What gets recorded
Every entry in the audit trail captures:- Agent identity — DID of the acting agent
- Action — tool name and arguments
- Policy decision — allowed, blocked, or escalated, with the reason
- Policy snapshot reference — the exact SHA-256 snapshot ID of the
.drako.yamlin effect at the time of the action - Intent proof — the Ed25519-signed intent token from Gate 1 and Gate 2 of the enforcement pipeline
- Cost — token usage and estimated USD cost
- Timestamp — RFC 3339, UTC
Cryptographic properties
Withcryptographic: true, the audit trail cannot be altered after the fact without detection:
- SHA-256 hash chain — each entry includes the hash of the previous entry; tampering with any record breaks the chain
- Ed25519 signatures — each entry is signed with Drako’s private key; signatures can be verified independently
- Tamper-evident — any modification to a historical record is detectable by re-running the chain verification
Configuration
| Field | Default | Description |
|---|---|---|
enabled | true | Enable audit logging |
cryptographic | false | Enable SHA-256 hash chain and Ed25519 digital signatures |
retention_days | 7 | How long to retain audit records |
cryptographic: true is required for EU AI Act Article 12 (record-keeping) and SOC 2 Type II audit evidence. The eu-ai-act and enterprise policy templates enable it by default.Context versioning
Every time you push a new.drako.yaml, Drako creates an immutable SHA-256 snapshot of the policy. Audit log entries reference the snapshot ID — not the current config — so you can always determine exactly which policy was in effect when any action occurred.
Exporting for compliance
The audit trail can be exported for regulators, external auditors, and SIEM/observability platforms.- OTEL (Datadog / Grafana / New Relic)
- SIEM (Splunk / ELK)
- Compliance report
Pipe traces via OpenTelemetry to any OTEL-compatible backend:
EU AI Act Article 12
Article 12 of the EU AI Act requires high-risk AI systems to automatically log events for the lifetime of the system. Drako’s audit trail satisfies Article 12 by:- Recording every action automatically, without requiring agent code changes
- Linking each record to the exact policy version active at the time
- Providing cryptographic integrity guarantees
- Supporting configurable retention (set
retention_days: 365or higher for systems subject to Art. 12) - Generating exportable compliance reports from real runtime data