AiAgentKarl/agent-audit-trail-mcp
Immutable audit logging for AI agents — hash-chained event log, integrity verification, EU AI Act compliance
Platform-specific configuration:
{
"mcpServers": {
"agent-audit-trail-mcp": {
"command": "npx",
"args": [
"-y",
"agent-audit-trail-mcp"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
Immutable audit logging for AI agents with hash-chained event logs, integrity verification, and EU AI Act compliance reporting.
The EU AI Act (effective August 2026) requires high-risk AI systems to maintain detailed logs of their operations. Article 12 mandates automatic recording of events for the entire lifecycle of high-risk AI systems.
This MCP server provides:
Entry 1: { data, prev_hash: "000...000", hash: "abc123..." }
Entry 2: { data, prev_hash: "abc123...", hash: "def456..." }
Entry 3: { data, prev_hash: "def456...", hash: "ghi789..." }If any entry is modified, its hash changes, breaking the chain for all subsequent entries. The verify_integrity tool detects this immediately.
pip install agent-audit-trail-mcpAdd to your MCP client config (e.g. Claude Desktop):
{
"mcpServers": {
"audit-trail": {
"command": "audit-trail-server"
}
}
}Or with uvx (no install needed):
{
"mcpServers": {
"audit-trail": {
"command": "uvx",
"args": ["agent-audit-trail-mcp"]
}
}
}| Tool | Description | |------|-------------| | log_event | Log an immutable audit event with timestamp and hash chain | | get_trail | Retrieve audit trail for an agent (newest first) | | verify_integrity | Verify the hash chain is intact (no tampering) | | export_report | Export audit trail as com
Loading reviews...