Immutable audit logging for AI agents with hash-chained event logs, integrity verification, and EU AI Act compliance reporting.
The EU AI Act (effective August 2026) requires high-risk AI systems to maintain detailed logs of their operations. Article 12 mandates automatic recording of events for the entire lifecycle of high-risk AI systems.
This MCP server provides:
- Tamper-proof logging — Each event includes the SHA-256 hash of the previous entry, forming an unbreakable chain
- Integrity verification — Detect if any log entries have been modified, deleted, or reordered
- Compliance reports — Export audit trails in JSON or human-readable format for regulators
- Cross-agent search — Search events across all agents by keyword, type, or agent ID
- Statistics — Event rates, error rates, and action frequency analysis
Entry 1: { data, prev_hash: "000...000", hash: "abc123..." }
Entry 2: { data, prev_hash: "abc123...", hash: "def456..." }
Entry 3: { data, prev_hash: "def456...", hash: "ghi789..." }
If any entry is modified, its hash changes, breaking the chain for all subsequent entries. The verify_integrity tool detects this immediately.
pip install agent-audit-trail-mcpAdd to your MCP client config (e.g. Claude Desktop):
{
"mcpServers": {
"audit-trail": {
"command": "audit-trail-server"
}
}
}Or with uvx (no install needed):
{
"mcpServers": {
"audit-trail": {
"command": "uvx",
"args": ["agent-audit-trail-mcp"]
}
}
}| Tool | Description |
|---|---|
log_event |
Log an immutable audit event with timestamp and hash chain |
get_trail |
Retrieve audit trail for an agent (newest first) |
verify_integrity |
Verify the hash chain is intact (no tampering) |
export_report |
Export audit trail as compliance report (JSON or text) |
search_events |
Search across all audit events by keyword |
get_statistics |
Get audit statistics (events/day, error rate, top actions) |
Audit logs are stored in ~/.agent-audit-trail/ as append-only JSONL files (one per agent). Each line is a JSON object with:
timestamp— ISO 8601 UTC timestampagent_id— Which agent performed the actionevent_type— Category (decision, action, error, access, data_processing)action— What was donedetails— Full descriptionoutcome— Result of the actionprev_hash— SHA-256 hash of the previous entryhash— SHA-256 hash of this entry
| Category | Servers |
|---|---|
| 🔗 Blockchain | Solana |
| 🌍 Data | Weather · Germany · Agriculture · Space · Aviation · EU Companies |
| 🔒 Security | Cybersecurity · Policy Gateway · Audit Trail |
| 🤖 Agent Infra | Memory · Directory · Hub · Reputation |
| 🔬 Research | Academic · LLM Benchmark · Legal |
MIT