No-Code Automation Security Risks You're Probably Ignoring
Nobody gets into no-code automation thinking about security. You’re thinking about efficiency — “I need this form to create a record in my CRM and send an email automatically.” The tool makes it easy. You connect your accounts, authorise some permissions, and it works. Brilliant.
But somewhere between connecting your third and tenth integration, you’ve created a security posture that would make any IT professional wince. Your CRM credentials are stored on Zapier’s servers. Your accounting data flows through Make’s infrastructure in the US. An intern who left six months ago still has admin access to your Airtable base. And nobody has any idea which automations are touching which data.
This isn’t theoretical risk. These are the specific, practical security problems hiding in most no-code setups — and what you should actually do about them.
Your API Keys Are Stored on Someone Else’s Servers
Every time you connect a tool in Zapier, Make, or any automation platform, you’re handing over your credentials. An OAuth token, an API key, sometimes a username and password. The automation platform stores these credentials so it can act on your behalf.
This means your security is now dependent on the security of every platform in your stack. If Zapier gets breached, attackers potentially have access to every system you’ve connected — CRM, accounting, email, file storage, e-commerce. Not because you did anything wrong, but because your credentials are stored in a third-party system you don’t control.
How real is this risk? Zapier and Make are reputable companies with serious security teams. But no company is immune. And the more platforms storing your credentials, the larger your attack surface. If you’ve connected 10 tools through Zapier and 5 through Make, your credentials are stored in at least 17 different systems (the 15 tools plus both automation platforms).
Over-Permissioned Integrations
When you connect a tool to Zapier or Make, it typically requests broad permissions. Connect your Google Workspace account and it might ask for access to all your Drive files, all your Gmail, all your Calendar — even if your automation only needs to read one specific spreadsheet.
This is the principle of least privilege turned upside down. Instead of granting the minimum access needed, you grant maximum access because that’s what the OAuth flow requests.
The problem compounds across integrations. If you’ve connected:
- Google Workspace (all files, all email, all calendar)
- Xero (all financial data, all contacts)
- HubSpot (all deals, all contacts, all communications)
- Slack (all channels, all messages)
Your automation platform has god-mode access to your entire digital business. The automation itself might only use a fraction of that access, but the permissions are there. If any link in the chain is compromised, the blast radius is enormous.
Your Data Is Flowing Through Third-Party Servers
When Zapier moves data from your CRM to your accounting software, that data passes through Zapier’s servers. Customer names, email addresses, invoice amounts, order details — all of it transits through (and is temporarily stored on) infrastructure you don’t control.
For most businesses, this is fine in practice. Zapier and Make encrypt data in transit and at rest, and they have SOC 2 compliance and other certifications. But for businesses in regulated industries or handling sensitive data, this matters:
- Healthcare businesses handling patient information may be violating privacy obligations by routing data through US-based servers
- Financial services with client data passing through third-party automation platforms may breach compliance requirements
- Legal firms with privileged client information flowing through middleware could face professional conduct issues
- Any Australian business subject to the Privacy Act needs to consider whether their data handling practices align with the Australian Privacy Principles, particularly around cross-border data flows
No Audit Trail Worth the Name
In a properly built system, you can answer questions like: “Who changed this customer’s credit limit from $10,000 to $50,000, and when?” “Which automation updated this invoice amount?” “What data was sent to our accounting system on March 15th?”
In most no-code setups, you can’t answer any of these. Here’s what you get instead:
- Zapier task history — shows that a Zap ran, with input/output data, but only retains this for 7-30 days depending on your plan. After that, it’s gone.
- Make scenario logs — more detailed than Zapier, but also time-limited and not designed for compliance-grade auditing
- No cross-platform trail — if data moves from HubSpot through Zapier to Xero, there’s no single place to see the complete journey of a record. You’d need to check logs in three different systems and correlate timestamps manually.
- No tamper-proof records — automation logs can be deleted, and there’s no guarantee that what the log shows is what actually happened if the automation modified data before passing it on
For a small business with straightforward operations, this lack of audit trail is an inconvenience. For a business handling financial data, customer PII, or regulated information, it’s a compliance gap.
Shadow Automation: The Risks You Don’t Know About
Here’s a security problem that’s almost impossible to prevent with no-code tools: shadow automation. It’s the automation equivalent of shadow IT.
Anyone in your business with a Zapier or Make account can connect any tool they have access to and start moving data around. The marketing coordinator connects HubSpot to a personal Gmail account to forward leads. A sales rep connects the CRM to a Google Sheet they share with a friend at another company. An intern builds a Zap that copies customer data to a Notion workspace on their personal account.
None of these are malicious. They’re all well-intentioned productivity hacks. But they all represent data leaving your controlled systems through channels you don’t know about, governed by permissions you didn’t grant, flowing to destinations you can’t audit.
In a traditional IT environment, this is controlled through device management, network policies, and access controls. In a no-code environment where anyone can sign up for a Zapier account and connect it to your business tools with their own login, these controls don’t exist.
What You Should Actually Do About It
Total security is impossible and the pursuit of it is paralysing. Here’s what’s practical:
Immediate Actions (This Week)
-
Audit your connections. Log into every automation platform your business uses and review every connected account. Remove any that are unused, belong to former employees, or connect to tools you no longer use.
-
Check who has access. Review user lists on Zapier, Make, Airtable, and any other no-code platform. Remove former employees and contractors. Downgrade permissions for anyone who doesn’t need admin access.
-
Document your automations. Create a simple register: what each automation does, what data it touches, and who built it. If nobody can explain what an automation does, that’s a red flag.
Medium-Term Actions (This Quarter)
-
Use restricted API keys where possible instead of full OAuth connections.
-
Centralise automation ownership. Designate one person or team responsible for all automations. No more individual Zapier accounts — one business account with oversight.
-
Evaluate data residency. If you’re in a regulated industry or handling sensitive data, understand where your data is actually being stored and processed. Check whether your automation platforms offer data residency options.
Strategic Actions (This Year)
- Move critical automations in-house. The automations handling your most sensitive data — customer financials, health records, employee information — should run on infrastructure you control. Keep the low-sensitivity automations (Slack notifications, calendar syncing) on Zapier or Make where the convenience outweighs the risk.
Typical No-Code Security
- ✕ Credentials stored on third-party servers
- ✕ Over-permissioned OAuth connections
- ✕ Data transiting through US infrastructure
- ✕ Limited, time-expiring audit logs
- ✕ No control over shadow automations
- ✕ Compliance gaps in regulated industries
Purpose-Built Integrations
- ✓ Credentials managed in your own vault
- ✓ Scoped permissions matching actual needs
- ✓ Data stays on your own infrastructure
- ✓ Full audit trail with field-level tracking
- ✓ Centralised, governed integration layer
- ✓ Compliance-ready data handling
The Bottom Line
No-code tools aren’t inherently insecure. Zapier, Make, Airtable — they all invest heavily in security. The risk isn’t that these platforms are poorly built. The risk is that they make it easy to create a sprawling, ungoverned web of connections that nobody fully understands, with data flowing through paths that nobody monitors, governed by permissions that nobody reviews.
For a small business with straightforward needs and no regulatory requirements, the practical risk is low and the convenience is worth it. Tidy up your connections, remove old accounts, and you’re probably fine.
For a growing business handling sensitive data, operating in a regulated industry, or simply reaching the scale where a security incident would cause real damage — it’s time to think about which automations deserve proper security, and which are fine where they are. The answer is rarely “move everything” or “leave everything.” It’s usually a thoughtful split between convenience and control.
Aaron
Founder, Automation Solutions
Building custom software for businesses that have outgrown their spreadsheets and off-the-shelf tools.
Keep Reading
Why Zapier Breaks at Scale
Zapier is perfect for simple automations — until you have 50 Zaps, a $750/month bill, and errors you can't debug. Here's where the breaking point hits.
No-Code vs Custom Software: When to Switch
An honest decision framework for choosing between no-code tools and custom software. When each makes sense, based on complexity, scale, and ROI.
Make vs Zapier: Which Automation Tool Is Better?
An honest comparison of Make and Zapier — pricing, complexity, reliability, and the scenarios where each wins. Plus when neither is enough.