Prerequisites

  • PhantomYerra running with at least one completed scan session
  • Admin access to your Jira / ServiceNow instance
  • API token or service account credentials for the target system
  • Network access from PhantomYerra machine to the integration endpoint
  • Team or Enterprise license for multi-user integration workflows

Jira Integration

  1. 1

    Configure Jira Connection

    Go to Settings β†’ Integrations β†’ Jira.

    Jira URL : https://your-org.atlassian.net Username : your-email@company.com API Token : [from Jira β†’ Account β†’ Security β†’ API tokens] Project Key : SEC (your security project key) Issue Type : Bug / Task / Story (select your pentest finding type)
  2. 2

    Configure Field Mapping

    PhantomYerra Field → Jira Field title → summary description → description (with PoC steps) severity → priority (Critical→P1, High→P2, Medium→P3, Low→P4) cvss_score → custom field: cf[10001] cwe_id → label: CWE-[id] remediation → custom field: cf[10002] finding_url → custom field: cf[10003]
  3. 3

    Push Findings to Jira

    From the Findings panel, select findings and click Push to Jira. Or configure auto-push: all Critical/High findings create Jira tickets automatically when confirmed.

ServiceNow Integration

Settings β†’ Integrations β†’ ServiceNow: Instance URL : https://your-instance.service-now.com Username : phantomyerra_svc Password : [encrypted on entry] Table : sn_si_incident (Security Incidents) or incident Features: β†’ Push findings as Security Incidents β†’ CMDB sync: discovered assets β†’ CI records β†’ Bi-directional status sync (fix in ServiceNow β†’ closes in PhantomYerra)

Common Issues

Your Jira project likely has required custom fields that PhantomYerra doesn't know about. Go to Settings β†’ Integrations β†’ Jira β†’ Field Mapping β†’ Advanced. Inspect the Jira field schema and map the required fields. Common required fields: "Sprint", "Fix Version", "Component". Set default values for fields that PhantomYerra can't auto-populate.

Test the webhook: Settings β†’ Integrations β†’ Slack β†’ Test Connection. If the test fails, regenerate the webhook in Slack (Apps β†’ Incoming Webhooks). Verify the bot is still a member of the target channel. Check that notification triggers are enabled in the trigger configuration β€” all triggers are OFF by default and must be explicitly enabled.

GitHub Advanced Security must be enabled for the repository (requires GitHub Enterprise or public repo). The SARIF file must be valid SARIF 2.1.0. Check the file: cat phantomyerra_results.sarif | jq .version β€” should return "2.1.0". Ensure the workflow has the security-events: write permission in the workflow YAML.