Flat alerts
4,000
findings per week is a familiar volume; the pattern is the point, not the number.
Example alert volume. Not a customer metric.
Product proof
They inherit. They branch. They hide behind trusted roles, service accounts, and policies that look harmless alone. Pathros shows the path, ranks the blast radius, simulates the fix, and exports the proof.
Question 1
A flat dashboard counts findings. Findings count what is misconfigured, not which path can reach the crown jewel.
A familiar pattern: thousands of findings; only a few exploitable paths.
You do not need more alerts. You need the few paths that actually compose into reach.
Flat alerts
4,000
findings per week is a familiar volume; the pattern is the point, not the number.
Example alert volume. Not a customer metric.
Ranked access paths
3
paths that compose into actual reach across systems.
Pathros begins with the path, not the row.
See how this pattern looked in a public-source example: Microsoft Midnight Blizzard
Question 2
A real access path is a sequence of relationships across systems.
Identity, then Group, then Role, then Policy, then Permission, then Resource. Each edge has a source system, a relationship type, and an evidence pointer.
Pathros does not begin with a score. It begins with a canonical access graph.
Canonical access-graph schema. Synthetic example.
Question 3
Pathros traverses the canonical graph deterministically. Each step is grounded in a policy line, a trust relationship, or an effective permission you can read.
You see the path. You see the source system. You see the policy line. You see the evidence for the edge.
GitHub Actions OIDC token can assume role demo_build_role
demo_build_role inherits policy demo_data_policy
demo_data_policy grants read demo_customer_warehouse
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arn:aws:iam::demo_account:role/demo_build_role"
}
]
} Synthetic AWS-style example. Not a real customer policy.
Exact graph reasoning is deterministic traversal over named relationships. Machine learning ranks and discovers; the path itself does not come from a model.
Question 4
Flat ranking treats each alert like a row in a list.
Pathros ranks paths by where they sit in the access hierarchy. The closer a path moves toward broad reach, the harder it is to ignore.
Enterprise identity branches exponentially. Two-dimensional Euclidean layouts force unrelated identities artificially close together.
Hyperbolic geometry has exponential volume growth, so it can hold hierarchical distance without distortion.
Pathros uses this property to rank paths by hierarchical importance, not just alphabetical or chronological order.
Geometric illustration of hyperbolic ranking. Not the production engine.
Question 5
What changes before anything changes?
Pathros simulates the change. A human decides. Nothing executes from this page.
Step 1Before(demo)
The path exists.
demo_ci_token can reach demo_customer_warehouse through demo_build_role.
Step 2Proposed change(demo)
Remove the choke point.
Detach sts:AssumeRole from demo_build_role on demo_data_policy.
Step 3Simulated impact(simulated)
Path severed.
Dependent workloads checked: 0 impacted. Expected breakage: none.
Step 4Human decision(not applied)
A human decides.
Export a ticket for review, or do not apply. Nothing runs from this page.
Simulated dry-run on synthetic data. No real change is made.
Question 6
Example audit receipt format. Synthetic demo data.
Every decision should leave a receipt. The receipt names the finding, the evidence path, the proposed change, the simulated impact, the approver, and the timestamp.
It exports in formats your auditors already accept.
Example audit receipt format. Synthetic demo data.
SHA-256 chain (synthetic example)
5d4a0e5f9b7c8e9d6f3a2b1c0d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2eExample audit receipt format. Synthetic demo data.
Question 7
Limits we name before you ask.
Take the next step
No countdowns. No pressure language. Pick the path that matches where your team is.