Overview
The audit log records every security-relevant event in profClaw: tool calls, approval decisions, security guard blocks, authentication events, and configuration changes. Logs are append-only and cannot be modified after writing.What Gets Logged
| Event Type | Logged Fields |
|---|---|
| Tool call | Tool name, params (sanitized), user, channel, result, duration |
| Tool blocked | Tool name, reason, security mode, risk level |
| Approval request | Tool name, approver, decision (allow-once/allow-always/deny) |
| Prompt guard hit | Risk level, score, pattern matched, input length |
| SSRF guard block | URL (host only), reason, resolved IP |
| FsGuard block | Path (normalized), operation, reason |
| Auth event | Login, logout, token refresh, failed auth |
| Config change | Field changed, old/new value (sensitive values masked) |
| Plugin load | Plugin name, version, permissions requested |
| Skill scan | Skill name, findings, risk level |
Log Format
Each audit entry is a structured JSON line:"apiKey": "***".
Viewing Audit Logs
CLI
Via API
Log Files
Audit logs are written to:- SQLite (default): stored in profClaw’s database
- File:
~/.profclaw/audit.jsonl(enable withauditLog.file: true) - Syslog: Forward to external syslog server (enterprise)