HMAC-chained audit log
Tamper-evident. Even against DBAs.
Every privileged action writes an audit row. Per-row HMAC-SHA256 signed by the server secret; v3 canonical adds prev_row_hmac so consecutive rows form a chain. Deleting any row breaks the next row's anchor, detected by verify_chain.
z4j dashboard — HMAC-chained audit log
Mockup of the dashboard view for this feature. Live-reloading and themed to match your dashboard.
Ships with
- Per-row HMAC (tamper-evident against modification)
- Chain anchor (tamper-evident against deletion)
- verify_chain walker for offline audit
- Row id folded into HMAC input (prevents row cloning)
Related