CRYPTOGRAPHIC AUDIT
Tamper-Evident Hash Chain
Every agent action is SHA-256 hashed and chained. If anything changes, the chain breaks permanently.
How it works
Every governed action produces an event record that is hashed using SHA-256. Each event’s hash includes a reference to the previous event’s hash, forming a cryptographic chain. If any event is modified, deleted, or inserted after the fact, the chain breaks and RANKIGI detects it immediately. The chain is per-agent and append-only — no deletion or modification is possible. RANKIGI’s chain verification endpoint recomputes every hash and confirms the chain is unbroken.
Technical details
event_hash = SHA-256(canonical_json(all event fields)). Canonical JSON: stable alphabetical key ordering, UTF-8, no whitespace. Chain verification: recompute each hash and confirm previous_event_hash matches predecessor. Chain index is monotonically increasing with no gaps.
Compliance mapping
Use cases
- • Forensic investigation of agent incidents
- • Regulatory audit evidence
- • Legal proceedings requiring immutable records