top of page
Deep Dives
Long-form technical articles that break down complex systems, protocols, tools, or security concepts step by step. These take longer to write and show depth.
CVSS 4.0 vs CVSS 3.1 vs 3.0: Why Vulnerability Severity Scoring Needed a Reset
For years, vulnerability management has revolved around a familiar ritual: scan, score, sort, patch. At the center of that ritual sat CVSS, a single numerical expression of danger that promised clarity in a chaotic threat landscape. Over time, that promise hardened into dependency. CVSS scores became policy triggers, SLA benchmarks, and executive talking points. Yet as systems grew more interconnected and attacks more adaptive, the gap between what CVSS measured and what defe
Rhoda Smart
Feb 135 min read


n8n Python Sandbox Escape (CVE-2026-0863): Code Node Vulnerability Explained
Python’s widespread use for automation and scripting is a double-edged sword: it accelerates workflow development but expands the attack surface of automation platforms. In the context of n8n , a popular open-source workflow automation tool, Python execution has historically been a security challenge. The vulnerability tracked as CVE-2025-68668 prompted n8n to remove in-process Pyodide execution and harden defaults to reduce unsafe sandboxing paths. However, CVE-2026-0863 d
Rhoda Smart
Jan 2212 min read


CVE-2025-68668: Breaking Out of the Python Sandbox in n8n
INTRODUCTION CVE-2025-68668 is a sandbox bypass vulnerability in n8n , an open source workflow automation platform widely used for internal tooling, integrations, and automation pipelines. The flaw affects n8n versions from 1.0.0 up to, but not including, 2.0.0 , and allows an authenticated user with permission to create or modify workflows to execute arbitrary operating system commands on the host running n8n . At the center of this issue is the Python Code Node , which reli
Rhoda Smart
Jan 218 min read
bottom of page