Interactive Lab
Spin up the security terminal
Practice reconnaissance, iterate on detections, and ship guardrails exactly how Candra runs real-world security engineering engagements.
quick tips
- help — list every available command
- ls -l, tree — map directories instantly
- head -n 5 runtime_rules.yaml — peek at detection rules
- grep -i token reports/quarterly.md — hunt sensitive strings
- kubeaudit --profile prod — run the k8s hardening checks
- guardrails status — check the policy delivery pipeline
Session info
Each command runs locally in your browser on a mocked Kali environment — safe to experiment, easy to repeat.
Command reference
- find token — list every artifact containing “token”.
- kubeaudit --profile prod — baseline Kubernetes posture.
- guardrails deploy — push signed policy bundles on-demand.
- falco stats — inspect live runtime detections.
- curl https://telemetry.lab/api — pull the latest signal JSON.
- note roadmap — read the lab’s upcoming deliverables.
kali@candra
Threat Lab Session