Is "SN Utils" on Firefox Add-ons Safe to Install?
Personal work of Arnoud Kooi, not affiliated to ServiceNow Current features: - Slashcommands type in /help to know more about this feature - Edit scripts and widgets in VS Code! (requires sn-scriptsync) - Show technical names: Show useful info like choice value and name next to labels. - Search updatesets in progress, view list and set current. - View your last 20 updates, browse to related record. (Admin role only) - Node switching. - Search tables and open list, dictionary or schema map. - View the data and columns of the current record in a table (similair to view XML) - Select a (abstract) username, view details of user. - Provide (context aware) links to relevant places. - Ability to popin, popout, or copy a tab. (also via context menu) - Generate GlideRecord template, based on list - Save record with CTRL-S / CMD-S - Rightclick to go to Scriptinclude, table or search - Paste a clipboard image to any record with CTRL-V / CMD-V - CMD / CTRL Click in a form on element labels, to build conditions and open list - Support for Studio - Context menu code snippets and links There are no assets required on your instances.
Risk Assessment
Pending0 security findings detected across all analyzers
Firefox extension requesting 8 permissions
No Threats Detected
This extension passed all security checks
About This Extension
No Findings
All security checks passed
AI Security Report
AI Security Analysis: SN Utils
Analysis generated: 2025-12-11T20:59:49+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 015c1d40-2daa-56b2-8c36-8f551395308d |
| Type | firefox |
| Version | |
| Users | 2699 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The Firefox extension "SN Utils" presents a CRITICAL security risk, receiving a maximum risk score of 100/100. Automated analysis has identified 270 high-severity indicators consistent with malware behavior, including obfuscation, system command execution, and unauthorized file manipulation. While this extension is a known developer tool for ServiceNow, the unverified publisher status combined with these aggressive malware signatures suggests a high probability of a compromised version or the inclusion of highly unsafe libraries. Immediate suspension of use is recommended pending manual code review.
Threat Assessment
The security posture of this extension is currently extremely poor based on static analysis. The threats fall into three primary categories:
Potential Remote Code Execution (RCE):
The presence ofpostinstall_system_commandandpostinstall_file_downloadsignatures is highly alarming. In a browser environment, extensions are sandboxed, but these signatures often indicate code attempting to break out of the sandbox or interact with the underlying operating system via Native Messaging hosts or vulnerabilities.Obfuscation and Evasion:
Multiplepostinstall_obfuscationfindings indicate the code is intentionally hidden. While legitimate developers sometimes minify code for performance, obfuscation that triggers malware rules usually involves packing techniques used to hide malicious payloads.Unsafe Coding Practices:
The use ofeval()(NoUseEval) allows for the execution of arbitrary strings as code, a primary vector for Cross-Site Scripting (XSS) attacks. Additionally,DebuggerStatementsShouldNotBeUsedsuggests the release of development-stage code, which often lacks security hardening.
Contextual Note: The prevalence of "postinstall" YARA rule matches suggests this extension may bundle npm packages that contain server-side installation scripts. While these scripts may not execute automatically in a browser context, their presence indicates a lack of code hygiene and increases the attack surface significantly.
Risk Justification
The 100/100 Risk Score is justified and accurate based on the following factors:
- Severity of Findings: The analysis flagged 270 HIGH severity issues. Even a single confirmed instance of
postinstall_system_commandwould warrant a critical rating. - Malware Indicators: The system explicitly flagged
Malware Indicators: true. - Publisher Trust: The publisher is unverified (
Verified Publisher: false) with a Trust Score of 0/100. This lack of identity verification makes it difficult to hold the developer accountable for malicious updates. - Volume of IOCs: Over 4,000 Indicators of Compromise (IOCs) were detected, suggesting the extension interacts with a vast network of domains or IPs, which is unusual for a simple utility.
Key Findings
- System Command Execution (
postinstall_system_command): Multiple instances of code attempting to execute system-level commands. This is the highest risk indicator for potential malware. - Obfuscated Code (
postinstall_obfuscation): Significant portions of the code are obfuscated, preventing easy analysis and potentially hiding malicious logic. - Dynamic Code Execution (
NoUseEval): The extension uses theeval()function, which bypasses standard security protections and creates a high risk of XSS if the extension processes external input. - File Manipulation & Download (
postinstall_file_manipulation,postinstall_file_download): The code contains logic to download and modify files, behavior typical of "dropper" malware. - Insecure Storage (
LocalStorageShouldNotBeUsed): The extension likely stores sensitive data (potentially ServiceNow session tokens) in LocalStorage, which is accessible to other scripts on the same domain and not encrypted at rest.
Recommendations
- Immediate Block: Blacklist the extension UUID (
015c1d40-2daa-56b2-8c36-8f551395308d) across the organization immediately. - Incident Response: If this extension is widely installed, initiate a threat hunt to check for unusual network traffic or file system changes on endpoints where it was active.
- Manual Review: A security engineer must manually review the source code (specifically the
manifest.jsonand background scripts) to determine if the "postinstall" scripts are inert artifacts from bundled libraries or active malicious payloads. - Contact Developer: Attempt to contact the developer (Arnoud Kooi) through official channels (GitHub/LinkedIn) to verify if this specific version/UUID is legitimate or a copycat.
Mitigation Strategies
If business requirements strictly mandate the use of this specific tool before a clean version can be verified:
- Network Isolation: Configure the browser or host firewall to restrict the extension's communication only to the organization's specific ServiceNow instance domains. Block all other outbound traffic from the browser if possible.
- Dedicated Browser Profile: Require users to install this extension only in a dedicated browser profile used exclusively for ServiceNow development, ensuring it cannot access data from email, banking, or other SaaS tools.
- Disable Automatic Updates: If a "clean" version is identified, pin the version and disable automatic updates to prevent a supply-chain attack via a malicious update.
Confidence Assessment
Confidence Level: 80%
While the risk score is 100, the confidence is rated at 80% due to the nature of the YARA matches. The prefix postinstall_ strongly suggests these rules are designed to catch malicious npm packages. It is highly probable that the developer bundled a large node module library without cleaning it, triggering these rules on files that may be inert in a browser context (False Positives). However, until manual review confirms these files are unreachable/unexecutable, the extension must be treated as malicious.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace