Cryptographic audit trail verification

Your Audit Logs Are Only as Good as Their Proof

checksum.dev signs every record with Ed25519, aggregates them into verifiable Merkle trees, and generates compliance reports with cryptographic gap detection.

Designed for compliance under

HIPAA 45 CFR 164.312
SOC 2 CC7.2
PCI-DSS Requirement 10
GDPR Article 5(2)

The problem

Audit Logs in Your Database Are Claims, Not Evidence

Any engineer with database access can modify a log entry. Regulators require independent tamper evidence — not self-attestation.

Mutable by Default

Database records can be updated or deleted by anyone with write access. There is no cryptographic trail of changes.

Silent Gaps

Missing records go undetected without structured sequencing. Auditors can't verify completeness from a CSV export.

Self-Attested

Exporting your own logs as proof is like grading your own exam. Auditors need independent verification.

How it works

Three Steps to Cryptographic Proof

1

Submit a Checkpoint

POST your chain_id, sequence_number, and checksum to the API. One call, any language.

2

Receive a Signed Anchor

We return an Ed25519 signature timestamped and bound to your specific record. This is your cryptographic receipt.

3

Generate Compliance Reports

Pull a PDF covering any time range — gap detection, frequency analysis, Merkle proofs, and pass/fail determination included.

POST /api/v1/anchors
curl -X POST https://checksum.dev/api/v1/anchors \
  -H "Authorization: Bearer sk_live_..." \
  -H "Content-Type: application/json" \
  -d '\{
    "chain_id": "payment-events",
    "sequence_number": 42,
    "checksum": "sha256:9f86d081..."
  \}'
Response SIGNED
\{
  "id":              "anc_01J5K7M...",
  "chain_id":        "payment-events",
  "sequence_number": 42,
  "checksum":        "sha256:9f86d081...",
  "signature":       "ed25519:Rk3fQ2x...",
  "anchored_at":     "2026-03-03T12:00:00.000000Z"
\}

Capabilities

Everything the Audit Requires

Cryptographic integrity, compliance reports, and independent verification — out of the box.

Ed25519 Signatures

Industry-standard public-key signatures on every anchor. Verifiable by anyone with your public key.

Daily Merkle Trees

All anchors aggregated into a published Merkle tree. Tamper-evident by design — one changed record invalidates the tree.

Gap Detection

Automatic identification of missing sequence numbers. Know instantly if records are absent, not just tampered.

Compliance PDF Reports

Auditor-ready exports covering any date range. Frequency analysis, Merkle proofs, and chain integrity summaries included.

Public Auditor Portal

Independent third-party verification without API credentials. Give your auditor a URL, not a CSV export.

API-First Architecture

Public/private key auth, RESTful endpoints, and an OpenAPI spec. Integrates in an afternoon.

Who it's for

Built for Three Stakeholders

Developers integrate. Compliance teams report. Auditors verify.

Developers
  • Drop-in REST API with OpenAPI spec
  • No new infrastructure to manage
  • Works alongside existing logging
  • Language-agnostic: REST + JSON
Compliance
  • PDF reports ready for auditor submission
  • Automatic gap detection
  • HIPAA, SOC 2, PCI-DSS alignment
  • No reliance on database exports
Auditors
  • Public portal — no account required
  • Verify against published Merkle trees
  • Independent of the audited org
  • Reproducible cryptographic proof

FAQ

Frequently Asked Questions

How is this different from storing audit logs in a database?

Database-stored logs are mutable — anyone with write access can alter or delete records undetected. checksum.dev issues a cryptographic signature at submission time, so any modification produces a verifiable mismatch.

Can my auditor verify records without accessing my systems?

Yes. The public auditor portal allows independent verification of any anchor using only its identifier and the published Merkle tree. No account or credentials required.

Does checksum.dev store my actual log data?

No. You submit a checksum of your data, not the data itself. Your sensitive records never leave your infrastructure. The cryptographic proof is independent of the underlying content.

What compliance frameworks does it support?

checksum.dev is designed to satisfy audit trail integrity requirements under HIPAA (45 CFR 164.312), SOC 2 CC7.2, PCI-DSS Requirement 10, and GDPR Article 5(2).

What happens if I miss a sequence number?

Gap detection is automatic. Missing sequence numbers are flagged in compliance reports so you can investigate whether a gap is expected (for example, a voided record) or indicates a potential system issue.

How do Ed25519 signatures prove a record was not modified?

Each checkpoint is signed over a canonical payload. The signature can only be produced with our private key. Anyone with the public key can verify — if even one byte changed, verification fails.

Start Anchoring in Under 10 Minutes

Free tier available. No infrastructure required. Your first anchor is signed before your second cup of coffee.