Cryptographic audit trail for Semantic Kernel plugin invocations #13740
jagmarques
started this conversation in
Show and tell
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Built an integration that signs every plugin invocation and agent step in Semantic Kernel with post-quantum signatures, creating a tamper-evident audit log.
The problem: when agents invoke plugins and chain actions together, you need an independent record that no action was modified or deleted after the fact.
Each entry gets an ML-DSA-65 signature hash-chained to the previous one. Export the trail as JSON for compliance reviews.
Useful for enterprise deployments where you need to prove to auditors exactly what your AI system did - EU AI Act Article 12, SOC 2, etc.
Repo: https://github.com/Upsonic/Upsonic
Beta Was this translation helpful? Give feedback.
All reactions