Control Center
ADMINManage your agent fleet, configure monitoring, and set escalation policies
0
892
45
0
Agent #8192
ci-deploy-agentquietCreate Escalation Policy
Single anomaly — could be benign
Correlated anomaly — likely compromise
Active incident — coordinate response
Automated containment — stop the bleeding
Full lockdown — all credentials invalidated
Signal Monitoring
Monitors lockfile and dependency tree hash
Monitors network egress
Monitors env var and file reads
Monitors child process execution
Monitors file changes to agent's own directory
Audit Log
0 eventsNo escalation events recorded
Run a simulation to generate audit trail
Agent #3301
CREDTelemetry and behavioral audit trail
Chain Length
7
behavioral changes
Last Change
12 min ago
Sensitive env var access: AWS_SECRET_ACC...
Drift Flags
4
Highest: RED
Chain Integrity
VALID
All links verified
Hash Chain
Supply Chain Integrity
CRITICAL0x2c4e6a8b...f...
Unchanged
3 hosts
New in 30d
AWS_SECRET_ACCESS_KEY, NPM_TOKEN
Sensitive access
Detected
Spawned
Detected
Files changed
Lap History
| Lap | Time | Severity | Description | Delta |
|---|---|---|---|---|
| #7 | 4 days ago | RED | CRITICAL - Unknown network activity | -15 |
| #6 | 4 days ago | RED | CRITICAL - Self-modification detected | -15 |
| #5 | 4 days ago | RED | CRITICAL - Subprocess spawned: sh -c "curl -sS https://..." | -15 |
| #4 | 4 days ago | RED | CRITICAL - Sensitive env var access detected | -15 |
| #3 | 36 days ago | GREEN | Configuration change | 0 |
| #2 | 59 days ago | GREEN | Routine update | 0 |
| #1 | 85 days ago | GREEN | Genesis block | +110 |