Home Platform Audit Trail

Cryptographically Signed Audit Records

Every trust signal and task step Ed25519 signed at creation. Tamper-evident audit trail with SIEM webhook export.

Tamper-Evident by Design

Every record carries a cryptographic signature from the moment it is created. Retroactive manipulation is mathematically impossible.

Audit Records That Prove Their Own Integrity

When a regulator asks "how do you know this trust signal was not modified after the fact?" most platforms have no answer. DAT signs every trust signal and every task step with Ed25519 at the moment of creation. The signature, signed payload, and signer DID are stored alongside the record. Anyone can verify integrity independently using the public key endpoint — no database access required.

  • Trust Signal Signing — Every signal created by the reputation service is signed by did:dat:service:reputation. Canonical JSON payload ensures deterministic signature verification
  • Task Step Signing — Every ReAct iteration step (thought, action, observation) is signed by the agent's own DID. The agent cryptographically attests to its own execution trace
  • Signature Format — hex:timestamp:nonce — the signature includes a timestamp and nonce to prevent replay attacks and prove creation time
  • Public Verification — GET /api/v1/signals/meta/signing-key returns the public key. POST /api/v1/signals/meta/verify validates any record. Zero trust required
Ed25519 Audit Record Signing
==============================

On TrustSignal creation:
  1. Build canonical payload
     payload = JSON.stringify({
       agentDid, signal, category,
       weight, description, source,
       pillar, metadata
     })

  2. Sign with service key
     signature = Ed25519.sign(
       payload,
       privateKey  // AES-256-GCM
     )                // encrypted

  3. Store alongside record
     record.signature    = "a7f3..."
     record.signedPayload = base64
     record.signerDid    = "did:dat:
       service:reputation"

Verification (anyone, anytime):
  GET  /signing-key -> publicKey
  POST /verify {
    signature, signedPayload
  }
  -> { valid: true,
       signerDid: "did:dat:..." }

Tamper attempt:
  Modify record -> signature invalid
  Re-sign -> wrong private key
  Forge key -> DID resolution fails

SIEM Webhook Export

Forward signed events to Splunk, Sentinel, Elastic, or Datadog in real time. Your SOC sees everything.

Your SIEM, Your Rules, Our Signatures

Enterprise SOC teams do not monitor agent platforms through custom dashboards. They use Splunk, Microsoft Sentinel, Elastic, and Datadog. DAT's SIEM webhook export sends every trust signal, security event, investigation action, and approval decision to your existing infrastructure in a standardized JSON envelope, cryptographically signed with Ed25519 so your SIEM can verify authenticity independently.

  • 7 Event Categories — trust_signal, security_event, investigation, approval, user_action, compliance_report, shadow_agent. Each with calibrated severity (1-10)
  • SiemEnvelope Format — Standardized JSON with version, ID, timestamp, source, orgDid, eventCategory, severity, and full event data. Parseable by any SIEM
  • Ed25519 Envelope Signing — Every envelope is signed before delivery. Public key available at /api/v1/siem/signing-key. Dual delivery: JSON body fields + X-DAT-SIEM-Signature header
  • Smart Failure Handling — Auto-disables after 10 consecutive delivery failures. No silent data loss — delivery status tracked per organization
SIEM Webhook Export Pipeline
==============================

Source Services (8 total):
  reputation  -> trust signals
  identity    -> security events
  dat-agent   -> approvals, denials,
                 DLP, skills, nego.
  org-webhook -> test events

SiemEnvelope:
{
  "version": "1.0.0",
  "id": "uuid-v4",
  "timestamp": "2026-03-04T...",
  "source": "dat-platform",
  "orgDid": "did:dat:...",
  "eventCategory": "trust_signal",
  "eventType": "action_success",
  "severity": 3,
  "agentDid": "did:dat:...",
  "data": { ... },
  "signature": "hex...",
  "signedAt": "2026-03-04T...",
  "signerPublicKey": "hex..."
}

Auth Types:
  bearer  -> Splunk HEC, Datadog
  header  -> Elastic, Sentinel
  none    -> internal/test

Auto-disable: 10 consecutive fails
Recovery: admin re-enables in UI

Compliance Report Templates

Generate SOC2, GDPR, and EU AI Act compliance reports with a single click. Export as PDF or CSV.

Audit-Ready Reports in Seconds, Not Weeks

Preparing for a SOC2 Type II audit typically means weeks of manual evidence collection. DAT automates this entirely. The compliance report engine aggregates data from security events, user audit logs, agent registrations, SIEM configurations, and trust scores into structured reports that map directly to compliance control frameworks. Each report includes a weighted compliance score, open issue detection, and exportable evidence.

  • SOC2 Type II — 6 sections mapped to Common Criteria controls (CC6.1, CC6.6, CC7.2). Access control, change management, risk assessment, monitoring, incident response, data protection
  • GDPR Article 32 — 5 sections covering data protection measures, access controls, encryption status, breach notification readiness, and data subject rights
  • EU AI Act — 5 sections addressing AI system transparency, risk management, human oversight, data governance, and technical documentation
  • 100-Point Scoring — 7 weighted criteria: 2FA adoption, SIEM status, blacklisted agents, average trust, violations, audit completeness, failed login rate
Compliance Report Generation
==============================

Report Types:
  SOC2     -> 6 sections, CC refs
  GDPR     -> 5 sections, Art. 32
  EU_AI_ACT -> 5 sections
  General  -> custom

Scoring Formula (100 pts):
  2FA adoption      (15 pts)
  SIEM configured   (15 pts)
  No blacklisted    (15 pts)
  Avg trust >= 60   (15 pts)
  Low violations    (15 pts)
  Audit complete    (15 pts)
  Low failed logins (10 pts)

Open Issue Detection (7 checks):
  - Users without 2FA
  - SIEM not configured
  - Blacklisted agents present
  - Low average trust score
  - High violation count
  - Incomplete audit trail
  - Elevated failed login rate

Export Formats:
  PDF  -> jsPDF + AutoTable
  CSV  -> BOM-prefixed Blob
  SIEM -> compliance_report event

Caching:
  Redis 24h TTL per report
  History: last 20 per org
Ed25519
Record Signing
7
Event Categories
3
Report Templates
SIEM
Real-Time Export

Compliance Without the Busywork

Deploy agents with audit trails that satisfy SOC2, GDPR, and EU AI Act requirements out of the box. Start with a free account.