Identity anchors
Attribution starts here.
alice@company.com
known owner
alice-mbp.local
developer host
The point of a meaning-layer detail page is to bundle the signals that matter together so a reviewer can act before opening every raw row.
This session explains the current story
Why does this session deserve to be the one we inspect first?
Long enough to accumulate context
Heavy enough to shape the session story
Directly adjacent to the work
One expected and one worth review
c6 detail reference
alice@company.com
acct_01Abc...
Claude Code v1.2.0
Node.js v22.1.0
alice-mbp.local
developer machine
/Users/alice/projects/api-refactor
sk-ant-...A3F2
shared org key
ended
58m 44s
Turn Timeline
Model, token, tool, and latency sequence.
# | Model | Cost | Tools | Latency |
|---|---|---|---|---|
| 1 | claude-sonnet-4-6 | $0.14 | 2 | 980ms |
| 18 | claude-sonnet-4-6 | $0.26 | 4 | 1,380ms |
| 31 | claude-sonnet-4-6 | $0.34 | 0 | 700ms |
Files And Calls
The c6 detail pairs accessed files and outbound destinations.
Evidence | Kind | Count | Posture |
|---|---|---|---|
| /Users/alice/projects/api-refactor/.env | file read | 2 | sensitive |
| /Users/alice/projects/api-refactor/src/auth.ts | file edit | 5 | important |
| api.github.com | secondary call | 1 | expected |
Key findings
Finding | Body | Operator note |
|---|---|---|
Identity is only part of the trust picture | The user is known, but the session still relies on shared infrastructure that widens the interpretation problem. | Known actor does not mean low consequence. |
The meaningful moment is a combination | Sensitive file access matters more because it happened adjacent to outbound model traffic. | This is why a meaning layer helps more than a flat timeline. |
Containment choices are visible | Security can suspend the key or isolate the endpoint without waiting for every turn row to be reviewed. | The page should expose the fastest levers clearly. |
Immediate actions
Session significance map
Use a session-centric map to show why the session listing is more than a table of costs and timestamps.
Focus
sess_01XFa9q...
Alice on a developer endpoint using a shared key while touching auth-related company files.
high-signal session
Identity anchors
Attribution starts here.
alice@company.com
known owner
alice-mbp.local
developer host
Shared lanes
These widen blast radius.
sk-ant-...A3F2
shared org key
Claude Code v1.2.0
common execution lane
Company context
This makes the session consequential.
/projects/api-refactor
auth repo path
.env + config.ts
sensitive file cluster
Outbound paths
This is where boundary questions appear.
api.anthropic.com
expected provider path
secondary host
classify this path
linked entities
6
trust level
medium
company consequence
high
next drill
raw timeline
Evidence bundles
Bundle | Body | Why it matters |
|---|---|---|
Identity bundle | alice@company.com on alice-mbp.local using Claude Code with a shared org key. | Good enough to explain the actor, not enough to close the trust question. |
Sensitive context bundle | The working directory and touched files place the session inside auth-related company code. | This raises consequence even if the traffic pattern looks routine. |
Execution bundle | High tool volume and repeated file operations show the work was active and consequential, not incidental. | This helps explain why the session is not background noise. |
Boundary bundle | External model traffic follows the sensitive file activity in the same session window. | The order makes the session worth reviewing first. |