- Imported AD1 Claude session files to clients/dataforth/session-logs/ - Created memory: project_datasheet_pipeline.md (full pipeline architecture) - Created memory: project_dataforth_incident_2026-03-27.md (security incident + MFA) - Updated MEMORY.md index - Updated session log with AD1 pipeline rebuild findings Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
12 lines
739 B
Markdown
12 lines
739 B
Markdown
---
|
|
name: AD2 crypto wipe context
|
|
description: This machine is AD2 (not AD1), wiped months ago due to crypto attack. Many files may be missing. Investigation is about reconstructing test datasheet pipeline from surviving files.
|
|
type: project
|
|
---
|
|
|
|
This machine (192.168.0.6) is AD2, which was wiped several months ago due to a cryptocurrency/ransomware attack. Some files are completely missing.
|
|
|
|
**Why:** Need to reconstruct understanding of the test datasheet data path from whatever surviving files and context clues remain, particularly on the \\AD1\ENGR share.
|
|
|
|
**How to apply:** Don't assume files exist locally on AD2. Look at \\AD1\ENGR\ and other network shares for clues. Be thorough in searching since evidence may be scattered.
|