This is an n8n community node for Red Hat Dependency Analytics.
Dependency Analytics helps organizations explore the relationships between applications, dependencies, and vulnerabilities by consuming and managing:
- Software Bill of Materials (SBOMs)
- Vulnerability Exploitability eXchange (VEX) data
- Vendor advisories from vulnerability databases
It is designed for DevSecOps teams and developers to better understand and reduce organizational risk exposure.
n8n is a fair-code licensed workflow automation platform.
Installation | Operations | Credentials | Compatibility | Usage | Resources | Version history
Follow the installation guide in the n8n community nodes documentation.
This node provides three operation groups that mirror the Dependency Analytics API:
SBOM operations
- Get SBOM - Retrieve metadata for a single SBOM by its SHA (supports
sha256:,sha384:,sha512:prefixes). - Get Many SBOMs - List SBOMs in your instance with optional limit/sorting.
Advisory operations
- Get Advisory - Fetch a specific advisory (includes identifiers, issuer, dates, and CVE links where available).
- Get Many Advisories - List advisories with optional sorting.
- Analyze - Resolve advisories for supplied packages:
- From PURLs: send one or more PURLs and receive advisories per package.
- From an SBOM SHA: look up the SBOM, then return advisories associated with that SBOM.
Vulnerability operations
- Get Vulnerability - Retrieve a single vulnerability record (e.g., by CVE).
- Get Many Vulnerabilities - List vulnerability records with optional sorting.
- List-style operations accept multiple sort rules; they are applied in order after the items are fetched.
- Supported sort fields:
SBOMs (Get Many): published, name, packages (count), sizeAdvisories (Get Many): published, title, sizeAdvisories (Analyze): published, title, average score, average severity (Critical > High > Medium > Low > None > Unknown)Vulnerabilities (Get Many): published, title, average severity, average score
- The
Limitoption caps results (default 50, minimum 1).
Simplified(default): minimal, stable shape for each resource to keep payloads small.Raw: returns the API response as-is (use when you need every field).Selected Fields: pick the properties you want; identifiers are always included.- Tip: When chaining nodes or using AI tools, prefer
Simplifiedor a narrowSelected Fieldsset to avoid oversized items.
This node supports Client Credentials OAuth2 type for authenticating with Red Hat Dependency Analytics.
- Use when connecting to RHTPA cloud services
- Required parameters: (Provided by the RHTPA team upon request)
- Client ID
- Client Secret
- Use when connecting to:
- On premise Trustify instance
- Local development
- It requires that in your SSO provider a confidential client exists
- The Trustify instance accepts this client id
- The Trustify instance can map the client or scope to the necessary permissions
For more information refer to the Trustify - OIDC Docs
-
Add the Dependency Analytics node to your n8n workflow
-
Select an operation (e.g., “List SBOMs”)
-
Provide required inputs (e.g., SBOM SHA)
-
Run the workflow and process the results
1.0.0 – Initial release with SBOM, vulnerability, and advisory operations