Skip to main content
How It WorksSandboxPricing
← All features

CRYPTOGRAPHIC AUDIT

Tamper-Evident Hash Chain

Every agent action is SHA-256 hashed and chained. If anything changes, the chain breaks permanently.

How it works

Every governed action produces an event record that is hashed using SHA-256. Each event’s hash includes a reference to the previous event’s hash, forming a cryptographic chain. If any event is modified, deleted, or inserted after the fact, the chain breaks and RANKIGI detects it immediately. The chain is per-agent and append-only — no deletion or modification is possible. RANKIGI’s chain verification endpoint recomputes every hash and confirms the chain is unbroken.

Technical details

event_hash = SHA-256(canonical_json(all event fields)). Canonical JSON: stable alphabetical key ordering, UTF-8, no whitespace. Chain verification: recompute each hash and confirm previous_event_hash matches predecessor. Chain index is monotonically increasing with no gaps.

Compliance mapping

SOC 2 CC7.1HIPAA 164.312(c)PCI-DSS 10.3ISO 42001 8.4

Use cases

  • Forensic investigation of agent incidents
  • Regulatory audit evidence
  • Legal proceedings requiring immutable records

Related features

Intent ChainIncident ReplayAgent Certificate
Start governing your agents →Read the standard →