Identity is only part of the trust picture
The user is known, but the session still relies on shared infrastructure that widens the interpretation problem.
Known actor does not mean low consequence.
Sessions Detail Story
Operator Brief
This session explains the current story
It is the clearest example of how shared credentials, sensitive files, and outbound traffic became one interpretable event.
Question This View Answers
Why does this session deserve to be the one we inspect first?
Duration
58m
Long enough to accumulate context
Tool calls
84
Heavy enough to shape the session story
Sensitive files
2
Directly adjacent to the work
Outbound paths
2
One expected and one worth review
c6 Detail Reference
User
alice@company.com
acct_01Abc...
Agent
Claude Code v1.2.0
Node.js v22.1.0
Endpoint
alice-mbp.local
developer machine
Working Directory
/Users/alice/projects/api-refactor
API Key
sk-ant-...A3F2
shared org key
Status
ended
58m 44s
Turn Timeline
Model, token, tool, and latency sequence.
| # | Model | Cost | Tools | Latency |
|---|---|---|---|---|
| 1 | claude-sonnet-4-6 | $0.14 | 2 | 980ms |
| 18 | claude-sonnet-4-6 | $0.26 | 4 | 1,380ms |
| 31 | claude-sonnet-4-6 | $0.34 | 0 | 700ms |
Files And Calls
The c6 detail pairs accessed files and outbound destinations.
| Evidence | Kind | Count | Posture |
|---|---|---|---|
| /Users/alice/projects/api-refactor/.env | file read | 2 | sensitive |
| /Users/alice/projects/api-refactor/src/auth.ts | file edit | 5 | important |
| api.github.com | secondary call | 1 | expected |
Key Findings
The user is known, but the session still relies on shared infrastructure that widens the interpretation problem.
Known actor does not mean low consequence.
Sensitive file access matters more because it happened adjacent to outbound model traffic.
This is why a meaning layer helps more than a flat timeline.
Security can suspend the key or isolate the endpoint without waiting for every turn row to be reviewed.
The page should expose the fastest levers clearly.
Immediate Actions
Decide whether the key use is expected or whether credential scope should be reduced immediately.
Bind the host to an owner and environment posture so future sessions start with a stronger trust floor.
Use the raw timeline to verify whether the boundary crossing matches the expected work pattern.
Representative Relationship Map
Session significance map
Use a session-centric map to show why the session listing is more than a table of costs and timestamps.
Identity, adjacency, activity, and posture around one representative item.
Identity anchors
Attribution starts here.
Shared lanes
These widen blast radius.
session
sess_01XFa9q...
Alice on a developer endpoint using a shared key while touching auth-related company files.
Company context
This makes the session consequential.
Outbound paths
This is where boundary questions appear.
linked entities
6
trust level
medium
company consequence
high
next drill
raw timeline
Evidence Bundles
alice@company.com on alice-mbp.local using Claude Code with a shared org key.
Good enough to explain the actor, not enough to close the trust question.
The working directory and touched files place the session inside auth-related company code.
This raises consequence even if the traffic pattern looks routine.
High tool volume and repeated file operations show the work was active and consequential, not incidental.
This helps explain why the session is not background noise.
External model traffic follows the sensitive file activity in the same session window.
The order makes the session worth reviewing first.
Raw Evidence Paths
Return To Sessions Listing
Step back to the entity-wide meaning page and compare this item to the rest of the class.
Open meaning listOpen Raw Sessions Detail
Drill into the original ledger once the meaning layer has narrowed the question.
Open raw detailOpen Raw Sessions List
Compare this representative item against the full list for distribution and frequency.
Open raw list