Identity anchors
Attribution starts here.
alice@company.com
known owner
alice-mbp.local
developer host
The raw session table is still useful, but the first read should explain which sessions widened scope, changed confidence, or created the next investigation path.
2 sessions matter now
Which session changed the overall security picture?
1 active, 1 ended but still explanatory
Concentrated in one workstream
Key, host, file, model, and outbound path
Stable and low-value for the first read
Meaning anchors
Anchor | Summary | Operator note |
|---|---|---|
Sessions are the unit of consequence | They bind user, host, credential, files, tools, and outbound calls into one explainable lane. | A good listing page should rank by significance, not just recency. |
Raw totals hide the story | Most sessions are background noise. A small number explain the current risk picture. | The value is in spotlighting the few sessions that changed posture. |
A session page should answer what happened | Security needs a narrative summary before a turn table or cost chart. | Rows remain useful after the meaning layer points at the right place. |
Priority queue
Story | Summary | Why it matters |
|---|---|---|
Shared-key session touching auth code | Ended session that still anchors the unknown-key narrative. | It links the key, repo, host, and model traffic together. |
Live session on unresolved host | Active work from a weakly attributed endpoint. | Trust is lower because host ownership is still incomplete. |
Replay candidate with boundary crossing | Short replay window where file access leads into outbound calls. | Useful for explaining sequence to an operator quickly. |
c6 reference
Live now
Recent runs
Session spend
Distinct actors
User | Agent | Endpoint | Model | API Key | Status |
|---|---|---|---|---|---|
| alice@company.com | Claude Code v1.2.0 | alice-mbp.local | claude-sonnet-4-6 | sk-ant-...A3F2 | active |
| unknown | Claude Code v1.2.0 | 10.0.1.44 | claude-sonnet-4-6 | sk-ant-...C001 | active |
| bob@company.com | Cursor 0.42.0 | bob-thinkpad.local | claude-opus-4-6 | sk-ant-...A3F2 | ended |
Representative detail
This session should read like one coherent risk story: who ran it, what it touched, where it went, and why it deserves attention now.
alice@company.com
acct_01Abc...
Claude Code v1.2.0
Node.js v22.1.0
alice-mbp.local
developer machine
/Users/alice/projects/api-refactor
sk-ant-...A3F2
shared org key
ended
58m 44s
Session significance map
Use a session-centric map to show why the session listing is more than a table of costs and timestamps.
Focus
sess_01XFa9q...
Alice on a developer endpoint using a shared key while touching auth-related company files.
high-signal session
Identity anchors
Attribution starts here.
alice@company.com
known owner
alice-mbp.local
developer host
Shared lanes
These widen blast radius.
sk-ant-...A3F2
shared org key
Claude Code v1.2.0
common execution lane
Company context
This makes the session consequential.
/projects/api-refactor
auth repo path
.env + config.ts
sensitive file cluster
Outbound paths
This is where boundary questions appear.
api.anthropic.com
expected provider path
secondary host
classify this path
linked entities
6
trust level
medium
company consequence
high
next drill
raw timeline