ServiceNow Agent

PassAudited by ClawScan on May 10, 2026.

Overview

This appears to be a disclosed read-only ServiceNow CLI, but it uses ServiceNow credentials and can read broad ticket, attachment, and history data.

Before installing, make sure you are comfortable giving this skill read access to ServiceNow through a least-privilege account. Configure only the intended ServiceNow HTTPS domain, keep query limits and returned fields small, avoid broad attachment/history reads unless needed, and ignore any non-GET endpoints present in the reference YAML files.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If installed with a highly privileged ServiceNow account, the agent could retrieve sensitive records, comments, attachments, or catalog data within that account's permissions.

Why it was flagged

The CLI sends ServiceNow Basic Auth credentials with API requests. This is purpose-aligned, but the credential can expose whatever ServiceNow data that account is allowed to read.

Skill content
const auth = Buffer.from(`${username}:${password}`).toString('base64'); ... 'Authorization': `Basic ${auth}`,
Recommendation

Use a least-privilege read-only ServiceNow account, document the credential requirement in registry metadata, and ensure the configured domain uses HTTPS.

What this means

Large or broad queries could place sensitive ServiceNow records or attachment contents into the agent's working context.

Why it was flagged

The skill exposes broad read operations across ServiceNow tables, batches, attachments, and ticket history. This matches the advertised read-only purpose, but the scope can include sensitive enterprise data.

Skill content
- list table lists records from a table
- batch file.json runs multiple read requests in one call
- attach reads attachments and file content
- history table sys_id reads full comment and work note timeline
Recommendation

Keep sysparm_limit and sysparm_fields narrow, query only necessary tables and records, and avoid running broad batch reads unless the user explicitly asks.

What this means

An agent or user relying on the raw reference files instead of the skill instructions could notice write endpoints that are outside the skill's intended scope.

Why it was flagged

The bundled API reference includes mutating Table API endpoints even though SKILL.md instructs GET-only use. The visible CLI code and instructions appear read-only, so this is an instruction-scope note rather than evidence of mutation behavior.

Skill content
post:
  description: "Create a record" ... put:
  description: "Modify a record" ... delete:
  description: "Delete a record"
Recommendation

Use only the bundled read-only CLI commands and GET endpoints; do not add or invoke POST, PUT, PATCH, or DELETE workflows for this skill.

What this means

Users have less independent context for who maintains the skill and where to verify updates.

Why it was flagged

The registry information does not provide an upstream source or homepage, limiting provenance checks before installation.

Skill content
Source: unknown
Homepage: none
Recommendation

Review the bundled cli.mjs before use, install only from trusted publishers, and prefer a skill version with a verifiable source repository.