Identity chain
What makes the user trustworthy?
alice@company.com
org identity
acct_01AbcXyz...
provider account
A user detail page is most valuable when it explains trust, consequence, and shared scope rather than repeating static account metadata.
Trusted but consequential user
Why does this user deserve a story page if she is not the unresolved one?
Most of the high-signal developer work
Large enough to anchor recent activity
Shared with other important sessions
Auth and config work appear often
c6 detail reference
alice@company.com
engineer
alice
acct_01AbcXyz...
qpoint-dev
Claude Code
Sessions
The raw detail keeps recent runs tied to endpoint and model.
Agent | Endpoint | Model | Started | Cost |
|---|---|---|---|---|
| Claude Code | alice-mbp.local | claude-sonnet-4-6 | 14 min ago | $0.43 |
| Claude Code | alice-mbp.local | claude-sonnet-4-6 | 4 hr ago | $0.87 |
| Cursor | alice-mbp.local | claude-opus-4-6 | yesterday | $1.11 |
Endpoints
c6 pairs the user with the machines they actually use.
Hostname | OS | Type | Sessions |
|---|---|---|---|
| alice-mbp.local | macOS | developer | 6 |
| 10.0.1.44 | macOS | unknown | 1 |
Key findings
Finding | Body | Operator note |
|---|---|---|
Trust starts strong here | Email, account id, and host all align cleanly for Alice. | That makes her a strong narrative anchor for the rest of the graph. |
Shared infrastructure is the caveat | The user is known, but the key and some adjacent tooling remain shared. | That is why the page still needs a meaning layer. |
Normal work can be consequential | Alice’s work touches auth and configuration context often enough to shape the story. | Consequence does not require obviously suspicious behavior. |
Immediate actions
User trust map
A meaning-layer user page is about anchored interpretation, not only account metadata.
Focus
alice@company.com
Stable developer identity tied to the most meaningful recent work.
trusted anchor
Identity chain
What makes the user trustworthy?
alice@company.com
org identity
acct_01AbcXyz...
provider account
Execution lane
How does the user work?
Claude Code
primary lane
alice-mbp.local
stable host
Company context
What does the user touch?
api-refactor
auth repo path
.env + config files
sensitive context
Shared infrastructure
What complicates the story?
shared org key
caveat
provider traffic
expected but relevant
identity strength
high
company consequence
high
shared caveat
1
next drill
session detail
Evidence bundles
Bundle | Body | Why it matters |
|---|---|---|
Identity bundle | alice@company.com, acct_01AbcXyz..., and OS username alice all align. | This is the strongest trust anchor in the lane. |
Execution bundle | Claude Code on alice-mbp.local is the dominant lane for recent meaningful work. | This explains why Alice appears near several other high-signal entities. |
Context bundle | Auth and config-related repo paths recur in Alice’s recent sessions. | That is why her work carries company consequence. |
Boundary bundle | Some of the important file activity in Alice’s sessions precedes outbound traffic. | The sequence is why the story matters operationally. |