trusthub audit
View, verify, and export the tamper-evident audit log. Every SDK action is recorded with a chained hash so you can detect unauthorized modifications.
Commands
| Command | Description |
|---|---|
| trusthub audit show | Display recent audit entries in a table |
| trusthub audit verify | Verify the integrity of the entire audit hash chain |
| trusthub audit export | Export the audit log to a JSON or CSV file |
Usage
# Show last 20 entries (default)
trusthub audit show
# Filter by agent DID and limit
trusthub audit show --did did:trusthub:acme:abc... --last 50
# Verify the full audit chain
trusthub audit verify
# Export to JSON
trusthub audit export --format json --output audit_export.json
# Export to CSV
trusthub audit export --format csv --output audit_export.csvOptions
| Option | Applies To | Description |
|---|---|---|
| --did | show | Filter entries by agent DID |
| --last | show | Number of recent entries to display (default 20) |
| --format | export | Output format: json or csv (default json) |
| --output | export | Output file path (default audit_export.json) |
Verify Output
The verify command checks every hash link in the audit chain and reports whether tampering is detected.
Audit chain verified!
Entries: 142
Status: All hashes valid, no tampering detected