What process are you hunting?
Type the image name you're looking for (e.g. curl, powershell, bash). Optionally narrow to spawn chains where a specific ancestor image appears above the match — useful when looking for "agent X ran tool Y indirectly".
Examples:
curl under claude ·
powershell under codex ·
bash under cursor