npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2025 – Pkg Stats / Ryan Hefner

n8n-nodes-nessus

v1.0.9

Published

n8n community node for Tenable Nessus vulnerability scanner integration

Downloads

40

Readme

n8n-nodes-nessus

This is an n8n community node for interacting with Tenable Nessus vulnerability scanners, bringing comprehensive vulnerability management capabilities to n8n workflows.

About

This node provides a comprehensive interface to Tenable Nessus vulnerability scanners within n8n, enabling security teams to automate vulnerability management workflows. Our goal is to make Nessus functionality seamlessly available in n8n, allowing users to integrate vulnerability scanning into their automation pipelines.

Inspiration and Credits

This project is inspired by and references the excellent pyTenable Python library created by Tenable, Inc. The pyTenable library provides a pythonic interface into Tenable's platform APIs and serves as our primary reference for API interactions and functionality.

  • pyTenable Library: https://github.com/tenable/pyTenable
  • pyTenable Documentation: https://pytenable.readthedocs.io/
  • License: MIT License (same as this project)

We've adapted the pyTenable library's approach and functionality to work within the n8n ecosystem, translating Python patterns to TypeScript and n8n's node architecture.

Installation

Follow the installation guide in the n8n community nodes documentation.

Supported Resources

Scan Operations

  • List Scans: Get all scans with optional filtering
  • Get Scan Details: Retrieve detailed information about a specific scan
  • Create Scan: Create new scans with policy and target configuration
  • Launch Scan: Start configured scans
  • Stop Scan: Halt running scans
  • Pause Scan: Temporarily pause running scans
  • Resume Scan: Resume paused scans
  • Delete Scan: Remove scans from the system
  • Export Scan: Download scan results in various formats (PDF, CSV, Nessus)
  • Copy Scan: Duplicate existing scan configurations

Policy Operations

  • List Policies: Get all scan policies
  • Get Policy Details: Retrieve detailed policy information
  • Create Policy: Create new scan policies
  • Update Policy: Modify existing policies
  • Delete Policy: Remove policies
  • Copy Policy: Duplicate existing policies

Folder Operations

  • List Folders: Get all scan folders
  • Create Folder: Create new folders for organizing scans
  • Delete Folder: Remove folders

Plugin Operations

  • List Plugins: Get available Nessus plugins
  • Get Plugin Details: Retrieve detailed plugin information
  • List Plugin Families: Get plugin families and categories

Session Operations

  • Get Session Details: Retrieve current session information
  • Logout: End current session

Credentials

This node requires Nessus API credentials. You can obtain these by:

  1. Logging into your Nessus instance
  2. Going to Settings > My Account > API Keys
  3. Generating a new API key pair (Access Key and Secret Key)
  4. Adding the credentials to your n8n credentials store

Required Credential Fields

  • Nessus URL: The base URL of your Nessus instance (e.g., https://your-nessus-server:8834)
  • Access Key: Your Nessus API access key
  • Secret Key: Your Nessus API secret key
  • Allow Self-Signed Certificates: Enable if using self-signed certificates (optional)

Configuration Examples

List All Scans

  • Resource: Scan
  • Operation: List
  • Additional Options: Configure pagination and filtering as needed

Create and Launch a Scan

  1. Create Scan:

    • Resource: Scan
    • Operation: Create
    • Policy: Select from available policies
    • Targets: Specify IP addresses or hostnames
    • Name: Give your scan a descriptive name
  2. Launch Scan:

    • Resource: Scan
    • Operation: Launch
    • Scan ID: Use the ID from the created scan

Export Scan Results

  • Resource: Scan
  • Operation: Export
  • Scan ID: Specify the scan to export
  • Format: Choose PDF, CSV, or Nessus format

Advanced Features

  • Pagination Support: Automatically handles large result sets
  • Retry Logic: Built-in retry mechanism with exponential backoff
  • Input Validation: Comprehensive parameter validation
  • Error Handling: Detailed error messages with Nessus-specific error codes
  • Bulk Operations: Support for managing multiple scans simultaneously

Security Considerations

  • Always use HTTPS when connecting to Nessus
  • Store API credentials securely using n8n's credential management
  • Regularly rotate API keys
  • Use appropriate network security measures for Nessus communications

Use Cases

  • Automated Vulnerability Scanning: Schedule regular scans and process results
  • Incident Response: Trigger scans based on security events
  • Compliance Reporting: Generate and distribute compliance reports
  • Asset Management: Track and organize scan targets
  • Integration with SIEM: Send vulnerability data to security platforms
  • Notification Systems: Alert teams about critical vulnerabilities

Resources

License

MIT

Contributing

Contributions are welcome! Please feel free to submit issues and pull requests.

Disclaimer

This is an unofficial community node and is not affiliated with or endorsed by Tenable, Inc. Tenable and Nessus are trademarks of Tenable, Inc.