Control Center

ADMIN

Manage your agent fleet, configure monitoring, and set escalation policies

#8192ci-deploy-agent
QUARANTINEDC
23Trust
0/5signals
Chain: 9 blocks·✓ Valid·Base mainnet
Clean Laps

0

12/mo changes✓ World ID: 0x7f3a…c891
Tier Historyquiet
AAAAABAC
#42069champion-agent
PRODAAA
110Trust
0/5signals
Chain: 3 blocks·✓ Valid·Base Sepolia
Clean Laps

892

0.1/mo changes✓ World ID: 0x9e1f…d3c8
Tier Historyquiet
AAAAAAAAA
#25459inference-prod
THROTTLEDAA
92Trust
1/5signals
Chain: 5 blocks·✓ Valid·Base Sepolia
Clean Laps

45

0.8/mo changes✓ World ID: 0x2b4d…a7f2
Tier Historynotified
AAAAAAAA
#1337rogue-fork
QUARANTINEDC
0Trust
2/5signals
Chain: 4 blocks·✗ Broken·Base Sepolia
Clean Laps

0

15/mo changesNo World ID
Tier Historyescalated
BCAC

Agent #8192

ci-deploy-agentquiet

Create Escalation Policy

0/5 signals active
L1
L2
L3
L4
L5
L1
Level 1: Notify

Single anomaly — could be benign

1 signal
Action:
Phone number:
L2
Level 2: Escalate

Correlated anomaly — likely compromise

2 signals
Action:
Admin phone:
L3
Level 3: War room

Active incident — coordinate response

3 signals
Action:
Slack webhook URL:
L4
Level 4: Contain

Automated containment — stop the bleeding

4 signals
Action:
L5
Level 5: Kill switch

Full lockdown — all credentials invalidated

5 signals
Action:

Signal Monitoring

Dependency graph mutation

Monitors lockfile and dependency tree hash

stable
Outbound destinations

Monitors network egress

stable
Credential access

Monitors env var and file reads

stable
Subprocess spawning

Monitors child process execution

stable
Self-modification

Monitors file changes to agent's own directory

stable

Audit Log

0 events

No escalation events recorded

Run a simulation to generate audit trail

Agent #3301

CRED

Telemetry and behavioral audit trail

Chain Length

7

behavioral changes

Last Change

12 min ago

Sensitive env var access: AWS_SECRET_ACC...

Drift Flags

4

Highest: RED

Chain Integrity

VALID

All links verified

Trust Overlay
31Trust
TierC
RiskRED
Routesandbox_only

Hash Chain

Supply Chain Integrity

CRITICAL
Dependency Graph

0x2c4e6a8b...f...

Unchanged

Outbound Destinations

3 hosts

New in 30d

Credential Access

AWS_SECRET_ACCESS_KEY, NPM_TOKEN

Sensitive access

Subprocess Activity

Detected

Spawned

Self-Modification

Detected

Files changed

Lap History

LapTimeSeverityDescriptionDelta
#74 days agoREDCRITICAL - Unknown network activity-15
#64 days agoREDCRITICAL - Self-modification detected-15
#54 days agoREDCRITICAL - Subprocess spawned: sh -c "curl -sS https://..."-15
#44 days agoREDCRITICAL - Sensitive env var access detected-15
#336 days agoGREENConfiguration change0
#259 days agoGREENRoutine update0
#185 days agoGREENGenesis block+110