← c10c10 / wf1 - Security Overview: Benchmark Edition / Inventory·security-global-overview-v1-v1 · 2026-04-22 · draft
Qpoint
QS

Inventory Concentration Board

Inventory should show where risk clusters before it asks the operator to browse every entity class.

This page turns inventory into a concentration surface: which lanes carry the most trust risk, where company consequence is concentrated, and which entity stories are worth opening first.

Operator Brief

3 hotspots

Credential lane · sensitive auth code touch · plain HTTP after sensitive work

Expanded Context

The three hotspot lanes carrying today’s concentration

Clicking the hotspot count should immediately reveal the lanes themselves, not just move the operator somewhere else on the page.

urgenttrust changed

Credential Lane

Unknown key `sk-ant-...C001` is active and has not been tied to a confident owner, team, or approved workload.

This is the trust story that binds the other hotspots together: the same credential appears beside live work, unresolved infrastructure, and sensitive code touch.

What Is In The Cluster

sk-ant-...C001 · 10.0.1.44 · unknown owner chain · shared AI session activity

warningconsequence high

Sensitive Auth Code Touched

One session touched auth-service, customer-web, auth logic, and local secret-bearing config.

This is concerning because the session moved through identity-critical code and config, not just ordinary repo files.

What Is In The Cluster

auth-service · customer-web · /src/auth.ts · /Users/alice/.env

warningboundary crossed

Plain HTTP After Sensitive Work

One session touched sensitive code and then called 10.0.2.15:8080 over plain HTTP.

This is concerning because the same session crossed an unencrypted boundary after moving through higher-consequence code and config.

What Is In The Cluster

10.0.2.15:8080 over http · shared automation lane · session followed auth-service touch

Priority Lanes

The first inventory question is where consequence is clustered, not which table is alphabetically first.

urgenttrust changed

Credential Lane

Unknown key `sk-ant-...C001` is active and has not been tied to a confident owner, team, or approved workload.

This is the trust story that binds the other hotspots together: the same credential appears beside live work, unresolved infrastructure, and sensitive code touch.

What Is In The Cluster

sk-ant-...C001 · 10.0.1.44 · unknown owner chain · shared AI session activity

Why Start Here

If this key resolves cleanly, the rest of the board may collapse into normal activity. If it does not, it becomes the fastest containment question on the page.

Open Story

Open API key story

warningconsequence high

Sensitive Auth Code Touched

One session touched auth-service, customer-web, auth logic, and local secret-bearing config.

This is concerning because the session moved through identity-critical code and config, not just ordinary repo files.

What Is In The Cluster

auth-service · customer-web · /src/auth.ts · /Users/alice/.env

Why Start Here

Open this hotspot to see the specific code and config surfaces that make the broader story high consequence.

Open Story

Open repo story

warningboundary crossed

Plain HTTP After Sensitive Work

One session touched sensitive code and then called 10.0.2.15:8080 over plain HTTP.

This is concerning because the same session crossed an unencrypted boundary after moving through higher-consequence code and config.

What Is In The Cluster

10.0.2.15:8080 over http · shared automation lane · session followed auth-service touch

Why Start Here

Open this hotspot to see whether the call was expected, what automation lane made it, and whether the destination is trusted.

Open Story

Open secondary-call story

Meaning Buckets

Keep the buckets small and clear enough to guide the next click.

Unknowns

3

One key, one host, and one identity chain are not confidently identified yet.

Sensitive Touchpoints

5

A small number of files, repos, and automation paths carry most of the company consequence.

Boundary Crossings

2

One plain HTTP edge and one unlabeled destination still matter now.

Stable Baseline

34

Most current sessions still fit the known-good lane and should stay compressed.

Relationship Spotlight

One compact map should connect entity classes into one readable concentration story.

Representative Hotspot

The inventory story should show how one credential lane connects identity, code context, and exposure.

This compact map is the inventory version of the overview spotlight: one grouped concentration story instead of a flat catalog of entity counts.

Identity, adjacency, activity, and posture around one representative item.

Identity

Attribution is still incomplete.

unknown owneridentity gap
10.0.1.44unresolved endpoint

Credential Lane

The riskiest shared execution path.

sk-ant-...C001unknown credential
shared AI laneblast radius

Lane

Unknown key + sensitive repo context

A shared key lane connects an unresolved host, auth-service code touchpoints, and one plain HTTP destination window.

high consequence · medium confidence · still active

Company Context

Why the lane matters.

auth-servicesensitive repo
/src/auth.tscritical file lane

Boundary Edge

What changed consequence.

10.0.2.15:8080destination
httpunencrypted

Trust changed by

unknown key + unresolved host

Consequence concentrated in

auth-service + customer-web

Boundary crossed by

plain HTTP destination

Fastest entity drill

API keys or repos

Unknown Entities

Show the three entities in this session that are not confidently identified or attributed yet.

sk-ant-...C001

Unknown API key is active and not tied to a known person, team, or approved workload.

credential

10.0.1.44

Active endpoint is part of this session but is not mapped to a known owner or expected environment.

endpoint

unknown owner

The key, endpoint, and session do not resolve to a confident person or team owner.

identity

Next Drill

Open user story

Exposure Paths

Show the two paths through which concern may leave, spread, or cross a boundary.

Plain HTTP destination

One session called 10.0.2.15:8080 over plain HTTP after touching sensitive code and config.

boundary

Shared automation path

One automation path now crosses more high-consequence repos and execution surfaces than expected.

spread

Sensitive Context Touchpoints

These five touchpoints are the concrete files, repos, and execution surfaces behind the concentration count.

auth-service

Primary repo carrying the highest current security consequence.

repo

Open Story

Open repo story

customer-web

Second repo inside the same widening company-impact lane.

repo

Open Story

Open repo story

/src/auth.ts

Auth-related file touch that gives the session direct security consequence.

file

Open Story

Open file story

/Users/alice/.env

Sensitive config path that widens the blast radius if the surrounding session is risky.

file

Open Story

Open file story

shared automation identity

Execution path whose reuse across repos and hosts makes the story more consequential.

lane

First Drill Paths

Use the meaning layer to point directly at the strongest entity stories.

Credential story

Start here if the goal is to verify or contain the riskiest shared lane in the environment.

Open API key story

Why Start Here

The API key story is still the shortest path from inventory concentration into a concrete trust decision.

Endpoint story

Start here if the main question is whether this is legitimate onboarding drift or shadow activity.

Open endpoint story

Why Start Here

Host attribution remains the largest inventory blocker in the current environment picture.

Repo story

Start here if the goal is to see which company code paths carry the most consequence right now.

Open repo story

Why Start Here

Sensitive repos and file clusters are the strongest link between raw inventory and company impact.

Stable Coverage

Normal inventory should reassure, not dominate the page.

Known users and sessions

34 / 36

Most live activity still maps to expected developers or CI runners.

Expected model routing

92%

The bulk of requests remain inside the normal approved model lane.

Cataloged destination traffic

7 / 8

Most observed network edges still map to familiar organization patterns.