Module GRC 3 : Évaluateur de risques fournisseurs
Ceci est unAI Summarization, Multimodal AIworkflow d'automatisation du domainecontenant 7 nœuds.Utilise principalement des nœuds comme If, Set, Gmail, Webhook, GoogleSheets. Automatiser l'évaluation des risques des fournisseurs avec AI, Google Sheets et des rappels par e-mail
- •Compte Google et informations d'identification Gmail API
- •Point de terminaison HTTP Webhook (généré automatiquement par n8n)
- •Informations d'identification Google Sheets API
- •Clé API OpenAI
Nœuds utilisés (7)
Catégorie
{
"id": "G95QFaRlYK3TExyw",
"meta": {
"info": "***SANITIZED***"
},
"name": "GRC Module 3: Vendor Risk Evaluator",
"tags": [
{
"id": "7JHhy8yBIMqNfuOr",
"name": "Track Trust w Confidence",
"createdAt": "2025-08-03T03:23:33.879Z",
"updatedAt": "2025-08-03T03:23:33.879Z"
},
{
"id": "Up5UqXJa2H4Kvz97",
"name": "Auto Third-Party Risk",
"createdAt": "2025-08-03T03:22:52.354Z",
"updatedAt": "2025-08-03T03:22:52.354Z"
}
],
"nodes": [
{
"id": "f10d62c5-002a-4c21-b736-a2f19da1b593",
"name": "Nouvelle prise en charge fournisseur",
"type": "n8n-nodes-base.webhook",
"position": [
-624,
-176
],
"webhookId": "59fcd0cc-6cb4-4139-b772-30a63922eb57",
"parameters": {},
"typeVersion": 2
},
{
"id": "c612a4d1-f7f8-4fe1-8105-8292a7d9641c",
"name": "IA – Estimateur de niveau de risque",
"type": "@n8n/n8n-nodes-langchain.openAi",
"position": [
-400,
-176
],
"parameters": {},
"typeVersion": 1.8
},
{
"id": "a0d47add-6d71-453f-8014-fe2e3724ccfe",
"name": "Vérificateur de certificats – Expiration et type",
"type": "n8n-nodes-base.if",
"position": [
-48,
-176
],
"parameters": {},
"typeVersion": 2.2
},
{
"id": "46187ebf-6bd0-4df9-9067-df836e1b8db4",
"name": "Format – Fiche d'évaluation fournisseur",
"type": "n8n-nodes-base.set",
"position": [
192,
-176
],
"parameters": {},
"typeVersion": 3.4
},
{
"id": "da8246cb-9d75-4722-8d9e-c0e450e36413",
"name": "Journal – Feuille Google",
"type": "n8n-nodes-base.googleSheets",
"position": [
464,
-288
],
"parameters": {},
"typeVersion": 4.6
},
{
"id": "1f390203-81a7-469e-9066-f2e469ba4065",
"name": "Alerte – E-mail au responsable GRC",
"type": "n8n-nodes-base.gmail",
"position": [
464,
-48
],
"webhookId": "f313326c-917d-4b0e-b4fa-d37310818ecb",
"parameters": {},
"typeVersion": 2.1
},
{
"id": "eae4de31-403e-42d0-a8d2-217e7f2cfc6d",
"name": "Note adhésive",
"type": "n8n-nodes-base.stickyNote",
"position": [
800,
-368
],
"parameters": {
"content": ""
},
"typeVersion": 1
}
],
"active": false,
"pinData": {},
"settings": {
"executionOrder": "v1"
},
"versionId": "edb122ab-744a-48bf-ba81-568f3b5a5996",
"connections": {
"f10d62c5-002a-4c21-b736-a2f19da1b593": {
"main": [
[
{
"node": "c612a4d1-f7f8-4fe1-8105-8292a7d9641c",
"type": "main",
"index": 0
}
]
]
},
"da8246cb-9d75-4722-8d9e-c0e450e36413": {
"main": [
[]
]
},
"c612a4d1-f7f8-4fe1-8105-8292a7d9641c": {
"main": [
[
{
"node": "a0d47add-6d71-453f-8014-fe2e3724ccfe",
"type": "main",
"index": 0
}
]
]
},
"46187ebf-6bd0-4df9-9067-df836e1b8db4": {
"main": [
[
{
"node": "da8246cb-9d75-4722-8d9e-c0e450e36413",
"type": "main",
"index": 0
},
{
"node": "1f390203-81a7-469e-9066-f2e469ba4065",
"type": "main",
"index": 0
}
]
]
},
"a0d47add-6d71-453f-8014-fe2e3724ccfe": {
"main": [
[
{
"node": "46187ebf-6bd0-4df9-9067-df836e1b8db4",
"type": "main",
"index": 0
}
],
[
{
"node": "46187ebf-6bd0-4df9-9067-df836e1b8db4",
"type": "main",
"index": 0
}
]
]
}
}
}Comment utiliser ce workflow ?
Copiez le code de configuration JSON ci-dessus, créez un nouveau workflow dans votre instance n8n et sélectionnez "Importer depuis le JSON", collez la configuration et modifiez les paramètres d'authentification selon vos besoins.
Dans quelles scénarios ce workflow est-il adapté ?
Intermédiaire - Résumé IA, IA Multimodale
Est-ce payant ?
Ce workflow est entièrement gratuit et peut être utilisé directement. Veuillez noter que les services tiers utilisés dans le workflow (comme l'API OpenAI) peuvent nécessiter un paiement de votre part.
Workflows recommandés
Adnan Tariq
@adnantariqFounder of CYBERPULSE AI — helping security teams and SMEs eliminate repetitive tasks through modular n8n automations. I build workflows for vulnerability triage, compliance reporting, threat intel, and Red/Blue/GRC ops. Book a session if you'd like custom automation for your use case. https://linkedin.com/in/adnan-tariq-4b2a1a47
Partager ce workflow