airlock_audit_tail
Retrieve recent signed provenance events to monitor capability leases and verify tamper-evident audit trails for security compliance.
Instructions
Read recent signed provenance events.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No |
Implementation Reference
- mcp_airlock/server.py:172-175 (handler)Handler for airlock_audit_tail tool - reads recent signed provenance events with a configurable limit
if name == AIRLOCK_AUDIT_TAIL: limit = int(args.get("limit", 20)) events = self.ledger.tail(limit=max(1, min(limit, 200))) return _mcp_tool_success({"events": events}) - mcp_airlock/server.py:144-152 (registration)Registration of airlock_audit_tail tool descriptor including name, description, and input schema
{ "name": AIRLOCK_AUDIT_TAIL, "description": "Read recent signed provenance events.", "inputSchema": { "type": "object", "properties": {"limit": {"type": "integer", "default": 20}}, "required": [], }, }, - mcp_airlock/provenance.py:90-101 (helper)Helper method tail() in ProvenanceLedger class that retrieves recent audit log entries with a limit
def tail(self, limit: int = 20) -> List[Dict[str, Any]]: if not self.log_path.exists(): return [] lines = self.log_path.read_text(encoding="utf-8").splitlines() output: List[Dict[str, Any]] = [] for line in lines[-limit:]: try: output.append(json.loads(line)) except json.JSONDecodeError: output.append({"raw": line, "error": "invalid-json"}) return output - mcp_airlock/tool_ids.py:8-8 (helper)Constant definition for the airlock_audit_tail tool name
AIRLOCK_AUDIT_TAIL = "airlock_audit_tail"