Product

Everything you need to make audit logs defensible

Not a general-purpose logging tool. Purpose-built for the high-stakes events where tampered records have real consequences.

Tamper-evident chain

SHA-256 hash chaining across every event. Any insertion, modification, or deletion is mathematically detectable — by you, your auditors, or regulators.

Full-text + structured search

Search across event text with Postgres tsvector full-text search. Filter by actor, target, time range, context, and custom metadata.

Auditor-ready exports

Export as CSV or JSON with verification proofs attached. Auditors can verify chain integrity without any access to your infrastructure.

SDK in minutes

One npm install. One function call. Fully typed. Events are normalized, timestamped, and chained automatically.

API key + project isolation

Multiple projects, scoped API keys, team member access. Separation by default.

Verification API

Public endpoints for single-event verification, full chain verification, and machine-readable reports. Works from your CI, your CLI, or your auditor's laptop.