batch-operations

Pass

Audited by Gen Agent Trust Hub on Apr 29, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [SAFE]: The skill instructions and provided JavaScript snippets are standard for ServiceNow administration and data management. The author Happy Technologies LLC provides boilerplate code for common tasks like bulk record creation and archiving.
  • [COMMAND_EXECUTION]: The skill utilizes the tool SN-Execute-Background-Script to perform server-side operations on the ServiceNow instance. This capability is used here for legitimate administrative purposes such as memory-efficient record processing and error-handled batch updates.
  • [PROMPT_INJECTION]: The skill identifies a surface for indirect prompt injection (Category 8) as it processes data from external tables that could potentially contain untrusted input. * Ingestion points: Data is read from ServiceNow tables such as 'incident', 'sys_user', and 'cmdb_ci' (SKILL.md). * Boundary markers: No specific delimiters or instructions to ignore embedded content are used in the processing scripts. * Capability inventory: Includes SN-Execute-Background-Script for server-side code execution and SN-Batch-Update for record modification. * Sanitization: The scripts focus on field mapping and lack explicit sanitization for string-based data inputs.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 29, 2026, 04:36 PM