Interactive Lab

Spin up the security terminal

Practice reconnaissance, iterate on detections, and ship guardrails exactly how Candra runs real-world security engineering engagements.

quick tips

  • help — list every available command
  • ls -l, tree — map directories instantly
  • head -n 5 runtime_rules.yaml — peek at detection rules
  • grep -i token reports/quarterly.md — hunt sensitive strings
  • kubeaudit --profile prod — run the k8s hardening checks
  • guardrails status — check the policy delivery pipeline

Session info

Each command runs locally in your browser on a mocked Kali environment — safe to experiment, easy to repeat.

Command reference

  • find token — list every artifact containing “token”.
  • kubeaudit --profile prod — baseline Kubernetes posture.
  • guardrails deploy — push signed policy bundles on-demand.
  • falco stats — inspect live runtime detections.
  • curl https://telemetry.lab/api — pull the latest signal JSON.
  • note roadmap — read the lab’s upcoming deliverables.
kali@candra Threat Lab Session