Product
Everything you need to make audit logs defensible
Not a general-purpose logging tool. Purpose-built for the high-stakes events where tampered records have real consequences.
Tamper-evident chain
SHA-256 hash chaining across every event. Any insertion, modification, or deletion is mathematically detectable — by you, your auditors, or regulators.
Full-text + structured search
Search across event text with Postgres tsvector full-text search. Filter by actor, target, time range, context, and custom metadata.
Auditor-ready exports
Export as CSV or JSON with verification proofs attached. Auditors can verify chain integrity without any access to your infrastructure.
SDK in minutes
One npm install. One function call. Fully typed. Events are normalized, timestamped, and chained automatically.
API key + project isolation
Multiple projects, scoped API keys, team member access. Separation by default.
Verification API
Public endpoints for single-event verification, full chain verification, and machine-readable reports. Works from your CI, your CLI, or your auditor's laptop.