Skip to main content

Forensic forwarder for AI-agent coding sessions (Claude Code, Codex CLI). Tick-batches transcripts and ships tamper-evident receipts to GhostLogic Blackbox.

Project description

GhostLogic Agent Watchdog

GhostLogic Agent Watchdog is the product surface for the logicd collection daemon. It monitors local AI-agent coding sessions, including Codex CLI and Claude Code, seals them in rolling 10-minute ticks, and ships tamper-evident work receipts to GhostLogic Blackbox over HTTPS.

logicd remains the internal package, module, CLI, and service-runtime name. User-facing docs and plugin metadata should refer to GhostLogic Agent Watchdog.

Repository: ghostlogic-agent-watchdog. Plugin manifest name: ghostlogic-agent-watchdog. The daemon command remains logicd.

Scope

  • Sources: Claude Code (~/.claude/projects/**/*.jsonl), Codex CLI (~/.codex/sessions/**/*.jsonl, ~/.codex/history.jsonl).
  • Capture model: tick-based. 10-minute ticks. Every event carries its tick_index; the server-side aggregator applies a 7-day rolling window as retention policy. The client does not enforce retention.
  • Transport: POST https://api.ghostlogic.tech/api/v1/ingest with Authorization: Bearer <key>.
  • Runtime: foreground Python process or a persistent platform launcher. On Windows, logicd install registers an ONSTART scheduled task named logicd that runs as SYSTEM. macOS/Linux still print platform service instructions. Read-only on source files. ACL-locked config.
  • Platforms: Windows, macOS, Linux (all three).
  • Forensic posture:
    • SHA-256 on every source line.
    • Deterministic batch_id (sha256 of sorted event_ids) for idempotent retries and server dedupe.
    • Append-only hash-chained audit log (audit.log) of every forwarder activity.
    • Byte offsets advance only after a batch has been durably handled (shipped or dead-lettered). Process death before durability means the next run re-reads those bytes, so no data loss is expected.
    • Dead-lettered batches replay on startup with the original batch_id preserved.
    • Every event carries line_number, byte_offset, byte_end, sha256, source adapter, and captured_at_ns for pinpointable forensic mapping.

Windows Self-Serve Install

Run PowerShell as Administrator:

python -m pip install --upgrade ghostlogic-agent-watchdog
logicd enroll --token gl_enroll_xxx --endpoint-name $env:COMPUTERNAME --agent-id logicd
logicd install

logicd enroll redeems the one-time gl_enroll_... token with https://api.ghostlogic.tech/api/v1/enroll, writes the scoped gl_agent_* key locally, and does not print the full key. logicd install uses the enrolled config and does not prompt for a raw API key.

Default locations

Platform Config + state directory ACL method Service instructions
Windows %PROGRAMDATA%\GhostLogic\ icacls - SYSTEM + Administrators Scheduled Task logicd
macOS ~/Library/Application Support/GhostLogic/ chmod 600 - owner only launchd LaunchAgent (per-user)
Linux $XDG_CONFIG_HOME/ghostlogic/ or ~/.config/ghostlogic/ chmod 600 - owner only systemd --user unit (or system unit for root install)

Override the default with --data-dir:

logicd enroll --token gl_enroll_xxx --data-dir /opt/ghostlogic
logicd install --data-dir /opt/ghostlogic

Legacy/manual mode is still available for operators who already have a scoped gl_agent_* key:

logicd install --legacy-api-key

Run (foreground)

python -m logicd run --config /path/to/config.toml

Paths work the same on all three OSes; use your platform's path form.

Naming Split

  • Product and plugin display name: GhostLogic Agent Watchdog
  • Repository: ghostlogic-agent-watchdog
  • Package and plugin manifest name: ghostlogic-agent-watchdog
  • Internal Python package and CLI module: logicd
  • Internal config, unit, and label identifiers may still use logicd where stability matters

License

Apache-2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ghostlogic_agent_watchdog-0.3.4.tar.gz (48.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ghostlogic_agent_watchdog-0.3.4-py3-none-any.whl (41.4 kB view details)

Uploaded Python 3

File details

Details for the file ghostlogic_agent_watchdog-0.3.4.tar.gz.

File metadata

File hashes

Hashes for ghostlogic_agent_watchdog-0.3.4.tar.gz
Algorithm Hash digest
SHA256 da8add3224f38ba9252f5db592c3e0d40cedc8b60fd929a8122cfa09f151516e
MD5 3c3d93cd2c912b1fff8a298c8350be0f
BLAKE2b-256 4a6c8c5313c3e31b25f01af1ec582d4fe1f2a610564b037bc1c9ace166b6c873

See more details on using hashes here.

File details

Details for the file ghostlogic_agent_watchdog-0.3.4-py3-none-any.whl.

File metadata

File hashes

Hashes for ghostlogic_agent_watchdog-0.3.4-py3-none-any.whl
Algorithm Hash digest
SHA256 a5263f013845f4d7e0b905e502dfd22b51c35e2f5d4a16837eec2df49eb84603
MD5 fcfa047258766c0da730b5d1cd301b2f
BLAKE2b-256 3d7386e28c0390c20b2b41511d8b42479bf1226deed40a5dce5b4c9a5bc5601b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page