list_suspicious_process_events
Aggregate and list suspicious process event detections across your tenant for runtime evidence of compromise. Covers Runner-Worker-Memory-Read, Reverse-Shell, and Privileged-Container. Each result includes a clickable dashboard URL for investigation.
Instructions
List suspicious-process-event detections across the tenant. This is a virtual detection ID that aggregates three real types: Runner-Worker-Memory-Read (credential theft from runner memory), Reverse-Shell, and Privileged-Container. Use for runtime-evidence of compromise during an incident. Every result has a dashboard_url — when you present detections to the user you MUST include a clickable link per detection, not just the first one.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| customer | No | StepSecurity customer/tenant identifier. Optional — if omitted, falls back to STEP_SECURITY_CUSTOMER env var. Returns detections aggregated across ALL GitHub orgs installed under this tenant. | |
| status | No | Detection status filter. Defaults to 'new'. | |
| limit | No | Max detections to return (1-200). Defaults to 50. | |
| orgScope | No | Optional: restrict to a single GitHub org under this tenant (uses the owner-scoped endpoint instead of tenant-wide). |