c9
c9 / m2 - Meaning-Layer Dashboard (Hi-Fi v2) / Inventory / Sessions / Detail
Sessions detail story

This session should read like one coherent risk story: who ran it, what it touched, where it went, and why it deserves attention now.

The point of a meaning-layer detail page is to bundle the signals that matter together so a reviewer can act before opening every raw row.

This session explains the current story

Why does this session deserve to be the one we inspect first?

Duration
NaN

Long enough to accumulate context

Tool calls
84

Heavy enough to shape the session story

Sensitive files
2

Directly adjacent to the work

Outbound paths
2

One expected and one worth review

c6 detail reference

sess_01XFa9q...

Significance
User :

alice@company.com

acct_01Abc...

Agent :

Claude Code v1.2.0

Node.js v22.1.0

Endpoint :

alice-mbp.local

developer machine

Working Directory :

/Users/alice/projects/api-refactor

API Key :

sk-ant-...A3F2

shared org key

Status :

ended

58m 44s

Turn Timeline

Model, token, tool, and latency sequence.

#
Model
Cost
Tools
Latency
1claude-sonnet-4-6$0.142980ms
18claude-sonnet-4-6$0.2641,380ms
31claude-sonnet-4-6$0.340700ms

Files And Calls

The c6 detail pairs accessed files and outbound destinations.

Evidence
Kind
Count
Posture
/Users/alice/projects/api-refactor/.envfile read2sensitive
/Users/alice/projects/api-refactor/src/auth.tsfile edit5important
api.github.comsecondary call1expected

Key findings

What this representative item changes in the story

3 findings
Finding
Body
Operator note

Identity is only part of the trust picture

The user is known, but the session still relies on shared infrastructure that widens the interpretation problem.Known actor does not mean low consequence.

The meaningful moment is a combination

Sensitive file access matters more because it happened adjacent to outbound model traffic.This is why a meaning layer helps more than a flat timeline.

Containment choices are visible

Security can suspend the key or isolate the endpoint without waiting for every turn row to be reviewed.The page should expose the fastest levers clearly.

Immediate actions

Point to action before deeper raw inspection

3 actions
Verify the shared key owner :
Decide whether the key use is expected or whether credential scope should be reduced immediately.
Confirm the endpoint story :
Bind the host to an owner and environment posture so future sessions start with a stronger trust floor.
Replay the outbound segment :
Use the raw timeline to verify whether the boundary crossing matches the expected work pattern.

Session significance map

One session binds together the inventory types that explain the current story.

session

Use a session-centric map to show why the session listing is more than a table of costs and timestamps.

Focus

sess_01XFa9q...

Alice on a developer endpoint using a shared key while touching auth-related company files.

high-signal session

Identity anchors

Attribution starts here.

alice@company.com

known owner

alice-mbp.local

developer host

Shared lanes

These widen blast radius.

sk-ant-...A3F2

shared org key

Claude Code v1.2.0

common execution lane

Company context

This makes the session consequential.

/projects/api-refactor

auth repo path

.env + config.ts

sensitive file cluster

Outbound paths

This is where boundary questions appear.

api.anthropic.com

expected provider path

secondary host

classify this path

linked entities

6

trust level

medium

company consequence

high

next drill

raw timeline

Evidence bundles

Bundle the story instead of reconstructing it from rows

4 bundles
Bundle
Body
Why it matters

Identity bundle

alice@company.com on alice-mbp.local using Claude Code with a shared org key.Good enough to explain the actor, not enough to close the trust question.

Sensitive context bundle

The working directory and touched files place the session inside auth-related company code.This raises consequence even if the traffic pattern looks routine.

Execution bundle

High tool volume and repeated file operations show the work was active and consequential, not incidental.This helps explain why the session is not background noise.

Boundary bundle

External model traffic follows the sensitive file activity in the same session window.The order makes the session worth reviewing first.