Compromised nodes and attack edges overlayed on the topology
Builds the overlay data consumed by the dashboard’s Attack Surface topology mode: every node and edge that participates in at least one attack path, tagged with the highest severity seen.Documentation Index
Fetch the complete documentation index at: https://docs.tracectrl.ai/llms.txt
Use this file to discover all available pages before exploring further.