Signed audit trails for every LLM call through the proxy #25237
Replies: 1 comment
-
|
This is a problem I've been solving at a different layer. Signed audit trails for LLM calls through the proxy is valuable — but the gap I kept hitting was at the action layer, not the call layer. An LLM call might return a plan with 5 steps. The audit trail for the call tells you the model was invoked. It doesn't tell you whether each of those 5 steps was allowed to execute, or whether the agent actually followed its constraints. I built Nobulex for this layer — agents declare behavioral rules, every action gets evaluated before execution, and the decisions go into a SHA-256 hash-chained log. Each entry links to the previous, making tampering detectable. The two layers compose well:
Together you'd have end-to-end cryptographic evidence from prompt to action. Try it: nobulex.com/playground |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Built an integration that cryptographically signs every LLM call routed through litellm, creating a tamper-evident audit trail.
The idea: each proxy request gets an ML-DSA-65 signature chained to the previous one, so you can prove after the fact that no call was modified or deleted.
Each log entry gets a post-quantum signature and a chain hash linking it to the previous entry. You can export the full trail as JSON for compliance reviews.
Useful if you need to demonstrate to auditors that your LLM interactions were not tampered with after the fact - especially relevant for EU AI Act Article 12 logging requirements.
Repo: https://github.com/Upsonic/Upsonic
Beta Was this translation helpful? Give feedback.
All reactions