Synopsis
Description
The security audit log captures every security-relevant action in profClaw: tool executions, approval requests, approvals, denials, and authentication events. It provides a tamper-evident trail for compliance and debugging. Theaudit subcommand is accessed via profclaw security audit. See the security command for the full security command group.
Flags
Maximum number of log entries to show.
Show only entries with
pending result - items awaiting approval.Output as JSON array with full entry details.
Audit Entry Fields
| Field | Description |
|---|---|
id | Unique entry ID |
action | What was attempted (e.g., exec, write_file, http_request) |
actor | User or agent that initiated the action |
target | Resource targeted (file path, URL, command) |
result | approved, denied, or pending |
createdAt | Timestamp |
Examples
Audit Results
| Result | Description |
|---|---|
approved | Action was allowed (automatically or manually) |
denied | Action was blocked |
pending | Awaiting manual approval from an admin |
Related
profclaw security- Full security command groupprofclaw logs- Server application logs- Security Guide - Security architecture