deployment-workflow
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill utilizes the
SN-Execute-Background-Scripttool to run arbitrary JavaScript on ServiceNow instances for validation (Step 1.2), checking retrieval status (Step 2.3), bulk resolving conflicts (Step 4.3), and rollback planning (Step 7.2). While these specific implementations are benign and follow administrative best practices, the tool itself provides a high-privilege remote execution surface. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes untrusted data from ServiceNow environment records.
- Ingestion points: Data is ingested through
SN-Query-TableandSN-Inspect-Update-Setin Step 1.1, Step 3.2, and Phase 6, where the agent reads update set payloads, logs, and preview problems. - Boundary markers: The instructions lack delimiters or explicit 'ignore instructions' warnings when handling content from retrieved ServiceNow records.
- Capability inventory: The agent has extensive capabilities, including server-side script execution (
SN-Execute-Background-Script), record creation (SN-Create-Record), and record updates (SN-Update-Record). - Sanitization: There is no evidence of sanitization or filtering applied to the data retrieved from the
sys_update_xmlorsyslogtables before the agent acts upon it.
Audit Metadata