API · Connectors · Integrity
Instrument agents. Ship evidence, not screenshots.
CounterAudit ingests events from your stack, normalizes them to a canonical audit packet,
and prepares them for sealing, chain linking, and external timestamp anchoring—so
security and compliance get one coherent trail across frameworks and clouds.
POST /v1/audit/ingest
GET /v1/audit/verify/:packet_id
Connector registry
REST ingest
Send a connector identifier, organization context, and the raw event payload. The
service hashes the raw event, applies connector mapping, and returns packet identifiers
for verification workflows as the pipeline is fully deployed.
Example request
Authenticate with API keys in the same family as your other production systems (format
and rotation patterns documented with the full API release).
POST /v1/audit/ingest
Content-Type: application/json
{
"connector_id": "langchain-v0.3",
"raw_event": { "event": "chain_end", "run_id": "…" },
"org_id": "550e8400-e29b-41d4-a716-446655440000"
}
Native depth
First-party connectors preserve full packet fidelity for trust and provenance platforms
already in your architecture.
SDK instrumentation
Language-native callbacks and wrappers meet agents where they run—without forcing every
team through the same middleware.
Webhooks & streams
Map cloud control-plane and observability events into the same canonical schema with
field-mapping configuration.
SDK roadmap
@counteraudit/sdk (TypeScript) and counteraudit (Python) will mirror the
product specification—callbacks for common orchestration stacks and offline chain
verification helpers for CI and security gates.
npm
PyPI
LangChain-style
Secure by design
Prompt and sensitive payloads are hashed—not persisted in audit records. Keys are
referenced by id (KMS-ready). Timestamping is designed to run asynchronously so ingest
stays resilient when a TSA is unreachable.