Skip to content

Provenance & Compliance

CT Toolkit's Provenance Log creates an immutable, cryptographically-signed record of every agent interaction.

HMAC Hash Chain

Each entry includes: - SHA-256 hash of the request and response - Reference to the previous entry's hash - HMAC-SHA256 signature

Breaking any entry invalidates the entire chain — making tampering detectable.

Compliance use case

Enterprises can use the Provenance Log to prove to regulators that their deployed agent has maintained consistent identity since day one.

See ProvenanceLog reference for the full API.