scheduled-jobs
Fail
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes tools such as
snow_execute_script_with_outputwhich enable the execution of arbitrary server-side JavaScript on the ServiceNow platform. - [REMOTE_CODE_EXECUTION]: Through the
snow_schedule_jobtool, the skill can deploy persistent, recurring scripts to the remote ServiceNow environment, allowing for remote code execution. - [DATA_EXFILTRATION]: The provided templates demonstrate querying and processing data from sensitive tables such as
sys_userandincident. Logging or outputting these records throughgs.infoor tool results presents a risk of sensitive data exposure. - [COMMAND_EXECUTION]: Code examples include high-privilege operations such as bulk deletion of records from administrative tables (
sys_audit_delete) and the creation of jobs configured to run with system-level authority.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata