ServiceNow에서 취약점 추출 및 생성
이것은SecOps, Multimodal AI분야의자동화 워크플로우로, 6개의 노드를 포함합니다.주로 SplitOut, ServiceNow, HttpRequest, ScheduleTrigger, LmChatOpenAi 등의 노드를 사용하며. OpenAI 처리를 사용한 CVE 모니터링 자동화 및 ServiceNow 보안 인시던트 생성
- •대상 API의 인증 정보가 필요할 수 있음
- •OpenAI API Key
{
"id": "VSUVQ0IMSqJG3w9T",
"meta": {
"instanceId": "6004a16b59a95da573dfac2b89c29cb3d5d09e00386053659b2f24878624b8d6",
"templateId": "2552",
"templateCredsSetupCompleted": true
},
"name": "Extract and Create Vulnerabilities in ServiceNow",
"tags": [],
"nodes": [
{
"id": "e0583472-a450-4582-83bc-84a014bea543",
"name": "분할",
"type": "n8n-nodes-base.splitOut",
"position": [
2144,
448
],
"parameters": {
"include": "selectedOtherFields",
"options": {
"destinationFieldName": "body"
},
"fieldToSplitOut": "output.results",
"fieldsToInclude": "pubStartDate,pubEndDate,cveId,cvssV2Severity,Description"
},
"typeVersion": 1
},
{
"id": "a63c3ab3-6aab-43b2-8af6-8b00e24e0ee6",
"name": "OpenAI 채팅 모델",
"type": "@n8n/n8n-nodes-langchain.lmChatOpenAi",
"position": [
1808,
624
],
"parameters": {
"options": {}
},
"credentials": {
"openAiApi": {
"id": "ppNn03FE7vbsyINF",
"name": "n8n free OpenAI API credits"
}
},
"typeVersion": 1
},
{
"id": "40326966-0c46-4df2-8d80-fa014e05b693",
"name": "정보 추출기",
"type": "@n8n/n8n-nodes-langchain.informationExtractor",
"position": [
1760,
448
],
"parameters": {
"text": "={{$json.data}}",
"options": {
"systemPromptTemplate": "You are an expert data extraction algorithm.\nYour task is to read any given text and extract only the relevant information for NVD CVE API search parameters.\n\nOutput format: Always return a single JSON object called \"results\".\nObject structure: The object may include only the following keys, matching their expected formats:\nstartIndex (integer, ≥ 0)\nresultsPerPage (integer, 1–2000)\npubStartDate (string, ISO 8601 date-time)\npubEndDate (string, ISO 8601 date-time)\nmodStartDate (string, ISO 8601 date-time)\nmodEndDate (string, ISO 8601 date-time)\ncvssV2Severity (string, one of: \"LOW\", \"MEDIUM\", \"HIGH\")\ncvssV3Severity (string, one of: \"LOW\", \"MEDIUM\", \"HIGH\", \"CRITICAL\")\nkeywordSearch (string)\ncpeName (string)\ncpeMatchString (string)\nhasCertAlerts (boolean)\nhasCertNotes (boolean)\nhasKev (boolean)\nisVulnerable (boolean)\ncveId (string, pattern: )\nDescription(string)\nIf you cannot find a value for a given attribute, omit that attribute.\nDo not include extra keys or commentary."
},
"schemaType": "manual",
"inputSchema": "{\n \"results\": {\n \"startIndex\": 0,\n \"resultsPerPage\": 10,\n \"pubStartDate\": \"1988-10-01T04:00:00.000Z\",\n \"pubEndDate\": \"1990-10-03T04:00:00.000Z\",\n \"modStartDate\": \"2025-04-03T01:03:51.193Z\",\n \"modEndDate\": \"2025-04-03T01:03:51.193Z\",\n \"cvssV2Severity\": \"HIGH\",\n \"cveId\": \"CVE-1999-0095\",\n \"cpeName\": \"cpe:2.3:a:eric_allman:sendmail:5.58:*:*:*:*:*:*:*\",\n \"cpeMatchString\": \"cpe:2.3:a:eric_allman:sendmail:5.58:*:*:*:*:*:*:*\",\n \"isVulnerable\": true,\n \"hasCertAlerts\": false,\n \"hasCertNotes\": true,\n \"hasKev\": false,\n \"cvssV3Severity\": \"HIGH\",\n \"keywordSearch\": \"sendmail\",\n \"description\":\"String\"\n }\n}\n"
},
"typeVersion": 1
},
{
"id": "8ddca560-8da7-4090-b865-0523f95ca463",
"name": "Jina 페치",
"type": "n8n-nodes-base.httpRequest",
"position": [
1520,
448
],
"parameters": {
"url": "https://r.jina.ai/https://services.nvd.nist.gov/rest/json/cves/2.0/?resultsPerPage=10",
"options": {
"allowUnauthorizedCerts": true
}
},
"typeVersion": 4.1
},
{
"id": "a18d7899-1e0c-49c7-83e9-04f26f695f66",
"name": "인시던트 생성",
"type": "n8n-nodes-base.serviceNow",
"position": [
2400,
448
],
"parameters": {
"resource": "incident",
"operation": "create",
"authentication": "basicAuth",
"additionalFields": {
"description": "=First Published on : {{$('Split Out').item.json.body.pubStartDate }}\nLast Published on : {{$('Split Out').item.json.body.pubEndDate }}\nSeverity : {{$('Split Out').item.json.body.cvssV2Severity }}\nCVEID : {{$('Split Out').item.json.body.cveId }}\nMatching String: {{$('Split Out').item.json.body.cpeMatchString }}"
},
"short_description": "={{ $json.body.description }}"
},
"credentials": {
"serviceNowBasicApi": {
"id": "keHrNdS7cHG3Tr0X",
"name": "ServiceNow Basic Auth account 2"
}
},
"typeVersion": 1
},
{
"id": "e7f1f9c0-63a2-4d4a-88cb-e089ea25d823",
"name": "스케줄 트리거",
"type": "n8n-nodes-base.scheduleTrigger",
"position": [
1056,
448
],
"parameters": {
"rule": {
"interval": [
{
"triggerAtHour": 7
}
]
}
},
"typeVersion": 1.2
}
],
"active": false,
"pinData": {},
"settings": {},
"versionId": "d97a1e4a-f450-4c4d-8d85-877a5feebe98",
"connections": {
"e0583472-a450-4582-83bc-84a014bea543": {
"main": [
[
{
"node": "a18d7899-1e0c-49c7-83e9-04f26f695f66",
"type": "main",
"index": 0
}
]
]
},
"8ddca560-8da7-4090-b865-0523f95ca463": {
"main": [
[
{
"node": "40326966-0c46-4df2-8d80-fa014e05b693",
"type": "main",
"index": 0
}
]
]
},
"e7f1f9c0-63a2-4d4a-88cb-e089ea25d823": {
"main": [
[
{
"node": "8ddca560-8da7-4090-b865-0523f95ca463",
"type": "main",
"index": 0
}
]
]
},
"a63c3ab3-6aab-43b2-8af6-8b00e24e0ee6": {
"ai_languageModel": [
[
{
"node": "40326966-0c46-4df2-8d80-fa014e05b693",
"type": "ai_languageModel",
"index": 0
}
]
]
},
"40326966-0c46-4df2-8d80-fa014e05b693": {
"main": [
[
{
"node": "e0583472-a450-4582-83bc-84a014bea543",
"type": "main",
"index": 0
}
]
]
}
}
}이 워크플로우를 어떻게 사용하나요?
위의 JSON 구성 코드를 복사하여 n8n 인스턴스에서 새 워크플로우를 생성하고 "JSON에서 가져오기"를 선택한 후, 구성을 붙여넣고 필요에 따라 인증 설정을 수정하세요.
이 워크플로우는 어떤 시나리오에 적합한가요?
중급 - 보안 운영, 멀티모달 AI
유료인가요?
이 워크플로우는 완전히 무료이며 직접 가져와 사용할 수 있습니다. 다만, 워크플로우에서 사용하는 타사 서비스(예: OpenAI API)는 사용자 직접 비용을 지불해야 할 수 있습니다.
관련 워크플로우 추천
Tushar Mishra
@yajnaProblem Solver | ServiceNow Architect | AI/ML Specialist | Product Builder 1. 10+ years in tech consulting and product development across AI, enterprise platforms, and cloud ecosystems. 2. ISB AMP in Business Analytics; strong foundation in strategy + data. 3. Founder – ReAcademy.ai: Flashcard-based learning SaaS using AI & LLMs to transform PDFs into gamified micro-learning.
이 워크플로우 공유