# agent-audit-trail

Creates a tamper-evident, HMAC-signed log entry for every agent action. No database, no infrastructure — just a cryptographically verifiable receipt you store yourself. Built for HIPAA, SOC2, and any…

## Quick Start

```bash
# Connect this server (installs CLI if needed)
npx -y @smithery/cli@latest mcp add found402/agent-audit-trail

# Browse available tools
npx -y @smithery/cli@latest tool list found402/agent-audit-trail

# Get full schema for a tool
npx -y @smithery/cli@latest tool get found402/agent-audit-trail log_agent_action

# Call a tool
npx -y @smithery/cli@latest tool call found402/agent-audit-trail log_agent_action '{}'
```

## Direct MCP Connection

Endpoint: `https://agent-audit-trail--found402.run.tools`

## Tools (1)

- `log_agent_action` — Creates a tamper-evident, HMAC-signed audit log entry for an agent action. Returns a signed receipt the caller stores.

```bash
# Get full input/output schema for a tool
npx -y @smithery/cli@latest tool get found402/agent-audit-trail <tool-name>
```
