Summary
Runtime network profile for the GitHub Actions workflow “TeamPCP Attack Replay (Garnet Instrumented)” in repository jadoonf/trivy-threat-research. This report shows all outbound network destinations contacted during CI run #23612133106, their process lineage, and security assertions.
GitHub context
- Repository
- jadoonf/trivy-threat-research
- Workflow
- TeamPCP Attack Replay (Garnet Instrumented)
- Run ID
- 23612133106
- Job
- teampcp-replay
- Ref
- refs/heads/main
- Commit SHA
- 7184e1dca33234bc6028766eb83b9bcfc391e438
- Actor
- jadoonf
- Timestamp
- 2026-03-26T18:50:19.344032Z
Network destinations (11)
- check.trivy.dev
- glb-db52c2cf8be544.github.com
- results-receiver.actions.githubusercontent
- glb-2a3c35-public-internal.githubapp.com
- hosted-compute-watchdog-prod-iad-01.githubapp
- boundary.dfinity.network
- tdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io
- scan.aquasecurtiy.org
- blob.bl5prdstrz24a.store.core.windows.net
- blob.bl5prdstrz24a.trafficmanager.net
- productionresultssa3.blob.core.windows.net
Telemetry
Total unique domains: 12. Total connections: 9.
Security checks (1)
- Known bad egress: No contacted domains matched known threats