← c6c6 / wf1 - AI Observability Dashboard / Inventory / Secondary Calls·dashboard-v1-v1 · 2026-04-02 · draft
Qpoint
AL
⚠ 1 unencrypted destination10.0.2.15:8080 is using plain HTTP.
7 HTTPS · 1 HTTP18 destinations observed

Destination-Centered Topology

A secondary-call map should show who called the host, over what protocol, and what the exposure looks like.

Useful per destination: caller sessions, endpoint, protocol/port, data volume, likely purpose, and whether the connection is expected, encrypted, and policy-safe.

Identity, adjacency, activity, and posture around one representative item.

Caller Chain

Who initiated the outbound edge.

unknown usersame live session
Claude Codeagent
10.0.1.44endpoint

Connection Context

What the edge itself looks like.

10.0.2.15destination host
httpprotocol
8080port

Destination

10.0.2.15:8080

Representative risky edge because it is plain HTTP and tied to a small but unusual set of calls.

1 session · 3 calls · 0.4 KB avg

Comparative Context

How it differs from the rest of the graph.

api.github.comexpected https peer
api.anthropic.comexpected model peer
only HTTP edgeoutlier

Risk Lens

The security meaning of the call.

unencrypted trafficpolicy issue
small payloadtriage hint
review session + file edgespossible exfil path

Protocol

http

Port

8080

Encryption

none

Current posture

investigate caller

DestinationProtocolPortSessionsTotal callsAvg bytesLast seen
api.github.comhttps443111844.2 KBtoday
api.anthropic.comhttps4432731218.7 KBtoday
api.openai.comhttps44321412.1 KBMar 28
api.figma.comhttps44343188.4 KBtoday
registry.npmjs.orghttps4438621.1 KBtoday
pypi.orghttps4433190.8 KBtoday
10.0.2.15http8080130.4 KB22 min ago
storage.googleapis.comhttps443528142 KBtoday