list_anomalous_network_calls
List anomalous outbound network calls across your tenant, detecting endpoints not in baseline as supply-chain exfiltration indicators. Filter by status or org. Each result includes a dashboard link for investigation.
Instructions
List anomalous outbound network-call detections across the tenant (all orgs installed under the customer). 'Anomalous' = a destination endpoint was contacted that is NOT in the repo's Harden-Runner baseline of allowed endpoints — a common indicator of supply-chain exfiltration. Typically the most-used detection type during an investigation. Every result has a dashboard_url — when you present detections to the user you MUST include a clickable link per detection, not just the first one.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| customer | No | StepSecurity customer/tenant identifier. Optional — if omitted, falls back to STEP_SECURITY_CUSTOMER env var. Returns detections aggregated across ALL GitHub orgs installed under this tenant. | |
| status | No | Detection status filter. Defaults to 'new'. | |
| limit | No | Max detections to return (1-200). Defaults to 50. | |
| orgScope | No | Optional: restrict to a single GitHub org under this tenant (uses the owner-scoped endpoint instead of tenant-wide). |