Skip to main content

Hash-chained HMAC-signed audit log MCP for A2A (agent-to-agent) calls. Every tool-call, agent-handoff, decision gets a tamper-evident signed record. EU AI Act Art 12 automatic logs, DORA Art 17 ICT incident logs, ISO 42001 clause 9 monitoring — auditor-ready end-of-day attestations. By MEOK AI Labs.

Project description

Agent Audit Logger MCP

Hash-chained, HMAC-signed audit log for A2A agent calls. Tamper-evident by construction. EU AI Act Art 12 / DORA Art 17 / ISO 42001 clause 9 auditor-ready.

By MEOK AI Labs.

Why

When agent A delegates to agent B who invokes tool C, the causal chain disappears the moment anything fails. Auditors need a record that proves:

  • The event actually happened (cryptographic signature)
  • The record wasn't modified after the fact (hash chain)
  • The chain is continuous (no deletions)

Point every agent at this MCP's log tool. Each entry is HMAC-SHA256 signed and hash-chained to the previous entry.

Tools

  • log — append a new (from_agent, to_agent, action, outcome) entry, signed + chained
  • verify_chain — re-verify the entire chain for a tenant; flags the first break
  • search — query by agent, operation, outcome
  • daily_stats — per-day log volume
  • sign_day_attestation — Pro: signed end-of-day evidence packet with tip hash

Install

pip install agent-audit-logger-mcp

Claude Desktop

{
  "mcpServers": {
    "audit": { "command": "agent-audit-logger-mcp" }
  }
}

Example

# In your orchestrator MCP, immediately after an A2A delegation:
log(
    tenant_id="acme-corp",
    from_agent="orchestrator",
    to_agent="compliance-scorer",
    action="score_dora_article_9",
    payload_hash=sha256(payload),
    outcome="success",
    context_csv="high-risk,financial"
)

# End of day: emit signed attestation for auditor
sign_day_attestation(
    tenant_id="acme-corp",
    date_utc="2026-04-23",
    api_key="meok_pro_..."
)

Tiers

  • Free — 1,000 log entries/day, ephemeral, chain verification
  • Pro £199/mo — unlimited + signed end-of-day attestations + chain integrity reports — subscribe
  • Enterprise £1,499/mo — multi-tenant + SIEM webhook push + retention policy — subscribe

Related MEOK MCPs

License

MIT — MEOK AI Labs, 2026.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

agent_audit_logger_mcp-1.0.0.tar.gz (6.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

agent_audit_logger_mcp-1.0.0-py3-none-any.whl (8.6 kB view details)

Uploaded Python 3

File details

Details for the file agent_audit_logger_mcp-1.0.0.tar.gz.

File metadata

  • Download URL: agent_audit_logger_mcp-1.0.0.tar.gz
  • Upload date:
  • Size: 6.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.9.6

File hashes

Hashes for agent_audit_logger_mcp-1.0.0.tar.gz
Algorithm Hash digest
SHA256 e887b7914740894e50a549d3b966570a31d1d38c795c2c035dabaa5ba118a75e
MD5 f96c446d954c3ce8e4c9fb998e156f68
BLAKE2b-256 63643380b399d7eb4a679e89ae8228b3e726b1021e8d7574d81bc05878b0a47f

See more details on using hashes here.

File details

Details for the file agent_audit_logger_mcp-1.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for agent_audit_logger_mcp-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 876e7b22a2004db1f37745867ca8d6458afdaf706311e11b007eff7aaa211c0c
MD5 a6e92f475a9f853bfd30b5431e3070db
BLAKE2b-256 8a89115eebcb6046f88ac13a99f9405b7d53ac2f83487c048c804916e2b0b70f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page