Describe the problem/error/question
We are currently blocked from deploying recent n8n security patches in our CI/CD pipeline because the CrowdStrike Falcon Container Scanner (FCS CLI) is rejecting the newer n8n Docker images.
Version n8nio/n8n:1.123.19 scans and uploads its inventory payload perfectly.
Versions >= 1.123.23 (and the 2.9.4 stable branch) consistently fail during the cloud upload phase.
We have extensively debugged this on our end and ruled out payload size limits. By trapping the temporary OCI layout generated by the scanner, we suspect CrowdStrike’s strict JSON validator is choking on a newly introduced dependency or metadata string in the newer n8n images.
Using syft to diff .19 and .23, we noticed a few major additions, including the @sigstoresigstore suite, @modelcontextprotocol/sdk, and a Go module (task-runner-launcher) using a massive pseudo-version string (v0.0.0-20260215112949-852ae3a07e57).
We also suspect there may have been an Alpine Linux base image bump between these versions.
Our Question for the n8n Team: Are you aware of any specific metadata format changes, deeply nested dependencies, or OS-level base image updates introduced between 1.123.19 and 1.123.23 that might trigger a strict SemVer or JSON validator to reject the container’s Software Bill of Materials. Is there a patch for this?
What is the error message (if any)?
Uploading image inventory to falcon cloud… (Done)
Error: error while performing scan Error details: failed to upload the results: err:received 400 from uri api.eu-1.crowdstrike.com
Please share your workflow
(Select the nodes on your canvas and use the keyboard shortcuts CMD+C/CTRL+C and CMD+V/CTRL+V to copy and paste the workflow.)
Share the output returned by the last node
Information on your n8n setup
- n8n version:
- Database (default: SQLite):
- n8n EXECUTIONS_PROCESS setting (default: own, main):
- Running n8n via (Docker, npm, n8n cloud, desktop app):
- Operating system: