Hi,
I’d like to suggest adding an option (or making it default) to not forward the credentials received by a webhook trigger in to the execution. This would be good to limit exposure of access keys/etc.
For reference, here’s an example of what appears in the execution history when a webhook client uses header auth to launch an n8n webhook:
[
{
"headers": {
"x-forwarded-for": "10.251.1.98",
"x-forwarded-proto": "https",
"x-forwarded-port": "443",
"host": "n8n.domainname.com",
"x-amzn-trace-id": "Root=1-654beaf3-2cd9616a3f37939610d9e884",
"user-agent": "curl/7.61.1",
"accept": "*/*",
"key": "<redacted from this forum post>"
},
"params": {
},
"query": {
}
}
]
Thanks!