Overview
AgentSystems Notary creates cryptographically verifiable audit trails for AI systems.Why
When AI behavior is questioned by customers, auditors, regulators, insurers, etc., you need to prove what actually happened. Traditional logs don’t work: you control them, so third parties have to trust you didn’t modify them. Tamper-evident logging removes that trust requirement.How it works
Raw LLM interactions stay in your storage. No third party sees them during normal operation. But cryptographic hashes of each interaction are written to independent storage (Arweave or the AgentSystems API) at the same time. If there’s ever an audit or dispute, you provide the raw logs. The auditor re-hashes them and compares against the stored hashes. A match indicates the logs are unaltered. A mismatch indicates tampering or corruption. You control your data, but can’t alter it without detection. What gets logged:- To your storage: input prompt, response text, agent metadata, session IDs, timestamps
- To ledger: SHA-256 hash + metadata (e.g. namespace, session ID, timestamps)
Hash storage options
Hashes (not raw data) can be written to either storage option:| Storage | Best For | Features |
|---|---|---|
| Decentralized (Arweave) | No vendor lock-in | Public append-only ledger, open-source verification, no account needed |
| Custodied | Managed compliance | Write-once storage, verification UI, signed attestations for audits |
Custodied plans offer WORM-compliant hash storage, managed signing, and signed attestations.
Prerequisites
Example (decentralized)
Generate signing key
Verification
Decentralized (Arweave): Download raw payloads from your storage bucket, then verify with the open-source CLI:Configuration
- Raw payload storage options (AWS S3, GCS, etc.)
- Signers for Arweave (local key, AWS KMS)
- Hash storage options (Arweave, Custodied)