Local log analysis with PII redaction, threat detection, anomaly detection and LLM-powered insights
Project description
Logatory
Local log analysis with PII redaction, rule-based threat detection, anomaly detection, LLM-powered insights, and a web dashboard — all running on your machine, no data leaves your infrastructure by default.
Or stay in the terminal — format auto-detected, PII redacted, threats flagged:
$ logatory scan tests/data/auth.log
------------------------------------------------------------
Source : tests/data/auth.log
Format : auth_log
Events : 7
PII hits : 5 (mode: redact)
Findings : 1
------------------------------------------------------------
Events (7 of 7):
[ 1] 2026-05-18 10:00:01 INFO Accepted publickey for admin from ip_8390373f port 52341 ssh2
[ 2] 2026-05-18 10:00:15 WARNING Failed password for invalid user guest from ip_2bcf3253 port 22 ssh2
[ 3] 2026-05-18 10:00:16 WARNING Failed password for invalid user guest from ip_2bcf3253 port 22 ssh2
[ 4] 2026-05-18 10:00:17 WARNING Failed password for invalid user guest from ip_2bcf3253 port 22 ssh2
[ 5] 2026-05-18 10:01:00 INFO admin : TTY=pts/0 ; PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl restart nginx
[ 6] 2026-05-18 10:01:30 INFO new user: name=deploy, UID=1002, GID=1002, home=/home/deploy, shell=/bin/bash
[ 7] 2026-05-18 10:02:00 INFO Disconnected from ip_8390373f port 52341
Findings (1):
[LOW] 2026-05-18 10:01:00 sudo_misuse Sudo Command to Root: admin : TTY=pts/0 ; PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl restart nginx
The IP addresses above (ip_8390373f, …) are deterministic pseudonyms — the same IP always maps to the same token, so correlation survives while the raw value never reaches storage. This example is reproducible: the log file ships with the repo.
Table of Contents
- Features
- Quick Start
- Installation
- CLI Reference
- Configuration
- PII Redaction
- Detection Rules
- Plugin System
- Anomaly Detection
- LLM Integration
- Web Dashboard & REST API
- Docker
- Contributing
Features
| Capability | Details |
|---|---|
| Format support | Syslog, Nginx access/error, JSON Lines, Windows Event Log (EVTX), plaintext — auto-detected |
| PII redaction | Emails, IPs, credit cards, phone numbers, UUIDs, JWTs, SSH keys — deterministic pseudonymisation or masking |
| Rule engine | YAML-based rules with contains, regex, startswith, endswith, gte, lte operators; multi-field AND/OR |
| Sigma support | Convert Sigma rules to native format |
| Anomaly detection | Statistical Z-score baseline over 60-second buckets, trains automatically from historical logs |
| LLM integration | Ollama (default), Claude, OpenAI-compatible APIs; explain findings, summarize errors, RAG Q&A |
| Web dashboard | FastAPI + HTMX; findings/errors table, trend chart (ECharts), inline LLM explain, log file upload |
| Log upload | Drag-and-drop log upload in the browser — instant scan with PII redaction, results shown inline |
| REST API v1 | Bearer-token auth, JSON endpoints for findings, errors, stats, live event ingestion |
| OpenSearch | Query and analyse logs from OpenSearch / Elasticsearch clusters |
| Finding persistence | SQLite store for HIGH/CRITICAL findings with retention, dedup, severity filtering |
| FP suppression | Dismiss rules globally or per source file; reversible |
| Markdown export | Automated security reports from the SQLite database |
| Plugin system | Drop Python files into a directory to add custom rules and PII patterns |
| Docker | Multi-stage image, non-root user, /data volume — production-ready |
Quick Start
# Install (core only — no external dependencies beyond PyYAML and typer)
pip install .
# Scan a log file
logatory scan /var/log/syslog
# Watch a file in real time
logatory tail /var/log/nginx/access.log
# Start the web dashboard
pip install '.[web]'
logatory serve
That's it. Open http://localhost:8080 in your browser.
Installation
Requirements: Python 3.11+
Core only
pip install .
Includes: file scanning, PII redaction, rule engine, anomaly detection, findings persistence, Markdown export, plugin system.
Optional feature sets
pip install '.[web]' # web dashboard + REST API (FastAPI, uvicorn, Jinja2)
pip install '.[opensearch]' # OpenSearch / Elasticsearch integration
pip install '.[evtx]' # Windows Event Log (.evtx) support
pip install '.[claude]' # Anthropic Claude API
pip install '.[embed]' # ChromaDB for RAG (llm ask command)
Install everything:
pip install '.[web,opensearch,evtx,claude,embed]'
Shell auto-completion
logatory --install-completion # bash / zsh / fish / PowerShell
CLI Reference
All commands accept --config/-c <path> to specify a config file. Defaults to config.yaml in the working directory.
scan
Parse a log file (or stdin), redact PII, run detection rules, and optionally persist errors and findings.
logatory scan [OPTIONS] [PATH]
| Option | Default | Description |
|---|---|---|
PATH |
stdin | Log file to scan. Use - explicitly for stdin. |
--config/-c |
config.yaml |
Config file path. |
--redact |
redact |
PII handling: redact (hash), mask (<TYPE>), dry-run (show only). |
--limit/-n |
50 |
Max events to display in output. |
--all |
off | Display all events (ignores --limit). |
--format-only |
off | Print detection summary and exit, skip event listing. |
--no-rules |
off | Skip the rule engine entirely. |
--rules-dir |
— | Additional YAML rules directory. |
--track-errors |
off | Persist error groups and HIGH/CRITICAL findings to SQLite. |
--detect-anomalies |
off | Run statistical anomaly detection against the trained baseline. |
--anomaly-source |
file stem | Override the baseline source key. |
--anomaly-threshold |
3.0 |
Z-score threshold for anomaly alerts. |
--explain-findings |
off | Ask the LLM to explain up to 3 HIGH/CRITICAL findings. |
--classify |
off | Ask the LLM to classify a sample of events by severity. |
Examples
# Basic scan with PII masking
logatory scan /var/log/auth.log --redact mask
# Scan a gzip-compressed file and persist results
logatory scan /var/log/nginx/access.log.gz --track-errors
# Read from stdin (e.g. pipe from journalctl)
journalctl -n 1000 | logatory scan -
# Scan with anomaly detection after training the baseline
logatory anomaly learn /var/log/syslog --source syslog
logatory scan /var/log/syslog --detect-anomalies --anomaly-source syslog
# Explain the worst findings with Ollama
logatory scan /var/log/auth.log --track-errors --explain-findings
Docker container logs
No log aggregation stack (ELK, Loki, Graylog) required — if your services run in Docker, pipe their logs straight into Logatory:
# A single container
docker logs my-service | logatory scan -
# A whole Compose project, with error tracking
docker compose logs --no-color | logatory scan - --track-errors
# Follow a container in real time
docker logs -f my-service | logatory scan -
Docker stores container logs as files on the host, so you can also point the file scanner at them directly (needs root):
logatory scan '/var/lib/docker/containers/*/*-json.log'
A native Docker source adapter — auto-discovering containers, tagging each event with its container name, and following them like
tail— is planned. The pipe above is the supported workflow until then.
tail
Watch a log file for new lines in real time. Applies PII redaction and detection rules to every incoming event. Press Ctrl+C to stop.
logatory tail [OPTIONS] PATH
| Option | Default | Description |
|---|---|---|
PATH |
— | Log file to watch (required). |
--redact |
redact |
PII mode: redact, mask, dry-run. |
--from-start |
off | Start from the beginning of the file instead of the tail. |
--no-rules |
off | Skip rule engine. |
--rules-dir |
— | Extra rules directory. |
--track-errors |
off | Persist new errors to SQLite. |
--track-findings |
off | Persist HIGH/CRITICAL findings to SQLite. |
--alert-webhook |
— | POST findings as JSON to this URL. |
--alert-min-severity |
high |
Minimum severity for webhook: low | medium | high | critical. |
--poll-interval |
0.2 |
File poll interval in seconds. |
Dismissed rules (see findings dismiss) are filtered out in real time — no spurious alerts for known false positives.
Examples
# Watch nginx access log and send critical findings to a webhook
logatory tail /var/log/nginx/access.log \
--track-findings \
--alert-webhook https://hooks.example.com/security \
--alert-min-severity high
# Read from the beginning and don't bother persisting
logatory tail /var/log/auth.log --from-start --no-rules
serve
Start the Logatory web dashboard (requires pip install '.[web]').
logatory serve [OPTIONS]
| Option | Default | Description |
|---|---|---|
--host |
127.0.0.1 |
Bind address. Use 0.0.0.0 to expose on all interfaces. |
--port/-p |
8080 |
Port to listen on. |
--config/-c |
config.yaml |
Config file. |
--reload |
off | Auto-reload on source file changes (development mode). |
logatory serve --port 9090
Open http://localhost:8080 to access the dashboard, or http://localhost:8080/api/docs for the interactive REST API documentation.
findings
Browse and manage HIGH/CRITICAL findings persisted by scan --track-errors or tail --track-findings.
logatory findings [list|show|summary|dismiss|undismiss|dismissed]
findings list
logatory findings list [--severity high] [--source nginx.log] [--since 7d] [-n 100]
--since accepts s, m, h, d suffixes: 30m, 24h, 7d, 30d.
findings show <RULE_ID>
Show all stored occurrences for a specific rule:
logatory findings show SSH_BRUTE_FORCE
logatory findings show SSH_BRUTE_FORCE -n 50
findings summary
Print counts by severity and the top 10 rules:
logatory findings summary
findings dismiss <RULE_ID>
Suppress a rule so future scans and tail sessions skip it:
# Global false-positive — suppress everywhere
logatory findings dismiss SSH_BRUTE_FORCE --reason "internal bastion host"
# Suppress only for one source file
logatory findings dismiss NGINX_404_SCAN --source nginx.log --reason "internal scanner"
findings undismiss <RULE_ID>
Re-enable a suppressed rule:
logatory findings undismiss SSH_BRUTE_FORCE
findings dismissed
List all currently active suppressions:
logatory findings dismissed
errors
Browse deduplicated error groups tracked by scan --track-errors.
logatory errors [list|show|new|regression]
errors list
logatory errors list [--sort last_seen|count|first_seen] [--severity error] [-n 50]
errors show <FINGERPRINT>
Show details and the 20 most recent occurrences for an error fingerprint:
logatory errors show abc123def456
errors new
Show errors first seen within a time window — useful for catching regressions after a deploy:
logatory errors new --since 1h
errors regression
Show errors that reappeared after a silence period:
logatory errors regression --silence 24h
rules
Manage and validate detection rules.
logatory rules list [--rules-dir ./my-rules]
logatory rules validate my_rule.yml
logatory rules validate sigma_rule.yml --sigma
anomaly
Train and manage the statistical anomaly detection baseline.
logatory anomaly [learn|status|reset]
anomaly learn
Feed a log file into the baseline. Run this several times on representative logs. At least 5 time buckets are needed before the baseline is considered trained.
logatory anomaly learn /var/log/syslog --source syslog
logatory anomaly learn /var/log/nginx/access.log --source nginx --bucket 300
anomaly status
Show baseline training state for all known source keys:
logatory anomaly status
anomaly reset
Delete baseline data for one source key or all sources:
logatory anomaly reset --source syslog
logatory anomaly reset --all
Once the baseline is trained, enable detection during scan:
logatory scan /var/log/syslog --detect-anomalies --anomaly-source syslog --anomaly-threshold 2.5
llm
LLM-powered log analysis. Supports Ollama (default, local), Claude (Anthropic), and any OpenAI-compatible API.
logatory llm [info|explain|summarize|ask|index]
llm info
Check provider connectivity and list available models:
logatory llm info
llm explain <FINGERPRINT>
Explain a tracked error in plain language:
logatory llm explain abc123def456
llm summarize
Generate a natural-language summary of recent errors:
logatory llm summarize --since 24h
llm ask <QUESTION>
Ask questions about your findings and errors using RAG over the local SQLite database:
# Build the vector index first (requires pip install '.[embed]')
logatory llm index
# Then ask freely
logatory llm ask "What are the most critical security issues from the past week?"
logatory llm ask "Which source files had the most brute-force attempts?"
Privacy note: LLM queries use redacted log data. When using a cloud provider (Claude, OpenAI), a warning is shown before any data is sent.
opensearch
Query and analyse logs from an OpenSearch or Elasticsearch cluster.
logatory opensearch scan [OPTIONS]
logatory opensearch info
Configure the connection in config.yaml under the opensearch: key (see Configuration). Credentials can be set via environment variables to avoid storing them in the config file.
# Check cluster connectivity
logatory opensearch info
# Run detection rules on the last 2 hours of logs
logatory opensearch scan --index "logstash-*" --since 2h --track-errors
export
Generate reports from the SQLite database.
logatory export report [OPTIONS]
| Option | Default | Description |
|---|---|---|
--output/-o |
report.md |
Output file path. |
--since |
168h (7 days) |
Look-back window: 24h, 7d, 30d, etc. |
--severity |
all | Minimum severity filter. |
--title |
Logatory Security Report |
Report title. |
--open |
off | Open the report in the system default app after writing. |
# Weekly security report
logatory export report --since 7d --output weekly.md --open
# Critical-only daily report
logatory export report --since 24h --severity critical --title "Daily Critical Alerts"
demo
Interactive demo and database seeding using synthetic data — no real log files, Ollama, or database required for demo run.
logatory demo [run|seed|clear]
demo run
Guided CLI walkthrough of all 7 feature sections (log parsing, PII, rules, error tracking, findings, anomaly detection, LLM):
logatory demo run # pause after each section
logatory demo run --no-pause # print everything at once
demo seed
Populate the SQLite database with synthetic findings and errors so the web dashboard has something to display immediately. Inserts 25 findings spread over 14 days (for the trend chart) and 5 error groups. All records are tagged internally and never mixed with real data.
logatory demo seed
demo clear
Remove every record written by demo seed. Real findings and errors are never touched.
logatory demo clear
Configuration
Copy config.yaml.example to config.yaml and adapt:
# SQLite database for findings, errors, and baselines
db_path: logatory.db # use /data/logatory.db inside Docker
# Custom PII patterns file (optional)
pii_rules_path: pii_rules.yaml
# Salt for deterministic PII pseudonymisation
# Prefer env var LOGATORY_PII_SALT over storing here
pii_salt: ""
# REST API Bearer token — leave empty to disable auth (local dev)
# Prefer env var LOGATORY_API_TOKEN
api_token: ""
# Plugin directory — all *.py files here are auto-loaded at startup
# plugins_dir: plugins/
# Findings persistence behaviour
# findings_retention_days: 30
# findings_min_severity: high # low | medium | high | critical
llm:
provider: ollama # ollama | claude | openai
model: gemma3:4b
endpoint: http://localhost:11434
temperature: 0.1
max_context_tokens: 8000
# api_key: "" # set via LLM_API_KEY env var for cloud providers
opensearch:
host: localhost
port: 9200
use_ssl: false
verify_certs: true
# Credentials — always prefer env vars:
# OPENSEARCH_USERNAME / OPENSEARCH_PASSWORD
# OPENSEARCH_API_KEY
# OPENSEARCH_CLIENT_CERT / OPENSEARCH_CLIENT_KEY / OPENSEARCH_CA_CERTS
default_index: "logstash-*"
timestamp_field: "@timestamp"
message_field: "message"
severity_field: "level"
source_name_field: "host.name"
Environment variables
| Variable | Description |
|---|---|
LOGATORY_PII_SALT |
Salt for PII pseudonymisation |
LOGATORY_API_TOKEN |
Bearer token for REST API auth |
OPENSEARCH_USERNAME |
OpenSearch basic auth username |
OPENSEARCH_PASSWORD |
OpenSearch basic auth password |
OPENSEARCH_API_KEY |
OpenSearch API key (id:base64key) |
OPENSEARCH_CLIENT_CERT |
Path to client certificate |
OPENSEARCH_CLIENT_KEY |
Path to client private key |
OPENSEARCH_CA_CERTS |
Path to CA certificate bundle |
LOGATORY_CONFIG |
Config file path used by logatory serve --reload |
PII Redaction
PII redaction runs on every log line before analysis. Three modes are available via --redact:
| Mode | Behaviour | Use case |
|---|---|---|
redact (default) |
Replaces PII with a salted HMAC hash: <email_a3f7c1> |
Preserves correlation across events |
mask |
Replaces PII with a generic tag: <email> |
Maximum anonymity |
dry-run |
Reports PII hits without changing the text | Audit what would be redacted |
Built-in patterns: email addresses, IPv4/IPv6, credit cards (Luhn-validated), phone numbers (international), UUIDs, JWTs, SSH private keys.
Custom PII patterns
Add patterns in pii_rules.yaml:
patterns:
- name: employee_id
pattern: '\bEMP-\d{4,8}\b'
prefix: employee # produces <employee_abc123>
- name: order_id
pattern: '\bORD-[A-Z0-9]{8,12}\b'
prefix: order
Or register patterns via the Plugin System.
Detection Rules
Rules live in logatory/rules/builtin/ (shipped) or any YAML file you point to with --rules-dir.
Built-in rules
| ID | Severity | Triggers on |
|---|---|---|
SSH_BRUTE_FORCE |
high | Multiple SSH auth failures from one host |
SUDO_MISUSE |
high | sudo: auth failure / sudo: user NOT in sudoers |
AUTH_NEW_UID0 |
critical | New UID 0 account created |
NGINX_404_SCAN |
medium | High rate of 404 responses (scanner pattern) |
NGINX_5XX_SPIKE |
high | Multiple 5xx errors in a short window |
WIN_FAILED_LOGON |
medium | Windows Event ID 4625 (failed logon) |
WIN_ACCOUNT_CREATED |
medium | Windows Event ID 4720 (account created) |
Writing custom rules
id: MY_RULE_001
title: "Sensitive file accessed"
description: "Fires when /etc/passwd is accessed via nginx"
level: high # low | medium | high | critical
detection:
match:
- field: message
op: contains
value: "/etc/passwd"
- field: message
op: regex
value: 'GET\s+/etc/passwd'
condition: any # any (OR) | all (AND, default)
Supported operators: contains, not_contains, regex, not_regex, startswith, endswith, equals, gte, lte.
Validate a rule before using it:
logatory rules validate my_rule.yml
Sigma rules
Import a Sigma rule and convert it to the native format:
logatory rules validate sigma_rule.yml --sigma
Plugin System
Drop Python files into a directory and register custom rules and PII patterns. Enable in config.yaml:
plugins_dir: plugins/
A plugin file must expose a register(registry) function:
# plugins/my_plugin.py
def register(registry) -> None:
# Custom detection rule
registry.add_rule({
"id": "MY_DB_LEAK",
"title": "Database credentials exposed in log",
"description": "Fires when a connection string appears in a log message.",
"level": "critical",
"detection": {
"match": [
{"field": "message", "op": "regex", "value": r"postgresql://\S+:\S+@"},
]
},
})
# Custom PII pattern — redacts internal employee IDs
registry.add_pii_pattern(
name="employee_id",
pattern=r"\bEMP-\d{4,8}\b",
prefix="employee",
)
# Load an entire directory of YAML rule files
from pathlib import Path
registry.add_rule_dir(Path(__file__).parent / "my_rules")
Plugin rules participate in both logatory scan, logatory tail, and the web dashboard rule engine. Plugin PII patterns apply to every redaction pass. A plugin that raises an exception is logged as a warning and skipped — it never crashes the host process.
Anomaly Detection
Logatory uses a statistical Z-score baseline to detect unusual log activity without writing any rules. Features tracked per 60-second bucket: total event count, error rate, warning rate.
Training workflow:
# Step 1: Feed representative logs (repeat for several days of data)
logatory anomaly learn /var/log/syslog --source syslog
# Step 2: Check training state
logatory anomaly status
# shows: syslog → 42 observations trained ✓
# Step 3: Enable detection in scan or tail
logatory scan /var/log/syslog --detect-anomalies --anomaly-source syslog
At least 5 time buckets are required before the baseline is used. The baseline grows automatically every time you scan with --detect-anomalies — no separate training step is needed once you're in production.
Adjust sensitivity with --anomaly-threshold (default: 3.0 standard deviations):
# More sensitive
logatory scan /var/log/syslog --detect-anomalies --anomaly-threshold 2.0
# Less sensitive
logatory scan /var/log/syslog --detect-anomalies --anomaly-threshold 4.0
LLM Integration
Ollama (recommended — fully local)
# Install and start Ollama: https://ollama.ai
ollama pull gemma3:4b
# Default config already points to http://localhost:11434
logatory llm info
Claude (Anthropic)
# config.yaml
llm:
provider: claude
model: claude-3-5-haiku-20241022
export LLM_API_KEY=sk-ant-...
logatory llm info
OpenAI-compatible APIs
llm:
provider: openai
model: gpt-4o-mini
endpoint: https://api.openai.com/v1
export LLM_API_KEY=sk-...
When using a cloud provider, Logatory prints a warning before sending any redacted data to the external API.
Web Dashboard & REST API
Start the server (requires pip install '.[web]'):
logatory serve --port 8080
Dashboard pages
| URL | Description |
|---|---|
/ |
Overview with 14-day trend chart and quick stats |
/findings |
Findings table with severity filter, inline LLM explain |
/errors |
Error group table with frequency and recency sorting |
/upload |
Drag-and-drop log file upload with instant scan results |
Log file upload
Navigate to /upload in the browser to scan any log file without leaving the dashboard:
- Drag-and-drop or click to browse —
.log,.txt,.gz,.json - Choose PII mode: Redact (pseudonymize), Mask (
<TYPE>), or Dry-run - Results appear inline (no page reload): stat cards, findings table sorted by severity, 20-event sample
- Nothing is persisted — purely transient analysis; use
logatory scan --track-errorsto save results - Maximum upload size: 10 MB
REST API v1
Base path: /api/v1/
Interactive docs: /api/docs
| Method | Path | Description |
|---|---|---|
GET |
/api/v1/health |
Liveness probe (no auth) |
GET |
/api/v1/findings |
List findings (?severity=high&since_hours=24&source=nginx.log) |
GET |
/api/v1/findings/{id} |
Get finding by ID |
GET |
/api/v1/errors |
List error groups (?sort=count) |
GET |
/api/v1/errors/{fingerprint} |
Get error group + recent occurrences |
GET |
/api/v1/stats |
Aggregate counts |
POST |
/api/v1/events |
Ingest a raw log line → returns triggered findings |
Authentication
Set api_token in config.yaml or via LOGATORY_API_TOKEN. Pass it as:
Authorization: Bearer <token>
Leave empty to disable auth (for local development or Docker with network-level access control).
Event ingestion example
curl -X POST http://localhost:8080/api/v1/events \
-H "Authorization: Bearer mytoken" \
-H "Content-Type: application/json" \
-d '{"raw": "Failed password for root from 1.2.3.4 port 22", "source": "sshd"}'
Docker
Quick start
docker compose up -d
The stack starts Logatory on port 8080 with a named volume for the SQLite database.
Environment variables for Docker
# docker-compose.yml (or .env file)
LOGATORY_API_TOKEN=change-me-in-production
LOGATORY_PII_SALT=a-long-random-string
Build and run manually
docker build -t logatory .
docker run -d \
-p 8080:8080 \
-v logatory-data:/data \
-e LOGATORY_API_TOKEN=mytoken \
-e LOGATORY_PII_SALT=mysalt \
logatory
The container runs as a non-root user (logatory, UID 1001). The database and config are stored in /data.
Scanning log files inside Docker
Mount the host log directory and run a one-shot scan:
docker run --rm \
-v /var/log:/logs:ro \
-v logatory-data:/data \
logatory \
logatory scan /logs/syslog --track-errors
Demo data for the web dashboard
Seed the database with synthetic findings and errors so the dashboard shows data immediately:
# Populate (25 findings over 14 days + 5 error groups)
docker compose exec logatory logatory demo seed
# Remove all demo data (real data is untouched)
docker compose exec logatory logatory demo clear
Alternatively, upload a real log file via the browser at http://localhost:8080/upload for an instant, transient scan.
Contributing
Contributions are welcome. See CONTRIBUTING.md for the development setup, the test and lint workflow, the project layout, and how to submit changes.
Security issues: please follow the Security Policy — do not open a public issue.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file logatory-0.2.0.tar.gz.
File metadata
- Download URL: logatory-0.2.0.tar.gz
- Upload date:
- Size: 216.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0970dd94422f0d440218891d2a7c8862a1d1741b6560b68427e06c08e0e5b731
|
|
| MD5 |
15f325e9bd50925bafa92693d00abef6
|
|
| BLAKE2b-256 |
fc2b5c894e3ee43a02f737ca7b681c82a22f54424400308417bad13cbf7925ce
|
Provenance
The following attestation bundles were made for logatory-0.2.0.tar.gz:
Publisher:
publish.yml on T0nd3/logatory
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
logatory-0.2.0.tar.gz -
Subject digest:
0970dd94422f0d440218891d2a7c8862a1d1741b6560b68427e06c08e0e5b731 - Sigstore transparency entry: 1604510771
- Sigstore integration time:
-
Permalink:
T0nd3/logatory@58e6809477ba6ff91db17545d0436cd5e92139b7 -
Branch / Tag:
refs/tags/v0.2.0 - Owner: https://github.com/T0nd3
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@58e6809477ba6ff91db17545d0436cd5e92139b7 -
Trigger Event:
release
-
Statement type:
File details
Details for the file logatory-0.2.0-py3-none-any.whl.
File metadata
- Download URL: logatory-0.2.0-py3-none-any.whl
- Upload date:
- Size: 134.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3b9a6844db82503697dda668ff6ee019d2dbee0b73dfa444ba96dca56e97fe17
|
|
| MD5 |
1a9a1136d2133f558c7c04684cca98fc
|
|
| BLAKE2b-256 |
9c870929b91f4d30b8a3652786d94c2d67b2d2340cd7830fefaa709b8a1bde71
|
Provenance
The following attestation bundles were made for logatory-0.2.0-py3-none-any.whl:
Publisher:
publish.yml on T0nd3/logatory
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
logatory-0.2.0-py3-none-any.whl -
Subject digest:
3b9a6844db82503697dda668ff6ee019d2dbee0b73dfa444ba96dca56e97fe17 - Sigstore transparency entry: 1604510895
- Sigstore integration time:
-
Permalink:
T0nd3/logatory@58e6809477ba6ff91db17545d0436cd5e92139b7 -
Branch / Tag:
refs/tags/v0.2.0 - Owner: https://github.com/T0nd3
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@58e6809477ba6ff91db17545d0436cd5e92139b7 -
Trigger Event:
release
-
Statement type: