Ready to scan your
Infrastructure?

Sentinel-X is a non-invasive, read-only forensic tool. It runs locally in a container to identify zombie resources. No credentials or raw data ever leave your environment.

01

Copy the Docker Launch Command.

02

Replace the *** with your Read-Only AWS Credentials. Never use Admin keys for third-party forensic scans.

03

Execute on your terminal and provide your email to Sync Results.

Launch via Docker

docker run -it --rm \
  -e AWS_ACCESS_KEY_ID=*** \
  -e AWS_SECRET_ACCESS_KEY=*** \
  getghostarchitect/sentinel-x

Requires Docker Runtime // Non-Invasive // Read-Only Access

Ghost Node: Awaiting Connection

Execute the Docker command above to bridge your infrastructure with Sentinel-X.
Real-time sync will activate upon launch.

Security & FAQ

Is my data safe?

Absolutely. Sentinel-X operates under a Zero-Knowledge Architecture. The engine runs locally inside your container, and your AWS credentials never leave your memory space. We only receive an encrypted metadata manifest (resource counts and waste totals) required to generate your Forensic Report.

What access is required?

The tool is strictly Read-Only. It specifically requires ReadOnlyAccess (or a limited policy for Cost Explorer and IAM). Sentinel-X has zero write permissions—it cannot delete, modify, or disrupt your infrastructure. It is a forensic observer, not an operator.

What happens after payment?

You will receive your Full Forensic PDF Report directly. This document identifies the exact Resource IDs and the specific financial leakage of every 'zombie' asset detected during the scan. You get a clear, actionable roadmap of exactly which resources to terminate to stop the budget drain immediately.

Can I run this in Production?

Yes. Sentinel-X is designed for high-uptime environments. It uses standard AWS API calls with a non-intrusive footprint, ensuring zero impact on your production performance or stability. It’s a surgical scan, not a load test.