Level up your subitems automation without limits! ⚡
Subitems can be tricky to automate, but they’re crucial for complex workflows. This app makes automating them simple.
✨ An ever-growing collection of powerful automations designed to handle even the most sophisticated subitem workflows — with no usage limits on any plan! Automate your subitems and boost your productivity to the next level.
⚡ Available Automations:
✅ Formula column automations — automate your items and subitems formula columns!
✅ Mirrorcolumn automations — automate your items and subitems mirror columns!
✅ Delete or archive subitems when the parent item's status changes
✅ Link item to subitem connected boards column
✅ Update parent status based on whether all/some/none of the subitems have a selected status
✅ Change status for all subitems based on parent status
✅ Copy parent column values to all subitems
✅ Dynamically create subitems based on number column saved in item
✅ Rename subitem to dynamic name based on parent column values
✅ Prefix or suffix subitem name with dynamic name based on parent column values
✅ … and more!
💡 Need a custom automation?
Can’t find the right automation for your workflow? We can build it for you! Simply submit a request via our form Request subitems automation or contact us.
Workflow Boost strives to provide the highest-quality customer experience. If you have any questions or feedback, please email us at [email protected]. We’d love to hear from you!
Security & Compliance
Security
Does the developer periodically perform penetration testing?
No
In house testing
Does the developer have a dedicated security and privacy point of contact for such issues or questions?
Does the app restrict redirects and forwards only to approved destinations, or show a warning when redirecting to potentially untrusted content?
Yes
N/A - the app doesn't redirect the user
Does the app protect against mass parameter assignment attacks?
Yes
All input data is validated, and all endpoints interpret only whitelisted parameters.
Does the app perform encoding and sanitization on all user supplied parameters to protect against Cross-Site Scripting?
Yes
Input data is sanitized.
Does the developer protect all state-changing actions against Cross-Site Request Forgery (CSRF)?
Yes
Does the developer have mechanisms to notify monday.com in case of a security breach?
Yes
Upon discovering a security breach, monday.com support team would be notified.
Does this developer have a process for installing application-level updates and security patches for the service (such as software packages and databases)?
Yes
The application is periodically reviewed to identify security issues with external dependencies. Upon discovery, fixes are applied and released.
Compliance
Is the app certified with the information security standard ISO/IEC 27001:2022?
Not answered
Is the app compliant with the Health Insurance Portability and Accountability Act (HIPAA)?
No
N/A - the application doesn't store any user health information.
Is the app certified with System and Organization Controls (SOC 2 or SOC 3)?
No
We are not independently SOC-certified, but we follow industry best practices for security, privacy, and data protection. All code is hosted on monday code, which is SOC 2 certified.
Is the app compliant with the General Data Protection Regulation (GDPR)?
Yes
Data
Does the app send any data outside of monday.com? If yes, indicate whether the data is customer-submitted (e.g., board names, item names, doc content) or non-customer-submitted (e.g., account ID, board ID, user ID).
No
All outgoing communication from the app is blocked with monday networking feature.
Where does the app store logs data?
monday
Where does the app store the app data?
monday
Does the developer ensure application logs do not contain secrets or personally-identifiable information (PII)?
Yes
Every new log is reviewed to identify potential secrets or sensitive personal information (PII). We proactively remove sensitive information from our application logs upon discovery.
Is customer data segregated from the data of other customers (for example logically or physically)?
Yes
Yes, data lives in each customer monday.com instance.
Privacy
Does the developer enforce multi-factor authentication on employees access to systems which may process customer data?
Yes
Multi-factor authentication is enforced to access all systems that contain customer data.
Does the developer protect access to customer data based on the principle of least privilege?
Yes
Only the CEO can access logs and subscription details.
Reviews
May 1, 2025
TS: This app is a real time saver for our business. And the team behind it are really proactive and quick to help when needed. We are happy to have found this.
Installation history
We have data for December 28, 2024 onwards only. Collected sometime after 00:00 UTC daily.