$ sentinel analyze --source=aws,cloudflare,m365 --period=24h
Ingesting events............................... done
Running AI triage (Claude Sonnet).............. done
Cross-referencing threat intelligence.......... done
✓ 2,847 events ingested · AWS CloudTrail (1,204), Cloudflare WAF (891), M365 (752)
✓ 2,839 events classified as noise · routine, ignored
⚠ 6 events flagged for review
! 2 events classified CRITICAL — already blocked
[CRITICAL] 03:12:44 · Credential stuffing · 192.168.47.23 (Minsk, BY)
→ 847 login attempts on admin@acmecorp.com in 4 minutes
→ IP matches IOC feed: known botnet C2 infrastructure
→ Action: rate-limited + blocked at Cloudflare edge. Password reset email sent.
[CRITICAL] 01:33:18 · AWS IAM privilege escalation attempt · user: ci-deploy-bot
→ Attempted to attach AdministratorAccess policy to unknown role
→ Consistent with supply chain attack pattern (cf. XZ Utils 2024)
→ Action: IAM action denied. GitHub Actions secret rotated. Slack alert sent.