attesta audit subcommands let you inspect and verify the SHA-256 hash-chained audit trail that Attesta produces. Every gated action — approved, denied, timed out, or escalated — is recorded in a JSONL file with cryptographic integrity guarantees.
Shared Options
Allattesta audit subcommands accept:
| Flag | Default | Description |
|---|---|---|
--log PATH | .attesta/audit.jsonl | Path to the audit log file |
attesta audit verify
Verify the hash-chain integrity of the audit log. Each entry contains a SHA-256 hash of the previous entry, forming a tamper-evident chain. If any entry has been modified, inserted, or deleted, the chain breaks.Usage
Example Output (Intact)
Example Output (Broken)
0 on success and code 1 if the chain is broken, making it suitable for CI pipelines:
attesta audit stats
Print comprehensive approval statistics from the audit log, including totals by verdict, average review time, rubber-stamp rate, and risk level distribution.Usage
Example Output
Understanding the Output
| Metric | Description |
|---|---|
| Approved | Actions that passed their challenge and were executed |
| Denied | Actions explicitly rejected by the operator |
| Modified | Actions approved with modifications to the original parameters |
| Escalated | Actions forwarded to a secondary approver or webhook |
| Timed out | Actions where the review period expired without a response |
| Avg review time | Mean time operators spent reviewing before making a decision |
| Rubber stamp rate | Percentage of approved high/critical actions with suspiciously fast review times |
attesta audit rubber-stamps
List individual audit entries that were approved suspiciously fast relative to their risk level. These are potential rubber stamps — approvals where the operator likely did not read or understand the action.Usage
| Flag | Default | Description |
|---|---|---|
--max-seconds | 5.0 | Maximum review time (in seconds) to flag as a rubber stamp |
--min-risk | high | Minimum risk level to consider (low, medium, high, critical) |
Example Output
Narrowing the Search
Find only critical-risk rubber stamps approved in under 3 seconds:CI/CD Integration
You can use audit commands in CI/CD pipelines to enforce audit hygiene:github-actions.yml
The audit log is append-only by design. Attesta never modifies or deletes existing entries. The hash chain makes any external tampering detectable via
attesta audit verify.Next Steps
attesta trust
Manage agent trust profiles
Audit Trail Concepts
Learn how the hash-chained audit log works