# Detections

Harden-Runner can monitor outbound runtime detections to help you stay informed about security risks in your pipelines. You can review all past runtime detections on the **Detections** page under the **Harden-Runner** menu.

The **Detections** page covers four critical areas:

1. Outbound Calls Blocked
2. Anomalous Outbound Network Calls
3. Suspicious Process Events
4. Source Code Overwritten

Each detection is linked to the relevant project and includes direct links to the run and the insights URL that indicates where the detection happened.

1. **Outbound Calls Blocked**: Shows network requests that were blocked to prevent security risks.

<figure><img src="https://1410514776-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdMU7uDytQwFdSykTeAVU%2Fuploads%2FB49KJJoxvbZlZkYLHk6x%2FScreenshot%202025-10-07%20at%206.59.54%E2%80%AFPM.png?alt=media&#x26;token=82519023-d1d7-4019-93b8-189b5ab36f86" alt=""><figcaption></figcaption></figure>

2. **Anomalous Outbound Network Calls**: Lists unusual or unexpected external network requests.

<figure><img src="https://1410514776-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdMU7uDytQwFdSykTeAVU%2Fuploads%2FEiMLo9HrUsU255EIRhNQ%2FScreenshot%202025-10-07%20at%207.00.05%E2%80%AFPM.png?alt=media&#x26;token=b35fe65e-9756-48f0-bcb7-a6a72ff00d00" alt=""><figcaption></figcaption></figure>

3. **Suspicious Process Events:** Lists process events that are flagged as suspicious.

<figure><img src="https://1410514776-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdMU7uDytQwFdSykTeAVU%2Fuploads%2FWdIGn1hZY2SlMM4bXaH6%2FScreenshot%202025-10-07%20at%207.00.12%E2%80%AFPM.png?alt=media&#x26;token=ef851b79-69a9-4e0e-99da-b8047491a95d" alt=""><figcaption></figcaption></figure>

4. **Source Code Overwritten**: Tracks files modified during workflows to detect unauthorized changes.

<figure><img src="https://1410514776-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdMU7uDytQwFdSykTeAVU%2Fuploads%2FNO4g3LL4hjNWfDMq1Rgy%2Fimage%20(29).png?alt=media&#x26;token=8c66ef13-0b15-4189-a4ee-32128b3c42fa" alt=""><figcaption></figcaption></figure>
