Skip to main content

Audit Logs

The audit log viewer provides a visual interface for reviewing all vault activity. Every action is recorded with tamper-evident cryptographic chaining.

Prerequisites

Accessing Audit Logs

Open Audit Log

  1. Click the clipboard icon in the header bar
  2. Or navigate from the secrets page

The audit log page displays activity history with filtering options.

Understanding the Interface

Header Section

The header displays:

  • Back button - Return to secrets page
  • Verify Chain - Check audit log integrity
  • Export buttons - Download as CSV or JSON
  • Chain status - Current verification result
  • Statistics - Total, success, and failure counts

Filter Bar

Available filters:

FilterOptionsPurpose
ActionAll, Get, Set, Delete, List, Unlock, Lock, InitFilter by operation type
SourceAll, CLI, MCP, DesktopFilter by access method
KeyText inputSearch by secret key
Date RangeStart and end datesFilter by time period

Log Table

Each row shows:

ColumnDescription
TimestampWhen the action occurred
ActionWhat operation was performed
SourceHow the vault was accessed
KeyWhich secret was affected (if applicable)
StatusSuccess or failure indicator

Filtering Logs

By Action Type

Filter to see specific operations:

  1. Click the Action dropdown
  2. Select an action type
  3. Click Apply

Action types:

ActionDescription
secret.getSecret value was retrieved
secret.setSecret was created or updated
secret.deleteSecret was deleted
secret.listSecret list was viewed
auth.unlockVault was unlocked
auth.lockVault was locked
vault.initVault was initialized

By Source

See how the vault was accessed:

SourceDescription
CLICommand-line interface
MCPAI tool integration
DesktopDesktop application

This helps distinguish between different access methods.

By Secret Key

Search for activity on a specific secret:

  1. Enter the key name (or partial match)
  2. Click Apply

Useful for investigating who accessed a particular secret.

By Date Range

Filter to a specific time period:

  1. Set Start date (beginning of range)
  2. Set End date (end of range)
  3. Click Apply

Helpful for compliance audits or incident investigation.

Clear Filters

Remove all filters to see full history:

  1. Click Clear
  2. All filters reset to default

Chain Verification

What is Chain Verification?

Each audit log entry is cryptographically linked to the previous entry using HMAC-SHA256. This creates a tamper-evident chain:

  • Modifying any entry breaks the chain
  • Deleting entries breaks the chain
  • Order changes break the chain

Verify the Chain

  1. Click Verify Chain button
  2. Wait for verification to complete
  3. Check the status indicator

Verification Results

StatusIconMeaning
VerifiedGreen checkmarkChain is intact, no tampering detected
InvalidRed XChain is broken, possible tampering
CheckingGray spinnerVerification in progress
warning

If chain verification fails, your audit logs may have been tampered with. This is a serious security concern that should be investigated immediately.

Viewing Details

Open Detail Modal

Click any log entry to see full details:

  • Timestamp - Full date and time
  • Action - Operation performed
  • Source - Access method
  • Key - Secret key (if applicable)
  • Status - Success or failure
  • Error - Error message (if failed)

Close Detail Modal

  • Click outside the modal
  • Click the X button
  • Press Escape

Exporting Logs

Export to CSV

For spreadsheet analysis:

  1. Apply any desired filters
  2. Click CSV button
  3. File downloads automatically

CSV format:

Timestamp,Action,Source,Key,Status,Error
2025-01-15T10:30:00Z,secret.get,cli,API_KEY,Success,
2025-01-15T10:25:00Z,secret.set,desktop,DB_PASSWORD,Success,

Export to JSON

For programmatic processing:

  1. Apply any desired filters
  2. Click JSON button
  3. File downloads automatically

JSON format:

[
{
"timestamp": "2025-01-15T10:30:00Z",
"action": "secret.get",
"source": "cli",
"key": "API_KEY",
"success": true,
"error": ""
}
]

Export Tips

  • Filters apply to exports (export only what you need)
  • Large exports may take a moment
  • Files are named audit-logs.csv or audit-logs.json

Pagination

For large audit histories:

  • Prev - Go to previous page
  • Next - Go to next page
  • Page indicator shows current position

Each page displays 20 entries.

Page Information

The footer shows:

  • Current range (e.g., "Showing 1-20 of 150")
  • Page number (e.g., "Page 1 of 8")

Use Cases

Security Incident Investigation

When investigating a potential breach:

  1. Filter by the date range of the incident
  2. Look for unusual source patterns
  3. Check for failed auth.unlock attempts
  4. Export evidence as JSON

Compliance Audit

For regulatory compliance:

  1. Set date range to audit period
  2. Export complete log as CSV
  3. Provide to compliance team
  4. Document chain verification status

Access Review

Review who accessed what:

  1. Filter by specific key
  2. Review all access by source
  3. Identify patterns or anomalies
  4. Document findings

Troubleshooting Failures

When operations fail:

  1. Filter by status (failures)
  2. Check the error message in detail view
  3. Identify the source and action
  4. Address the root cause

Understanding Actions

Authentication Actions

ActionTriggered By
vault.initFirst-time vault creation
auth.unlockEntering master password
auth.lockManual lock or auto-lock

Secret Actions

ActionTriggered By
secret.listViewing secret list
secret.getViewing secret value
secret.setCreating or updating
secret.deleteRemoving a secret

Source Identification

SourceWhen Used
clisecretctl command-line tool
mcpAI coding assistant integration
uiDesktop application

Statistics

Understanding Stats

The header shows aggregated statistics:

  • Total: All recorded actions
  • Success: Successfully completed actions
  • Failure: Failed actions

Interpreting Numbers

High failure count may indicate:

  • Incorrect password attempts
  • Permission issues
  • System errors

Unexpected sources may indicate:

  • Unauthorized access attempts
  • Misconfigured integrations

Best Practices

Regular Reviews

Schedule periodic audit reviews:

  • Weekly: Quick scan for anomalies
  • Monthly: Full export and analysis
  • Quarterly: Compliance documentation

Verify Chain Regularly

Run chain verification:

  • After any suspicious activity
  • Before compliance audits
  • After system maintenance

Export for Backup

Keep offline copies:

  • Export monthly archives
  • Store in secure location
  • Include verification results

Monitor Sources

Track access patterns:

  • Unexpected MCP access may indicate AI tool misconfiguration
  • CLI access during off-hours may need investigation
  • Desktop access from unusual patterns worth reviewing

Troubleshooting

No Logs Displayed

Possible causes:

  • Filters too restrictive - click Clear
  • New vault with no history
  • Page at end of results

Chain Verification Fails

Immediate actions:

  1. Do not trust the audit log
  2. Investigate potential tampering
  3. Check for corruption
  4. Contact security team

Export Not Working

Try these fixes:

  1. Check browser download settings
  2. Reduce filter scope
  3. Try different export format
  4. Check available disk space

Slow Performance

For large logs:

  1. Use more specific filters
  2. Narrow date range
  3. Wait for pagination to load
  4. Consider exporting and analyzing offline

Next Steps