflix and banking platforms. Though the data was removed, risks like fraud and identity theft remain. Users are advised to check breach status, change passwords and enable two-factor authentication.","publishedAt":"2026-01-26T02:27:21Z"},{"id":"cdf7e11e27804f553bbccb17fe98e018","url":"https://www.manilatimes.net/2026/01/25/tmt-newswire/globenewswire/first-federal-savings-bank-and-icba-promote-cyber-awareness-and-consumer-protection-during-data-privacy-week-jan-25-31/2264813","lang":"en","image":"https://www.manilatimes.net/manilatimes/uploads/images/2026/01/25/911802.png","title":"First Federal Savings Bank and ICBA Promote Cyber Awareness and Consumer Protection During Data Privacy Week Jan 25-31","source":{"id":"7c666ee953f873d3057b310220f510df","url":"https://www.manilatimes.net","name":"The Manila Times","country":"ph"},"content":"EVANSVILLE, Ind., Jan. 25, 2026 (GLOBE NEWSWIRE) -- In recognition of Data Privacy Week, First Federal Savings Bank and the Independent Community Bankers of America® (ICBA) are reminding customers to take proactive steps to safeguard their personal a... [3592 chars]","description":"EVANSVILLE, Ind., Jan. 25, 2026 (GLOBE NEWSWIRE) -- In recognition of Data Privacy Week, First Federal Savings Bank and the Independent Community Bankers of America® (ICBA) are reminding customers to take proactive steps to safeguard their personal and financial information amid an evolving cybersecurity landscape. The average cost of a data breach in the United States rose to $10.22 million in 2025, signaling both continued attacks and increasing regulatory fines even as global costs declined 9% year over year.","publishedAt":"2026-01-25T13:14:29Z"},{"id":"7e57a658f88bd538e946ff981803c2b5","url":"https://www.news18.com/tech/data-dystopia-149-million-gmail-facebook-instagram-passwords-exposed-in-massive-cyber-breach-9854776.html","lang":"en","image":"https://images.news18.com/ibnlive/uploads/2025/03/Cyber-Attack-2025-03-28d25a413a4da46fb15d1ae52a744871-16x9.png","title":"Data Dystopia: 149 Million Gmail, Facebook, Instagram Passwords Exposed In Massive Cyber Breach","source":{"id":"ca84296ef941bfa461f4239a2290cb99","url":"https://www.news18.com","name":"News18","country":"in"},"content":"Last Updated:January 25, 2026, 01:38 IST\nExperts are urging users to perform deep system scans using reputable antivirus software and to enable Multi-Factor Authentication (MFA) on all sensitive accounts\nIn a staggering breach of global digital secur... [2471 chars]","description":"Experts are urging users to perform deep system scans using reputable antivirus software and to enable Multi-Factor Authentication (MFA) on all sensitive accounts","publishedAt":"2026-01-24T20:08:54Z"}],"information":{"realTimeArticles":{"message":"Real-time news data is only available on paid plans. Free plan has a 12-hour delay. Upgrade your plan here to remove the delay: https://gnews.io/change-plan"}},"totalArticles":718}]},"connections":{"If":{"main":[[{"node":"Code in JavaScript","type":"main","index":0}],[{"node":"Merge","type":"main","index":0}]]},"If1":{"main":[[{"node":"Code in JavaScript1","type":"main","index":0}],[{"node":"Merge","type":"main","index":1}]]},"If2":{"main":[[{"node":"Code in JavaScript2","type":"main","index":0}],[{"node":"Merge","type":"main","index":2}]]},"Merge":{"main":[[{"node":"Normalize Articles","type":"main","index":0}]]},"Merge1":{"main":[[{"node":"Merge Articles + Errors","type":"main","index":0}]]},"NewsAPI":{"main":[[{"node":"If1","type":"main","index":0}]]},"GNews API":{"main":[[{"node":"If","type":"main","index":0}]]},"OpenAI GPT-4":{"ai_languageModel":[[{"node":"AI Threat Analysis Agent","type":"ai_languageModel","index":0}]]},"Code in JavaScript":{"main":[[{"node":"Merge1","type":"main","index":0}]]},"Normalize Articles":{"main":[[{"node":"Merge Articles + Errors","type":"main","index":1}]]},"Code in JavaScript1":{"main":[[{"node":"Merge1","type":"main","index":1}]]},"Code in JavaScript2":{"main":[[{"node":"Merge1","type":"main","index":2}]]},"Manipulating Outputs":{"main":[[{"node":"Send to Telegram","type":"main","index":0},{"node":"Send to Slack","type":"main","index":0},{"node":"Archive to Google Sheets","type":"main","index":0},{"node":"Send a message","type":"main","index":0}]]},"Reddit Cybersecurity":{"main":[[{"node":"If2","type":"main","index":0}]]},"Final Context Builder":{"main":[[{"node":"AI Threat Analysis Agent","type":"main","index":0}]]},"Daily Schedule Trigger":{"main":[[{"node":"GNews API","type":"main","index":0},{"node":"NewsAPI","type":"main","index":0},{"node":"Reddit Cybersecurity","type":"main","index":0}]]},"Merge Articles + Errors":{"main":[[{"node":"Final Context Builder","type":"main","index":0}]]},"AI Threat Analysis Agent":{"main":[[{"node":"Manipulating Outputs","type":"main","index":0}]]}}},"lastUpdatedBy":1,"workflowInfo":{"nodeCount":28,"nodeTypes":{"n8n-nodes-base.if":{"count":3},"n8n-nodes-base.code":{"count":6},"n8n-nodes-base.gmail":{"count":1},"n8n-nodes-base.merge":{"count":3},"n8n-nodes-base.slack":{"count":1},"n8n-nodes-base.telegram":{"count":1},"n8n-nodes-base.stickyNote":{"count":6},"n8n-nodes-base.httpRequest":{"count":3},"n8n-nodes-base.googleSheets":{"count":1},"@n8n/n8n-nodes-langchain.agent":{"count":1},"n8n-nodes-base.scheduleTrigger":{"count":1},"@n8n/n8n-nodes-langchain.lmChatOpenAi":{"count":1}}},"status":"published","readyToDemo":null,"user":{"name":"Abdullah","username":"abdullahmil","bio":"Helping Bussinesses grow","verified":true,"links":["https://x.com/AbdullahDilsha7"],"avatar":"https://gravatar.com/avatar/f82b5e8e848fb0dd7906aa3e9ecd57c53ae78444d602937cc998bbae148220e5?r=pg&d=retro&size=200"},"nodes":[{"id":18,"icon":"file:googleSheets.svg","name":"n8n-nodes-base.googleSheets","codex":{"data":{"alias":["CSV","Sheet","Spreadsheet","GS"],"resources":{"generic":[{"url":"https://n8n.io/blog/love-at-first-sight-ricardos-n8n-journey/","icon":"❤️","label":"Love at first sight: Ricardo’s n8n journey"},{"url":"https://n8n.io/blog/why-business-process-automation-with-n8n-can-change-your-daily-life/","icon":"🧬","label":"Why business process automation with n8n can change your daily life"},{"url":"https://n8n.io/blog/automatically-adding-expense-receipts-to-google-sheets-with-telegram-mindee-twilio-and-n8n/","icon":"🧾","label":"Automatically Adding Expense Receipts to Google Sheets with Telegram, Mindee, Twilio, and n8n"},{"url":"https://n8n.io/blog/supercharging-your-conference-registration-process-with-n8n/","icon":"🎫","label":"Supercharging your conference registration process with n8n"},{"url":"https://n8n.io/blog/creating-triggers-for-n8n-workflows-using-polling/","icon":"⏲","label":"Creating triggers for n8n workflows using polling"},{"url":"https://n8n.io/blog/no-code-ecommerce-workflow-automations/","icon":"store","label":"6 e-commerce workflows to power up your Shopify s"},{"url":"https://n8n.io/blog/migrating-community-metrics-to-orbit-using-n8n/","icon":"📈","label":"Migrating Community Metrics to Orbit using n8n"},{"url":"https://n8n.io/blog/automate-google-apps-for-productivity/","icon":"💡","label":"15 Google apps you can combine and automate to increase productivity"},{"url":"https://n8n.io/blog/your-business-doesnt-need-you-to-operate/","icon":" 🖥️","label":"Hey founders! Your business doesn't need you to operate"},{"url":"https://n8n.io/blog/how-honest-burgers-use-automation-to-save-100k-per-year/","icon":"🍔","label":"How Honest Burgers Use Automation to Save $100k per year"},{"url":"https://n8n.io/blog/how-a-digital-strategist-uses-n8n-for-online-marketing/","icon":"💻","label":"How a digital strategist uses n8n for online marketing"},{"url":"https://n8n.io/blog/why-this-product-manager-loves-workflow-automation-with-n8n/","icon":"🧠","label":"Why this Product Manager loves workflow automation with n8n"},{"url":"https://n8n.io/blog/sending-automated-congratulations-with-google-sheets-twilio-and-n8n/","icon":"🙌","label":"Sending Automated Congratulations with Google Sheets, Twilio, and n8n "},{"url":"https://n8n.io/blog/how-a-membership-development-manager-automates-his-work-and-investments/","icon":"📈","label":"How a Membership Development Manager automates his work and investments"},{"url":"https://n8n.io/blog/aws-workflow-automation/","label":"7 no-code workflow automations for Amazon Web Services"}],"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/app-nodes/n8n-nodes-base.googlesheets/"}],"credentialDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/credentials/google/oauth-single-service/"}]},"categories":["Data & Storage","Productivity"],"nodeVersion":"1.0","codexVersion":"1.0"}},"group":"[\"input\",\"output\"]","defaults":{"name":"Google Sheets"},"iconData":{"type":"file","fileBuffer":"data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI2MCIgaGVpZ2h0PSI2MCI+PGcgZmlsbD0ibm9uZSIgZmlsbC1ydWxlPSJldmVub2RkIiBzdHJva2UtbGluZWNhcD0icm91bmQiIHN0cm9rZS1saW5lam9pbj0icm91bmQiPjxwYXRoIGZpbGw9IiMyOEI0NDYiIGQ9Ik0zNS42OSAxIDUyIDE3LjIyNXYzOS4wODdhMy42NyAzLjY3IDAgMCAxLTEuMDg0IDIuNjFBMy43IDMuNyAwIDAgMSA0OC4yOTMgNjBIMTIuNzA3YTMuNyAzLjcgMCAwIDEtMi42MjMtMS4wNzhBMy42NyAzLjY3IDAgMCAxIDkgNTYuMzEyVjQuNjg4YTMuNjcgMy42NyAwIDAgMSAxLjA4NC0yLjYxQTMuNyAzLjcgMCAwIDEgMTIuNzA3IDF6Ii8+PHBhdGggZmlsbD0iIzZBQ0U3QyIgZD0iTTM1LjY5IDEgNTIgMTcuMjI1SDM5LjM5N2MtMi4wNTQgMC0zLjcwNy0xLjgyOS0zLjcwNy0zLjg3MnoiLz48cGF0aCBmaWxsPSIjMjE5QjM4IiBkPSJNMzkuMjExIDE3LjIyNSA1MiAyMi40OHYtNS4yNTV6Ii8+PHBhdGggZmlsbD0iI0ZGRiIgZD0iTTIwLjEyIDMxLjk3NWMwLS44MTcuNjYyLTEuNDc1IDEuNDgzLTEuNDc1aDE3Ljc5NGMuODIxIDAgMS40ODIuNjU4IDEuNDgyIDEuNDc1djE1LjQ4N2MwIC44MTgtLjY2MSAxLjQ3NS0xLjQ4MiAxLjQ3NUgyMS42MDNhMS40NzYgMS40NzYgMCAwIDEtMS40ODItMS40NzRWMzEuOTc0em0yLjIyNSAxLjQ3NWg2LjY3MnYyLjIxMmgtNi42NzJ6bTAgNS4xNjJoNi42NzJ2Mi4yMTNoLTYuNjcyem0wIDUuMTYzaDYuNjcydjIuMjEyaC02LjY3MnptOS42MzgtMTAuMzI1aDYuNjcydjIuMjEyaC02LjY3MnptMCA1LjE2Mmg2LjY3MnYyLjIxM2gtNi42NzJ6bTAgNS4xNjNoNi42NzJ2Mi4yMTJoLTYuNjcyeiIvPjxwYXRoIGZpbGw9IiMyOEI0NDYiIGQ9Ik0zNC42OSAwIDUxIDE2LjIyNXYzOS4wODdhMy42NyAzLjY3IDAgMCAxLTEuMDg0IDIuNjFBMy43IDMuNyAwIDAgMSA0Ny4yOTMgNTlIMTEuNzA3YTMuNyAzLjcgMCAwIDEtMi42MjMtMS4wNzhBMy42NyAzLjY3IDAgMCAxIDggNTUuMzEyVjMuNjg4YTMuNjcgMy42NyAwIDAgMSAxLjA4NC0yLjYxQTMuNyAzLjcgMCAwIDEgMTEuNzA3IDB6Ii8+PHBhdGggZmlsbD0iIzZBQ0U3QyIgZD0iTTM0LjY5IDAgNTEgMTYuMjI1SDM4LjM5N2MtMi4wNTQgMC0zLjcwNy0xLjgyOS0zLjcwNy0zLjg3MnoiLz48cGF0aCBmaWxsPSIjMjE5QjM4IiBkPSJNMzguMjExIDE2LjIyNSA1MSAyMS40OHYtNS4yNTV6Ii8+PHBhdGggZmlsbD0iI0ZGRiIgZD0iTTE5LjEyIDMwLjk3NWMwLS44MTcuNjYyLTEuNDc1IDEuNDgzLTEuNDc1aDE3Ljc5NGMuODIxIDAgMS40ODIuNjU4IDEuNDgyIDEuNDc1djE1LjQ4N2MwIC44MTgtLjY2MSAxLjQ3NS0xLjQ4MiAxLjQ3NUgyMC42MDNhMS40NzYgMS40NzYgMCAwIDEtMS40ODItMS40NzRWMzAuOTc0em0yLjIyNSAxLjQ3NWg2LjY3MnYyLjIxMmgtNi42NzJ6bTAgNS4xNjJoNi42NzJ2Mi4yMTNoLTYuNjcyem0wIDUuMTYzaDYuNjcydjIuMjEyaC02LjY3MnptOS42MzgtMTAuMzI1aDYuNjcydjIuMjEyaC02LjY3MnptMCA1LjE2Mmg2LjY3MnYyLjIxM2gtNi42NzJ6bTAgNS4xNjNoNi42NzJ2Mi4yMTJoLTYuNjcyeiIvPjwvZz48L3N2Zz4="},"displayName":"Google Sheets","typeVersion":5,"nodeCategories":[{"id":3,"name":"Data & Storage"},{"id":4,"name":"Productivity"}]},{"id":19,"icon":"file:httprequest.svg","name":"n8n-nodes-base.httpRequest","codex":{"data":{"alias":["API","Request","URL","Build","cURL"],"resources":{"generic":[{"url":"https://n8n.io/blog/2021-the-year-to-automate-the-new-you-with-n8n/","icon":"☀️","label":"2021: The Year to Automate the New You with n8n"},{"url":"https://n8n.io/blog/why-business-process-automation-with-n8n-can-change-your-daily-life/","icon":"🧬","label":"Why business process automation with n8n can change your daily life"},{"url":"https://n8n.io/blog/automatically-pulling-and-visualizing-data-with-n8n/","icon":"📈","label":"Automatically pulling and visualizing data with n8n"},{"url":"https://n8n.io/blog/learn-how-to-automatically-cross-post-your-content-with-n8n/","icon":"✍️","label":"Learn how to automatically cross-post your content with n8n"},{"url":"https://n8n.io/blog/automatically-adding-expense-receipts-to-google-sheets-with-telegram-mindee-twilio-and-n8n/","icon":"🧾","label":"Automatically Adding Expense Receipts to Google Sheets with Telegram, Mindee, Twilio, and n8n"},{"url":"https://n8n.io/blog/running-n8n-on-ships-an-interview-with-maranics/","icon":"🛳","label":"Running n8n on ships: An interview with Maranics"},{"url":"https://n8n.io/blog/what-are-apis-how-to-use-them-with-no-code/","icon":" 🪢","label":"What are APIs and how to use them with no code"},{"url":"https://n8n.io/blog/5-tasks-you-can-automate-with-notion-api/","icon":"⚡️","label":"5 tasks you can automate with the new Notion API "},{"url":"https://n8n.io/blog/world-poetry-day-workflow/","icon":"📜","label":"Celebrating World Poetry Day with a daily poem in Telegram"},{"url":"https://n8n.io/blog/automate-google-apps-for-productivity/","icon":"💡","label":"15 Google apps you can combine and automate to increase productivity"},{"url":"https://n8n.io/blog/automate-designs-with-bannerbear-and-n8n/","icon":"🎨","label":"Automate Designs with Bannerbear and n8n"},{"url":"https://n8n.io/blog/how-uproc-scraped-a-multi-page-website-with-a-low-code-workflow/","icon":" 🕸️","label":"How uProc scraped a multi-page website with a low-code workflow"},{"url":"https://n8n.io/blog/building-an-expense-tracking-app-in-10-minutes/","icon":"📱","label":"Building an expense tracking app in 10 minutes"},{"url":"https://n8n.io/blog/5-workflow-automations-for-mattermost-that-we-love-at-n8n/","icon":"🤖","label":"5 workflow automations for Mattermost that we love at n8n"},{"url":"https://n8n.io/blog/how-to-use-the-http-request-node-the-swiss-army-knife-for-workflow-automation/","icon":"🧰","label":"How to use the HTTP Request Node - The Swiss Army Knife for Workflow Automation"},{"url":"https://n8n.io/blog/learn-how-to-use-webhooks-with-mattermost-slash-commands/","icon":"🦄","label":"Learn how to use webhooks with Mattermost slash commands"},{"url":"https://n8n.io/blog/how-a-membership-development-manager-automates-his-work-and-investments/","icon":"📈","label":"How a Membership Development Manager automates his work and investments"},{"url":"https://n8n.io/blog/a-low-code-bitcoin-ticker-built-with-questdb-and-n8n-io/","icon":"📈","label":"A low-code bitcoin ticker built with QuestDB and n8n.io"},{"url":"https://n8n.io/blog/how-to-set-up-a-ci-cd-pipeline-with-no-code/","icon":"🎡","label":"How to set up a no-code CI/CD pipeline with GitHub and TravisCI"},{"url":"https://n8n.io/blog/automations-for-activists/","icon":"✨","label":"How Common Knowledge use workflow automation for activism"},{"url":"https://n8n.io/blog/creating-scheduled-text-affirmations-with-n8n/","icon":"🤟","label":"Creating scheduled text affirmations with n8n"},{"url":"https://n8n.io/blog/how-goomer-automated-their-operations-with-over-200-n8n-workflows/","icon":"🛵","label":"How Goomer automated their operations with over 200 n8n workflows"},{"url":"https://n8n.io/blog/aws-workflow-automation/","label":"7 no-code workflow automations for Amazon Web Services"}],"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/core-nodes/n8n-nodes-base.httprequest/"}]},"categories":["Development","Core Nodes"],"nodeVersion":"1.0","codexVersion":"1.0","subcategories":{"Core Nodes":["Helpers"]}}},"group":"[\"output\"]","defaults":{"name":"HTTP Request","color":"#0004F5"},"iconData":{"type":"file","fileBuffer":"data:image/svg+xml;base64,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"},"displayName":"HTTP Request","typeVersion":4,"nodeCategories":[{"id":5,"name":"Development"},{"id":9,"name":"Core Nodes"}]},{"id":20,"icon":"fa:map-signs","name":"n8n-nodes-base.if","codex":{"data":{"alias":["Router","Filter","Condition","Logic","Boolean","Branch"],"details":"The IF node can be used to implement binary conditional logic in your workflow. You can set up one-to-many conditions to evaluate each item of data being inputted into the node. That data will either evaluate to TRUE or FALSE and route out of the node accordingly.\n\nThis node has multiple types of conditions: Bool, String, Number, and Date & Time.","resources":{"generic":[{"url":"https://n8n.io/blog/learn-to-automate-your-factorys-incident-reporting-a-step-by-step-guide/","icon":"🏭","label":"Learn to Automate Your Factory's Incident Reporting: A Step by Step Guide"},{"url":"https://n8n.io/blog/2021-the-year-to-automate-the-new-you-with-n8n/","icon":"☀️","label":"2021: The Year to Automate the New You with n8n"},{"url":"https://n8n.io/blog/why-business-process-automation-with-n8n-can-change-your-daily-life/","icon":"🧬","label":"Why business process automation with n8n can change your daily life"},{"url":"https://n8n.io/blog/create-a-toxic-language-detector-for-telegram/","icon":"🤬","label":"Create a toxic language detector for Telegram in 4 step"},{"url":"https://n8n.io/blog/no-code-ecommerce-workflow-automations/","icon":"store","label":"6 e-commerce workflows to power up your Shopify s"},{"url":"https://n8n.io/blog/how-to-build-a-low-code-self-hosted-url-shortener/","icon":"🔗","label":"How to build a low-code, self-hosted URL shortener in 3 steps"},{"url":"https://n8n.io/blog/automate-your-data-processing-pipeline-in-9-steps-with-n8n/","icon":"⚙️","label":"Automate your data processing pipeline in 9 steps"},{"url":"https://n8n.io/blog/how-to-get-started-with-crm-automation-and-no-code-workflow-ideas/","icon":"👥","label":"How to get started with CRM automation (with 3 no-code workflow ideas"},{"url":"https://n8n.io/blog/5-tasks-you-can-automate-with-notion-api/","icon":"⚡️","label":"5 tasks you can automate with the new Notion API "},{"url":"https://n8n.io/blog/automate-google-apps-for-productivity/","icon":"💡","label":"15 Google apps you can combine and automate to increase productivity"},{"url":"https://n8n.io/blog/automation-for-maintainers-of-open-source-projects/","icon":"🏷️","label":"How to automatically manage contributions to open-source projects"},{"url":"https://n8n.io/blog/how-uproc-scraped-a-multi-page-website-with-a-low-code-workflow/","icon":" 🕸️","label":"How uProc scraped a multi-page website with a low-code workflow"},{"url":"https://n8n.io/blog/5-workflow-automations-for-mattermost-that-we-love-at-n8n/","icon":"🤖","label":"5 workflow automations for Mattermost that we love at n8n"},{"url":"https://n8n.io/blog/why-this-product-manager-loves-workflow-automation-with-n8n/","icon":"🧠","label":"Why this Product Manager loves workflow automation with n8n"},{"url":"https://n8n.io/blog/sending-automated-congratulations-with-google-sheets-twilio-and-n8n/","icon":"🙌","label":"Sending Automated Congratulations with Google Sheets, Twilio, and n8n "},{"url":"https://n8n.io/blog/how-to-set-up-a-ci-cd-pipeline-with-no-code/","icon":"🎡","label":"How to set up a no-code CI/CD pipeline with GitHub and TravisCI"},{"url":"https://n8n.io/blog/benefits-of-automation-and-n8n-an-interview-with-hubspots-hugh-durkin/","icon":"🎖","label":"Benefits of automation and n8n: An interview with HubSpot's Hugh Durkin"},{"url":"https://n8n.io/blog/aws-workflow-automation/","label":"7 no-code workflow automations for Amazon Web Services"}],"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/core-nodes/n8n-nodes-base.if/"}]},"categories":["Core Nodes"],"nodeVersion":"1.0","codexVersion":"1.0","subcategories":{"Core Nodes":["Flow"]}}},"group":"[\"transform\"]","defaults":{"name":"If","color":"#408000"},"iconData":{"icon":"map-signs","type":"icon"},"displayName":"If","typeVersion":2,"nodeCategories":[{"id":9,"name":"Core Nodes"}]},{"id":24,"icon":"file:merge.svg","name":"n8n-nodes-base.merge","codex":{"data":{"alias":["Join","Concatenate","Wait"],"resources":{"generic":[{"url":"https://n8n.io/blog/how-to-sync-data-between-two-systems/","icon":"🏬","label":"How to synchronize data between two systems (one-way vs. two-way sync"},{"url":"https://n8n.io/blog/supercharging-your-conference-registration-process-with-n8n/","icon":"🎫","label":"Supercharging your conference registration process with n8n"},{"url":"https://n8n.io/blog/migrating-community-metrics-to-orbit-using-n8n/","icon":"📈","label":"Migrating Community Metrics to Orbit using n8n"},{"url":"https://n8n.io/blog/build-your-own-virtual-assistant-with-n8n-a-step-by-step-guide/","icon":"👦","label":"Build your own virtual assistant with n8n: A step by step guide"},{"url":"https://n8n.io/blog/sending-automated-congratulations-with-google-sheets-twilio-and-n8n/","icon":"🙌","label":"Sending Automated Congratulations with Google Sheets, Twilio, and n8n "},{"url":"https://n8n.io/blog/aws-workflow-automation/","label":"7 no-code workflow automations for Amazon Web Services"}],"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/core-nodes/n8n-nodes-base.merge/"}]},"categories":["Core Nodes"],"nodeVersion":"1.0","codexVersion":"1.0","subcategories":{"Core Nodes":["Flow","Data Transformation"]}}},"group":"[\"transform\"]","defaults":{"name":"Merge"},"iconData":{"type":"file","fileBuffer":"data:image/svg+xml;base64,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"},"displayName":"Merge","typeVersion":3,"nodeCategories":[{"id":9,"name":"Core Nodes"}]},{"id":40,"icon":"file:slack.svg","name":"n8n-nodes-base.slack","codex":{"data":{"alias":["human","form","wait","hitl","approval"],"resources":{"generic":[{"url":"https://n8n.io/blog/no-code-ecommerce-workflow-automations/","icon":"store","label":"6 e-commerce workflows to power up your Shopify s"},{"url":"https://n8n.io/blog/automate-your-data-processing-pipeline-in-9-steps-with-n8n/","icon":"⚙️","label":"Automate your data processing pipeline in 9 steps"},{"url":"https://n8n.io/blog/how-to-get-started-with-crm-automation-and-no-code-workflow-ideas/","icon":"👥","label":"How to get started with CRM automation (with 3 no-code workflow ideas"},{"url":"https://n8n.io/blog/5-tasks-you-can-automate-with-notion-api/","icon":"⚡️","label":"5 tasks you can automate with the new Notion API "},{"url":"https://n8n.io/blog/build-your-own-virtual-assistant-with-n8n-a-step-by-step-guide/","icon":"👦","label":"Build your own virtual assistant with n8n: A step by step guide"},{"url":"https://n8n.io/blog/how-to-automatically-give-kudos-to-contributors-with-github-slack-and-n8n/","icon":"👏","label":"How to automatically give kudos to contributors with GitHub, Slack, and n8n"},{"url":"https://n8n.io/blog/automations-for-activists/","icon":"✨","label":"How Common Knowledge use workflow automation for activism"}],"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/app-nodes/n8n-nodes-base.slack/"}],"credentialDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/credentials/slack/"}]},"categories":["Communication","HITL"],"nodeVersion":"1.0","codexVersion":"1.0","subcategories":{"HITL":["Human in the Loop"]}}},"group":"[\"output\"]","defaults":{"name":"Slack"},"iconData":{"type":"file","fileBuffer":"data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hsaW5rIiBmaWxsPSIjZmZmIiBmaWxsLXJ1bGU9ImV2ZW5vZGQiIHN0cm9rZT0iIzAwMCIgc3Ryb2tlLWxpbmVjYXA9InJvdW5kIiBzdHJva2UtbGluZWpvaW49InJvdW5kIiB2aWV3Qm94PSIwIDAgMTUwLjg1MiAxNTAuODUyIj48dXNlIHhsaW5rOmhyZWY9IiNhIiB4PSIuOTI2IiB5PSIuOTI2Ii8+PHN5bWJvbCBpZD0iYSIgb3ZlcmZsb3c9InZpc2libGUiPjxnIHN0cm9rZS13aWR0aD0iMS44NTIiPjxwYXRoIGZpbGw9IiNlMDFlNWEiIHN0cm9rZT0iI2UwMWU1YSIgZD0iTTQwLjc0MSA5My41NWMwLTguNzM1IDYuNjA3LTE1Ljc3MiAxNC44MTUtMTUuNzcyczE0LjgxNSA3LjAzNyAxNC44MTUgMTUuNzcydjM4LjgyNGMwIDguNzM3LTYuNjA3IDE1Ljc3NC0xNC44MTUgMTUuNzc0cy0xNC44MTUtNy4wMzctMTQuODE1LTE1Ljc3MnoiLz48cGF0aCBmaWxsPSIjZWNiMjJkIiBzdHJva2U9IiNlY2IyMmQiIGQ9Ik05My41NSAxMDcuNDA4Yy04LjczNSAwLTE1Ljc3Mi02LjYwNy0xNS43NzItMTQuODE1czcuMDM3LTE0LjgxNSAxNS43NzItMTQuODE1aDM4LjgyNmM4LjczNSAwIDE1Ljc3MiA2LjYwNyAxNS43NzIgMTQuODE1cy03LjAzNyAxNC44MTUtMTUuNzcyIDE0LjgxNXoiLz48cGF0aCBmaWxsPSIjMmZiNjdjIiBzdHJva2U9IiMyZmI2N2MiIGQ9Ik03Ny43NzggMTUuNzcyQzc3Ljc3OCA3LjAzNyA4NC4zODUgMCA5Mi41OTMgMHMxNC44MTUgNy4wMzcgMTQuODE1IDE1Ljc3MnYzOC44MjZjMCA4LjczNS02LjYwNyAxNS43NzItMTQuODE1IDE1Ljc3MnMtMTQuODE1LTcuMDM3LTE0LjgxNS0xNS43NzJ6Ii8+PHBhdGggZmlsbD0iIzM2YzVmMSIgc3Ryb2tlPSIjMzZjNWYxIiBkPSJNMTUuNzcyIDcwLjM3MUM3LjAzNyA3MC4zNzEgMCA2My43NjMgMCA1NS41NTZzNy4wMzctMTQuODE1IDE1Ljc3Mi0xNC44MTVoMzguODI2YzguNzM1IDAgMTUuNzcyIDYuNjA3IDE1Ljc3MiAxNC44MTVzLTcuMDM3IDE0LjgxNS0xNS43NzIgMTQuODE1eiIvPjxnIHN0cm9rZS1saW5lam9pbj0ibWl0ZXIiPjxwYXRoIGZpbGw9IiNlY2IyMmQiIHN0cm9rZT0iI2VjYjIyZCIgZD0iTTc3Ljc3OCAxMzMuMzMzYzAgOC4yMDggNi42MDcgMTQuODE1IDE0LjgxNSAxNC44MTVzMTQuODE1LTYuNjA3IDE0LjgxNS0xNC44MTUtNi42MDctMTQuODE1LTE0LjgxNS0xNC44MTVINzcuNzc4eiIvPjxwYXRoIGZpbGw9IiMyZmI2N2MiIHN0cm9rZT0iIzJmYjY3YyIgZD0iTTEzMy4zMzQgNzAuMzcxaC0xNC44MTVWNTUuNTU2YzAtOC4yMDcgNi42MDctMTQuODE1IDE0LjgxNS0xNC44MTVzMTQuODE1IDYuNjA3IDE0LjgxNSAxNC44MTUtNi42MDcgMTQuODE1LTE0LjgxNSAxNC44MTV6Ii8+PHBhdGggZmlsbD0iI2UwMWU1YSIgc3Ryb2tlPSIjZTAxZTVhIiBkPSJNMTQuODE1IDc3Ljc3OEgyOS42M3YxNC44MTVjMCA4LjIwNy02LjYwNyAxNC44MTUtMTQuODE1IDE0LjgxNVMwIDEwMC44IDAgOTIuNTkzczYuNjA3LTE0LjgxNSAxNC44MTUtMTQuODE1eiIvPjxwYXRoIGZpbGw9IiMzNmM1ZjEiIHN0cm9rZT0iIzM2YzVmMSIgZD0iTTcwLjM3MSAxNC44MTVWMjkuNjNINTUuNTU2Yy04LjIwNyAwLTE0LjgxNS02LjYwNy0xNC44MTUtMTQuODE1UzQ3LjM0OCAwIDU1LjU1NiAwczE0LjgxNSA2LjYwNyAxNC44MTUgMTQuODE1eiIvPjwvZz48L2c+PC9zeW1ib2w+PC9zdmc+"},"displayName":"Slack","typeVersion":2,"nodeCategories":[{"id":6,"name":"Communication"},{"id":28,"name":"HITL"}]},{"id":49,"icon":"file:telegram.svg","name":"n8n-nodes-base.telegram","codex":{"data":{"alias":["human","form","wait","hitl","approval"],"resources":{"generic":[{"url":"https://n8n.io/blog/why-business-process-automation-with-n8n-can-change-your-daily-life/","icon":"🧬","label":"Why business process automation with n8n can change your daily life"},{"url":"https://n8n.io/blog/create-a-toxic-language-detector-for-telegram/","icon":"🤬","label":"Create a toxic language detector for Telegram in 4 step"},{"url":"https://n8n.io/blog/automatically-adding-expense-receipts-to-google-sheets-with-telegram-mindee-twilio-and-n8n/","icon":"🧾","label":"Automatically Adding Expense Receipts to Google Sheets with Telegram, Mindee, Twilio, and n8n"},{"url":"https://n8n.io/blog/no-code-ecommerce-workflow-automations/","icon":"store","label":"6 e-commerce workflows to power up your Shopify s"},{"url":"https://n8n.io/blog/world-poetry-day-workflow/","icon":"📜","label":"Celebrating World Poetry Day with a daily poem in Telegram"},{"url":"https://n8n.io/blog/using-automation-to-boost-productivity-in-the-workplace/","icon":"💪","label":"Using Automation to Boost Productivity in the Workplace"},{"url":"https://n8n.io/blog/how-to-set-up-a-ci-cd-pipeline-with-no-code/","icon":"🎡","label":"How to set up a no-code CI/CD pipeline with GitHub and TravisCI"},{"url":"https://n8n.io/blog/creating-scheduled-text-affirmations-with-n8n/","icon":"🤟","label":"Creating scheduled text affirmations with n8n"},{"url":"https://n8n.io/blog/creating-telegram-bots-with-n8n-a-no-code-platform/","icon":"💬","label":"Creating Telegram Bots with n8n, a No-Code Platform"},{"url":"https://n8n.io/blog/aws-workflow-automation/","label":"7 no-code workflow automations for Amazon Web Services"}],"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/app-nodes/n8n-nodes-base.telegram/"}],"credentialDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/credentials/telegram/"}]},"categories":["Communication","HITL"],"nodeVersion":"1.0","codexVersion":"1.0","subcategories":{"HITL":["Human in the Loop"]}}},"group":"[\"output\"]","defaults":{"name":"Telegram"},"iconData":{"type":"file","fileBuffer":"data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hsaW5rIiBmaWxsPSIjZmZmIiBmaWxsLXJ1bGU9ImV2ZW5vZGQiIHN0cm9rZT0iIzAwMCIgc3Ryb2tlLWxpbmVjYXA9InJvdW5kIiBzdHJva2UtbGluZWpvaW49InJvdW5kIiB2aWV3Qm94PSIwIDAgNjYgNjYiPjx1c2UgeGxpbms6aHJlZj0iI2EiIHg9Ii41IiB5PSIuNSIvPjxzeW1ib2wgaWQ9ImEiIG92ZXJmbG93PSJ2aXNpYmxlIj48ZyBmaWxsLXJ1bGU9Im5vbnplcm8iIHN0cm9rZT0ibm9uZSI+PHBhdGggZmlsbD0iIzM3YWVlMiIgZD0iTTAgMzJjMCAxNy42NzMgMTQuMzI3IDMyIDMyIDMyczMyLTE0LjMyNyAzMi0zMlM0OS42NzMgMCAzMiAwIDAgMTQuMzI3IDAgMzIiLz48cGF0aCBmaWxsPSIjYzhkYWVhIiBkPSJtMjEuNjYxIDM0LjMzOCAzLjc5NyAxMC41MDhzLjQ3NS45ODMuOTgzLjk4MyA4LjA2OC03Ljg2NCA4LjA2OC03Ljg2NGw4LjQwNy0xNi4yMzctMjEuMTE5IDkuODk4eiIvPjxwYXRoIGZpbGw9IiNhOWM2ZDgiIGQ9Im0yNi42OTUgMzcuMDM0LS43MjkgNy43NDZzLS4zMDUgMi4zNzMgMi4wNjggMGw0LjY0NC00LjIwMyIvPjxwYXRoIGQ9Im0yMS43MyAzNC43MTItNy44MDktMi41NDVzLS45MzItLjM3OC0uNjMzLTEuMjM3Yy4wNjItLjE3Ny4xODYtLjMyOC41NTktLjU4OCAxLjczMS0xLjIwNiAzMi4wMjgtMTIuMDk2IDMyLjAyOC0xMi4wOTZzLjg1Ni0uMjg4IDEuMzYxLS4wOTdjLjIzMS4wODguMzc4LjE4Ny41MDMuNTQ4LjA0NS4xMzIuMDcxLjQxMS4wNjguNjg5LS4wMDMuMjAxLS4wMjcuMzg2LS4wNDUuNjc4LS4xODQgMi45NzgtNS43MDYgMjUuMTk4LTUuNzA2IDI1LjE5OHMtLjMzIDEuMy0xLjUxNCAxLjM0NWMtLjQzMi4wMTYtLjk1Ni0uMDcxLTEuNTgyLS42MS0yLjMyMy0xLjk5OC0xMC4zNTItNy4zOTQtMTIuMTI2LTguNThhLjM0LjM0IDAgMCAxLS4xNDYtLjIzOWMtLjAyNS0uMTI1LjEwOC0uMjguMTA4LS4yOHMxMy45OC0xMi40MjcgMTQuMzUyLTEzLjczMWMuMDI5LS4xMDEtLjA3OS0uMTUxLS4yMjYtLjEwNy0uOTI5LjM0Mi0xNy4wMjUgMTAuNTA2LTE4LjgwMSAxMS42MjktLjEwNC4wNjYtLjM5NS4wMjMtLjM5NS4wMjMiLz48L2c+PC9zeW1ib2w+PC9zdmc+"},"displayName":"Telegram","typeVersion":1,"nodeCategories":[{"id":6,"name":"Communication"},{"id":28,"name":"HITL"}]},{"id":356,"icon":"file:gmail.svg","name":"n8n-nodes-base.gmail","codex":{"data":{"alias":["email","human","form","wait","hitl","approval"],"resources":{"generic":[{"url":"https://n8n.io/blog/why-business-process-automation-with-n8n-can-change-your-daily-life/","icon":"🧬","label":"Why business process automation with n8n can change your daily life"},{"url":"https://n8n.io/blog/supercharging-your-conference-registration-process-with-n8n/","icon":"🎫","label":"Supercharging your conference registration process with n8n"},{"url":"https://n8n.io/blog/no-code-ecommerce-workflow-automations/","icon":"store","label":"6 e-commerce workflows to power up your Shopify s"},{"url":"https://n8n.io/blog/how-to-get-started-with-crm-automation-and-no-code-workflow-ideas/","icon":"👥","label":"How to get started with CRM automation (with 3 no-code workflow ideas"},{"url":"https://n8n.io/blog/automate-google-apps-for-productivity/","icon":"💡","label":"15 Google apps you can combine and automate to increase productivity"},{"url":"https://n8n.io/blog/your-business-doesnt-need-you-to-operate/","icon":" 🖥️","label":"Hey founders! Your business doesn't need you to operate"},{"url":"https://n8n.io/blog/using-automation-to-boost-productivity-in-the-workplace/","icon":"💪","label":"Using Automation to Boost Productivity in the Workplace"}],"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/app-nodes/n8n-nodes-base.gmail/"}],"credentialDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/credentials/google/oauth-single-service/"}]},"categories":["Communication","HITL"],"nodeVersion":"1.0","codexVersion":"1.0","subcategories":{"HITL":["Human in the Loop"]}}},"group":"[\"transform\"]","defaults":{"name":"Gmail"},"iconData":{"type":"file","fileBuffer":"data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSIyNTYiIGhlaWdodD0iMTkzIiBwcmVzZXJ2ZUFzcGVjdFJhdGlvPSJ4TWlkWU1pZCI+PHBhdGggZmlsbD0iIzQyODVGNCIgZD0iTTU4LjE4MiAxOTIuMDVWOTMuMTRMMjcuNTA3IDY1LjA3NyAwIDQ5LjUwNHYxMjUuMDkxYzAgOS42NTggNy44MjUgMTcuNDU1IDE3LjQ1NSAxNy40NTV6Ii8+PHBhdGggZmlsbD0iIzM0QTg1MyIgZD0iTTE5Ny44MTggMTkyLjA1aDQwLjcyN2M5LjY1OSAwIDE3LjQ1NS03LjgyNiAxNy40NTUtMTcuNDU1VjQ5LjUwNWwtMzEuMTU2IDE3LjgzNy0yNy4wMjYgMjUuNzk4eiIvPjxwYXRoIGZpbGw9IiNFQTQzMzUiIGQ9Im01OC4xODIgOTMuMTQtNC4xNzQtMzguNjQ3IDQuMTc0LTM2Ljk4OUwxMjggNjkuODY4bDY5LjgxOC01Mi4zNjQgNC42NyAzNC45OTItNC42NyA0MC42NDRMMTI4IDE0NS41MDR6Ii8+PHBhdGggZmlsbD0iI0ZCQkMwNCIgZD0iTTE5Ny44MTggMTcuNTA0VjkzLjE0TDI1NiA0OS41MDRWMjYuMjMxYzAtMjEuNTg1LTI0LjY0LTMzLjg5LTQxLjg5LTIwLjk0NXoiLz48cGF0aCBmaWxsPSIjQzUyMjFGIiBkPSJtMCA0OS41MDQgMjYuNzU5IDIwLjA3TDU4LjE4MiA5My4xNFYxNy41MDRMNDEuODkgNS4yODZDMjQuNjEtNy42NiAwIDQuNjQ2IDAgMjYuMjN6Ii8+PC9zdmc+"},"displayName":"Gmail","typeVersion":2,"nodeCategories":[{"id":6,"name":"Communication"},{"id":28,"name":"HITL"}]},{"id":565,"icon":"fa:sticky-note","name":"n8n-nodes-base.stickyNote","codex":{"data":{"alias":["Comments","Notes","Sticky"],"categories":["Core Nodes"],"nodeVersion":"1.0","codexVersion":"1.0","subcategories":{"Core Nodes":["Helpers"]}}},"group":"[\"input\"]","defaults":{"name":"Sticky Note","color":"#FFD233"},"iconData":{"icon":"sticky-note","type":"icon"},"displayName":"Sticky Note","typeVersion":1,"nodeCategories":[{"id":9,"name":"Core Nodes"}]},{"id":834,"icon":"file:code.svg","name":"n8n-nodes-base.code","codex":{"data":{"alias":["cpde","Javascript","JS","Python","Script","Custom Code","Function"],"details":"The Code node allows you to execute JavaScript in your workflow.","resources":{"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/core-nodes/n8n-nodes-base.code/"}]},"categories":["Development","Core Nodes"],"nodeVersion":"1.0","codexVersion":"1.0","subcategories":{"Core Nodes":["Helpers","Data Transformation"]}}},"group":"[\"transform\"]","defaults":{"name":"Code"},"iconData":{"type":"file","fileBuffer":"data:image/svg+xml;base64,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"},"displayName":"Code","typeVersion":2,"nodeCategories":[{"id":5,"name":"Development"},{"id":9,"name":"Core Nodes"}]},{"id":839,"icon":"fa:clock","name":"n8n-nodes-base.scheduleTrigger","codex":{"data":{"alias":["Time","Scheduler","Polling","Cron","Interval"],"resources":{"generic":[],"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/core-nodes/n8n-nodes-base.scheduletrigger/"}]},"categories":["Core Nodes"],"nodeVersion":"1.0","codexVersion":"1.0"}},"group":"[\"trigger\",\"schedule\"]","defaults":{"name":"Schedule Trigger","color":"#31C49F"},"iconData":{"icon":"clock","type":"icon"},"displayName":"Schedule Trigger","typeVersion":1,"nodeCategories":[{"id":9,"name":"Core Nodes"}]},{"id":1119,"icon":"fa:robot","name":"@n8n/n8n-nodes-langchain.agent","codex":{"data":{"alias":["LangChain","Chat","Conversational","Plan and Execute","ReAct","Tools"],"resources":{"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/cluster-nodes/root-nodes/n8n-nodes-langchain.agent/"}]},"categories":["AI","Langchain"],"subcategories":{"AI":["Agents","Root Nodes"]}}},"group":"[\"transform\"]","defaults":{"name":"AI Agent","color":"#404040"},"iconData":{"icon":"robot","type":"icon"},"displayName":"AI Agent","typeVersion":3,"nodeCategories":[{"id":25,"name":"AI"},{"id":26,"name":"Langchain"}]},{"id":1153,"icon":"file:openAiLight.svg","name":"@n8n/n8n-nodes-langchain.lmChatOpenAi","codex":{"data":{"resources":{"primaryDocumentation":[{"url":"https://docs.n8n.io/integrations/builtin/cluster-nodes/sub-nodes/n8n-nodes-langchain.lmchatopenai/"}]},"categories":["AI","Langchain"],"subcategories":{"AI":["Language Models","Root Nodes"],"Language Models":["Chat Models (Recommended)"]}}},"group":"[\"transform\"]","defaults":{"name":"OpenAI Chat Model"},"iconData":{"type":"file","fileBuffer":"data:image/svg+xml;base64,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"},"displayName":"OpenAI Chat Model","typeVersion":1,"nodeCategories":[{"id":25,"name":"AI"},{"id":26,"name":"Langchain"}]}],"categories":[{"id":32,"name":"Market Research"},{"id":49,"name":"AI Summarization"}],"image":[]}}