Audit Logging
Every action in Steward is logged: every signing request, every API proxy call, every policy decision, every credential access. The audit log is append-only, queryable, and exportable.What’s Logged
| Event Type | Description | Example |
|---|---|---|
wallet_sign | Transaction signing request | Agent signed 0.05 ETH to 0xDEX |
wallet_sign_typed | EIP-712 typed data signing | Agent signed permit for USDC |
wallet_sign_solana | Solana transaction signing | Agent signed SOL transfer |
api_proxy | API request through proxy | Agent called OpenAI completions |
policy_evaluate | Policy evaluation result | Spending limit check passed |
secret_decrypt | Credential decryption for injection | OpenAI key decrypted for proxy |
approval_required | Transaction queued for approval | TX exceeds auto-approve threshold |
tx_approved | Manual approval granted | Tenant admin approved TX |
tx_rejected | Transaction rejected | Policy denied or admin rejected |
Log Entry Structure
Every audit log entry includes:Transaction History
Every agent has a complete transaction history:- Status —
signed,pending,rejected - Policy results — full evaluation details
- TX hash — for broadcast transactions
- Timestamps — created, signed, resolved
Webhooks
Steward dispatches webhooks for key events. Configure your webhook URL per-tenant:approval_required
approval_required
tx_signed
tx_signed
tx_rejected
tx_rejected
tx_failed
tx_failed
Compliance
Steward’s audit log supports compliance requirements:- Immutability — Append-only log; entries cannot be modified or deleted
- Retention — Configurable per-tenant (default: 90 days hot storage)
- Export — API endpoint for bulk export (CSV/JSON)
- Partitioning — Monthly partitioned tables for query performance at scale
Related
- Architecture — How audit logging fits into the system
- Tenants API — Configure webhook URLs
- Vault API — Transaction history endpoints