Agent executions are logged with cryptographic hashing for audit purposes.
How It Works
The audit system creates a hash-chained log of execution records:1
Event Capture
System records agent executions automatically
2
Hash Generation
Each log entry includes a SHA-256 hash of its contents
3
Chain Linking
Each hash includes the previous entry’s hash, creating a chain
4
Verification
Changes to past entries can be detected via hash verification (for tamper-evidence)
Viewing Audit Logs
Via UI
Navigate to Executions in the AgentSystems UI at http://localhost:3001. The UI displays:- Execution timeline
- Agent details
- Request/response data
- Hash verification (for tamper-evidence) status
- Filter and search options
Audit Features
Change Detection
Can help detect modifications to past logs
Audit Trail
Cryptographic hashing (for tamper-evidence) of execution history
Time Ordering
Records chronological sequence of events
Hash Verification
Uses SHA-256 hashing for verification (tamper-evidence)

