Skip to content

feat: post-execution audit trail pattern to complement AgentGovernancePlugin #142

@giskard09

Description

@giskard09

Now that #141 (AgentGovernancePlugin) is merged, the pre-execution governance loop is closed: policy load → tool-call decision → allow/review/block.

The natural next question is post-execution: once the tool call is allowed and executed, is there a standard pattern for recording what actually happened in a tamper-evident way?

The gap: AgentGovernancePlugin captures the decision. Nothing currently captures the outcome — tool name, args hash, output hash, timestamp — in a form that an external auditor can verify independently.

Proposed pattern: an optional audit_backend parameter on AgentGovernancePlugin (or a companion hook) that receives a structured post-execution record after each allowed tool call. Implementations could range from local JSONL to on-chain anchoring (e.g. Mycelium Trails).

This would complete the loop: pre-execution policy check → execution → post-execution evidence. Both sides independently verifiable.

Happy to contribute a spec or draft implementation if there's interest.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions