Is "SN Utils" on Firefox Add-ons Safe to Install?

Arnoud Kooi · firefox · v9.1.1.2

Personal work of Arnoud Kooi, not affiliated to ServiceNow Current features: - Slashcommands type in /help to know more about this feature - Edit scripts and widgets in VS Code! (requires sn-scriptsync) - Show technical names: Show useful info like choice value and name next to labels. - Search updatesets in progress, view list and set current. - View your last 20 updates, browse to related record. (Admin role only) - Node switching. - Search tables and open list, dictionary or schema map. - View the data and columns of the current record in a table (similair to view XML) - Select a (abstract) username, view details of user. - Provide (context aware) links to relevant places. - Ability to popin, popout, or copy a tab. (also via context menu) - Generate GlideRecord template, based on list - Save record with CTRL-S / CMD-S - Rightclick to go to Scriptinclude, table or search - Paste a clipboard image to any record with CTRL-V / CMD-V - CMD / CTRL Click in a form on element labels, to build conditions and open list - Support for Studio - Context menu code snippets and links There are no assets required on your instances.

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

Firefox extension requesting 8 permissions

No Threats Detected

This extension passed all security checks

About This Extension

Personal work of Arnoud Kooi, not affiliated to ServiceNow Current features: - Slashcommands type in /help to know more about this feature - Edit scripts and widgets in VS Code! (requires sn-scriptsync) - Show technical names: Show useful info like choice value and name next to labels. - Search updatesets in progress, view list and set current. - View your last 20 updates, browse to related record. (Admin role only) - Node switching. - Search tables and open list, dictionary or schema map. - View the data and columns of the current record in a table (similair to view XML) - Select a (abstract) username, view details of user. - Provide (context aware) links to relevant places. - Ability to popin, popout, or copy a tab. (also via context menu) - Generate GlideRecord template, based on list - Save record with CTRL-S / CMD-S - Rightclick to go to Scriptinclude, table or search - Paste a clipboard image to any record with CTRL-V / CMD-V - CMD / CTRL Click in a form on element labels, to build conditions and open list - Support for Studio - Context menu code snippets and links There are no assets required on your instances.

No Findings

All security checks passed

AI Security Report

AI Security Analysis: SN Utils

Analysis generated: 2025-12-11T20:59:49+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 015c1d40-2daa-56b2-8c36-8f551395308d
Type firefox
Version
Users 2699
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The Firefox extension "SN Utils" presents a CRITICAL security risk, receiving a maximum risk score of 100/100. Automated analysis has identified 270 high-severity indicators consistent with malware behavior, including obfuscation, system command execution, and unauthorized file manipulation. While this extension is a known developer tool for ServiceNow, the unverified publisher status combined with these aggressive malware signatures suggests a high probability of a compromised version or the inclusion of highly unsafe libraries. Immediate suspension of use is recommended pending manual code review.

Threat Assessment

The security posture of this extension is currently extremely poor based on static analysis. The threats fall into three primary categories:

  1. Potential Remote Code Execution (RCE):
    The presence of postinstall_system_command and postinstall_file_download signatures is highly alarming. In a browser environment, extensions are sandboxed, but these signatures often indicate code attempting to break out of the sandbox or interact with the underlying operating system via Native Messaging hosts or vulnerabilities.

  2. Obfuscation and Evasion:
    Multiple postinstall_obfuscation findings indicate the code is intentionally hidden. While legitimate developers sometimes minify code for performance, obfuscation that triggers malware rules usually involves packing techniques used to hide malicious payloads.

  3. Unsafe Coding Practices:
    The use of eval() (NoUseEval) allows for the execution of arbitrary strings as code, a primary vector for Cross-Site Scripting (XSS) attacks. Additionally, DebuggerStatementsShouldNotBeUsed suggests the release of development-stage code, which often lacks security hardening.

Contextual Note: The prevalence of "postinstall" YARA rule matches suggests this extension may bundle npm packages that contain server-side installation scripts. While these scripts may not execute automatically in a browser context, their presence indicates a lack of code hygiene and increases the attack surface significantly.

Risk Justification

The 100/100 Risk Score is justified and accurate based on the following factors:

  • Severity of Findings: The analysis flagged 270 HIGH severity issues. Even a single confirmed instance of postinstall_system_command would warrant a critical rating.
  • Malware Indicators: The system explicitly flagged Malware Indicators: true.
  • Publisher Trust: The publisher is unverified (Verified Publisher: false) with a Trust Score of 0/100. This lack of identity verification makes it difficult to hold the developer accountable for malicious updates.
  • Volume of IOCs: Over 4,000 Indicators of Compromise (IOCs) were detected, suggesting the extension interacts with a vast network of domains or IPs, which is unusual for a simple utility.

Key Findings

  • System Command Execution (postinstall_system_command): Multiple instances of code attempting to execute system-level commands. This is the highest risk indicator for potential malware.
  • Obfuscated Code (postinstall_obfuscation): Significant portions of the code are obfuscated, preventing easy analysis and potentially hiding malicious logic.
  • Dynamic Code Execution (NoUseEval): The extension uses the eval() function, which bypasses standard security protections and creates a high risk of XSS if the extension processes external input.
  • File Manipulation & Download (postinstall_file_manipulation, postinstall_file_download): The code contains logic to download and modify files, behavior typical of "dropper" malware.
  • Insecure Storage (LocalStorageShouldNotBeUsed): The extension likely stores sensitive data (potentially ServiceNow session tokens) in LocalStorage, which is accessible to other scripts on the same domain and not encrypted at rest.

Recommendations

  1. Immediate Block: Blacklist the extension UUID (015c1d40-2daa-56b2-8c36-8f551395308d) across the organization immediately.
  2. Incident Response: If this extension is widely installed, initiate a threat hunt to check for unusual network traffic or file system changes on endpoints where it was active.
  3. Manual Review: A security engineer must manually review the source code (specifically the manifest.json and background scripts) to determine if the "postinstall" scripts are inert artifacts from bundled libraries or active malicious payloads.
  4. Contact Developer: Attempt to contact the developer (Arnoud Kooi) through official channels (GitHub/LinkedIn) to verify if this specific version/UUID is legitimate or a copycat.

Mitigation Strategies

If business requirements strictly mandate the use of this specific tool before a clean version can be verified:

  1. Network Isolation: Configure the browser or host firewall to restrict the extension's communication only to the organization's specific ServiceNow instance domains. Block all other outbound traffic from the browser if possible.
  2. Dedicated Browser Profile: Require users to install this extension only in a dedicated browser profile used exclusively for ServiceNow development, ensuring it cannot access data from email, banking, or other SaaS tools.
  3. Disable Automatic Updates: If a "clean" version is identified, pin the version and disable automatic updates to prevent a supply-chain attack via a malicious update.

Confidence Assessment

Confidence Level: 80%

While the risk score is 100, the confidence is rated at 80% due to the nature of the YARA matches. The prefix postinstall_ strongly suggests these rules are designed to catch malicious npm packages. It is highly probable that the developer bundled a large node module library without cleaning it, triggering these rules on files that may be inert in a browser context (False Positives). However, until manual review confirms these files are unreachable/unexecutable, the extension must be treated as malicious.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions