

1·
14 days agoYou should probably look at this from a few different angles. Is the n8n instance internet-facing? And is it actually reading the email content? If so, it might be vulnerable to various attacks. Can a user manipulate the input in any way?

On top of the other advice, Pillow is definitely worth considering for this. It’s a solid library that fits this use case perfectly.