Verify whether the shared key use was expected
The page should make it obvious when attribution is weakened by shared credentials even if the user is known.
Sessions Detail
Use This Page When Asking
Why does this run deserve attention now, and what exactly made it cross from routine into consequential?
Open c6 raw detailDuration
58m
Long enough to accumulate context
Tool calls
84
Dense enough to matter
Sensitive files
2
Auth-adjacent paths
Outbound paths
2
One expected, one weaker fit
Why This Detail Matters
Important Metadata
User
alice@company.com
acct_01Abc...
Agent
Claude Code v1.2.0
Node.js v22.1.0
Endpoint
alice-mbp.local
developer machine
Working Directory
/Users/alice/projects/api-refactor
API Key
sk-ant-...A3F2
shared org key
Status
ended
58m 44s
What This Detail Should Help Decide
The page should make it obvious when attribution is weakened by shared credentials even if the user is known.
If the host is weakly classified, the session should stay elevated even when the activity looks routine.
The raw timeline remains useful, but the page should point to it after identity and context are understood.
Cost And Usage Shape
Spend Pulse
The c6 turn sample shows cost stepping up across the session rather than staying flat. That makes the spend a clue about changing work intensity, not just a billing number.
Token And Turn Density
Fifty-eight minutes, thirty-one turns, and eighty-four tool calls suggest a session that built and reused substantial working context over time.
Interpretation
This session deserves review because cost, auth-adjacent files, and outbound activity show up together. If the cost were isolated from those other signals, it would be much less important.
Session-Centered Topology
Useful per session: actor chain, execution context, touched assets, outbound calls, and the posture signals that make this session normal or suspicious.
Session
alice@company.com · active session
Claude Code v1.2.0 on alice-mbp.local using claude-sonnet-4-6 with sk-ant-...A3F2.
14m live · 8 turns · $0.43
Touched capabilities
filesystem · github · web-search
Files in scope
3 files · 1 sensitive
Outbound edges
2 hosts
Current posture
active · within normal band
The primary “who ran this?” questions.
The core runtime dependencies.
What the session read or changed.
What deserves review before drilling deeper.
Representative Event Chain
The page should show how the item participates in a readable sequence, not just a pile of supporting rows.
Start
The session begins with a known operator on a developer endpoint using a credential lane shared with other work.
Context build
Repeated file reads and edits move the session out of the background and into a sensitive company context cluster.
Boundary hinge
The session becomes materially interesting when model traffic and secondary calls follow the sensitive file work in the same timeline.
Next read
Once the story is clear, the raw turn ledger and connected entity pages become verification tools rather than the primary explanation.
c6 Evidence Tables
Turn Timeline
Model, token, tool, and latency sequence.
| # | Model | Cost | Tools | Latency |
|---|---|---|---|---|
| 1 | claude-sonnet-4-6 | $0.14 | 2 | 980ms |
| 18 | claude-sonnet-4-6 | $0.26 | 4 | 1,380ms |
| 31 | claude-sonnet-4-6 | $0.34 | 0 | 700ms |
Files And Calls
The c6 detail pairs accessed files and outbound destinations.
| Evidence | Kind | Count | Posture |
|---|---|---|---|
| /Users/alice/projects/api-refactor/.env | file read | 2 | sensitive |
| /Users/alice/projects/api-refactor/src/auth.ts | file edit | 5 | important |
| api.github.com | secondary call | 1 | expected |
Return To Category
Compare this representative detail against the full category framing and drill targets.
Open Sessions overviewOpen c6 Raw Detail
Use the original detail page for exact raw evidence after the c12 story framing.
Open c6 raw detailOpen c6 Raw List
Compare this item against the broader c6 entity ledger once the representative story is clear.
Open c6 raw list