← c12c12 / wf1 - Inventory Deep Dive / Inventory / Secondary Calls / Detail
Qpoint
QI

Secondary Calls Detail

A secondary-call detail page should explain one destination as a boundary story: who called it, what company context was nearby, and whether the destination fits expectation.

The page should keep protocol, attribution, and precursor context close together so the reviewer can decide whether the boundary crossing is ordinary or worth escalation.

Use This Page When Asking

Is this downstream destination an expected boundary crossing, or the start of a weaker-fit outbound story?

Open c6 raw detail

Sessions

4

Shared by several runs

Calls

12

Steady reuse pattern

Protocol

https

Expected transport

Attribution

high

Strong session context

Why This Detail Matters

This detail should make one secondary calls story readable end to end before the reviewer drops into raw evidence tables.

Important Metadata

Identity should become clear before relationship context and sequence take over.

Boundary path worth review

The raw destination page makes recent call sequence and attribution explicit.

Destination Host

10.0.2.15

IP Address

10.0.2.15

Protocol

http

Port

8080

First Seen

today

Last Seen

22 min ago

What This Detail Should Help Decide

The page should leave the reviewer with a concrete next move, not just more context.

Show expected-vs-weak-fit destinations clearly

The category page should help reviewers understand why some hosts are routine while others deserve immediate scrutiny.

Keep protocol and attribution visible near the top

Those two fields change how quickly a destination can be trusted.

Use the raw call table as proof of the story

The detail page should frame the boundary question before presenting the recent-call ledger.

Destination-Centered Topology

A secondary-call map should show who called the host, over what protocol, and what the exposure looks like.

Useful per destination: caller sessions, endpoint, protocol/port, data volume, likely purpose, and whether the connection is expected, encrypted, and policy-safe.

Destination

10.0.2.15:8080

Representative risky edge because it is plain HTTP and tied to a small but unusual set of calls.

1 session · 3 calls · 0.4 KB avg

Protocol

http

Port

8080

Encryption

none

Current posture

investigate caller

Caller Chain

Who initiated the outbound edge.

3 nodes
unknown usersame live session
Claude Codeagent
10.0.1.44endpoint

Connection Context

What the edge itself looks like.

3 nodes
10.0.2.15destination host
httpprotocol
8080port

Comparative Context

How it differs from the rest of the graph.

3 nodes
api.github.comexpected https peer
api.anthropic.comexpected model peer
only HTTP edgeoutlier

Risk Lens

The security meaning of the call.

3 nodes
unencrypted trafficpolicy issue
small payloadtriage hint
review session + file edgespossible exfil path

Representative Event Chain

The page should show how the item participates in a readable sequence, not just a pile of supporting rows.

4 steps
  1. 1

    Destination

    The page establishes the host as a specific boundary surface

    Protocol, port, and host identity should tell the reviewer what kind of outward path this is immediately.

    api.github.comhttps443
  2. 2

    Caller context

    Sessions and users explain whether the destination fits expectation

    The page should make clear which execution lanes commonly call the host and which ones would look surprising.

    alice@company.com4 sessions
  3. 3

    Precursor evidence

    Nearby files or tools explain why the destination matters now

    Boundary meaning changes when the host appears right after sensitive file or capability use.

    /repos/qpoint-iofilesystemsession detail
  4. 4

    Follow-up

    The reviewer drops into raw calls only after the host story is framed

    Recent-call rows remain useful, but the page should first explain why the destination deserves inspection.

    recent callsraw detail

c6 Evidence Tables

These are verification surfaces after the story is understood, not the first read.

Recent Calls

c6 shows session, method, path, bytes, time, and attribution on one table.

Session / UserMethodPathStatusBytesAttribution
sess_01XFa9q... / unknownPOST/bridge2004.2KBweak
sess_01XFa9q... / alice@company.comGET/health2000.8KBmedium

Return To Category

Compare this representative detail against the full category framing and drill targets.

Open Secondary Calls overview

Open c6 Raw Detail

Use the original detail page for exact raw evidence after the c12 story framing.

Open c6 raw detail

Open c6 Raw List

Compare this item against the broader c6 entity ledger once the representative story is clear.

Open c6 raw list