<p>This week on <strong>Ship It Weekly</strong>, the theme is simple: the automation layer has become a control plane, and that changes how you should think about risk.</p><p>We start with n8n’s latest critical vulnerability, CVE-2026-21877. This one is different from the unauth “Ni8mare” issue we covered in Episode 12. It’s authenticated RCE, which means the real question isn’t only “is it internet exposed,” it’s who can log in, who can create or modify workflows, and what those workflows can reach. Takeaway: treat workflow automation tools like CI systems. They run code, they hold credentials, and they can pivot into real infrastructure.</p><p>Next is GitHub’s new fine-grained permission for artifact metadata. Small change, big least-privilege implications for Actions workflows. It’s also a good forcing function to clean up permission sprawl across repos.</p><p>Third is AWS’s DevOps Agent story, and the best part is that it’s not hype. It’s a real look at what it takes to operationalize agents: evaluation, observability into tool calls/decisions, and control loops with brakes and approvals. Prototype is cheap. Reliability is the work.</p><p>Lightning round: GitHub secret scanning changes that can quietly impact governance, a punchy Claude Code “guardrails aren’t guaranteed” reminder, Block’s Goose as another example of agent workflows getting productized, and OpenCode as an “agent runner” pattern worth watching if you’re experimenting locally.</p><p><strong>Links</strong></p><p>n8n CVE-2026-21877 (authenticated RCE) <a target="_blank" rel="noopener noreferrer nofollow" href="https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html?m=1">https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html?m=1</a></p><p>Episode 12 (n8n “Ni8mare” / CVE-2026-21858) <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.tellerstech.com/ship-it-weekly/n8n-critical-cve-cve-2026-21858-aws-gpu-capacity-blocks-price-hike-netflix-temporal/">https://www.tellerstech.com/ship-it-weekly/n8n-critical-cve-cve-2026-21858-aws-gpu-capacity-blocks-price-hike-netflix-temporal/</a></p><p>GitHub: fine-grained permission for artifact metadata (GA) <a target="_blank" rel="noopener noreferrer nofollow" href="https://github.blog/changelog/2026-01-13-new-fine-grained-permission-for-artifact-metadata-is-now-generally-available/">https://github.blog/changelog/2026-01-13-new-fine-grained-permission-for-artifact-metadata-is-now-generally-available/</a></p><p>GitHub secret scanning: extended metadata auto-enabled (Feb 18) <a target="_blank" rel="noopener noreferrer nofollow" href="https://github.blog/changelog/2026-01-15-secret-scanning-extended-metadata-to-be-automatically-enabled-for-certain-repositories/">https://github.blog/changelog/2026-01-15-secret-scanning-extended-metadata-to-be-automatically-enabled-for-certain-repositories/</a></p><p>Claude Code issue thread (Bedrock guardrails gap) <a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/anthropics/claude-code/issues/17118">https://github.com/anthropics/claude-code/issues/17118</a></p><p>Block Goose (tutorial + sessions/context) <a target="_blank" rel="noopener noreferrer nofollow" href="https://block.github.io/goose/docs/tutorials/rpi">https://block.github.io/goose/docs/tutorials/rpi</a> <a target="_blank" rel="noopener noreferrer nofollow" href="https://block.github.io/goose/docs/guides/sessions/smart-context-management">https://block.github.io/goose/docs/guides/sessions/smart-context-management</a></p><p>OpenCode <a target="_blank" rel="noopener noreferrer nofollow" href="https://opencode.ai/">https://opencode.ai</a></p><p>More episodes + details: <a target="_blank" rel="noopener noreferrer nofollow" href="https://shipitweekly.fm">https://shipitweekly.fm</a></p>