Open sourceTamper-proofFrom $99/mo

Stoplosingenterprisedeals
to compliance gaps

Drop-in audit logging and SOC 2 prep in one platform. Tamper-proof trails, automated evidence collection, and policy templates — open source, not $40K/year.

Open Source

AGPLv3 licensed

Tamper-Proof

SHA-256 + Merkle proofs

SOC 2 Prep

51 controls + 15 policies

80% Cheaper

vs Vanta / Drata

Building audit logs in-house costs more than you think

Every B2B SaaS team hits the same wall. Here's what you're signing up for when you build it yourself.

2-4 weeks

Engineering time

Schema design, hash chaining, tenant isolation, search indexing, export pipelines. That's before you write a single test.

Every quarter

Ongoing compliance maintenance

SOC 2 auditors come back every year. New formats, new requirements, new exports. The maintenance never stops.

Deals blocked

Enterprise deals stall at security review

"Do you have immutable audit trails?" If the answer is no, your deal sits in security review for weeks.

AuditKit handles all of this with a single SDK.

Interactive playground

See it in action

Edit the fields, hit Send Event, and watch the tamper-evident audit log build in real time.

audit.log()
await audit.log('document.updated', {
  actor: { id: 'user_123', name: 'Jane Doe' },
  target: { type: 'document', id: 'doc_456' },
  tenantId: 'org_acme',
});
Audit Log Viewer
0 events

No events yet

Edit the fields and click Send Event to see the audit log populate.

npm install @auditkit/sdk
Quick start

Production-ready in three steps

From zero to enterprise-grade audit trails in under 5 minutes.

1

Install the SDK

One package. Zero config. Works with Node, Python, Go, and Ruby.

$ npm install @auditkit/sdk
2

Log your first event

Five lines of code. Tamper-evident from the first event.

await audit.log('user.login', {
  actor: { id: 'usr_1' },
  tenantId: 'org_acme',
});
3

Your customers see their audit trail

Embed our pre-built viewer in your app. Tenant-scoped by default so each customer sees only their own events.

<AuditKitViewer
  tenantId="org_acme"
  token={jwt}
/>
Enterprise-grade

Built for the people who actually need audit logs

Auditors, customers, security teams, compliance officers. AuditKit is designed for all of them.

Your auditors need proof, not promises.

Every event is SHA-256 hash-chained to the previous one, creating a cryptographic chain of custody that proves no records have been altered. Merkle tree verification lets auditors validate the entire log mathematically.

  • SHA-256 hash chaining
  • Merkle tree proofs
  • Cryptographic verification API
  • Append-only storage
verification
const proof = await audit.verify('evt_789');

// => { 
//   valid: true,
//   hashChain: "unbroken",
//   merkleRoot: "a1b2c3..."
// }
embedded viewer
document.updated
Jane Doe2 min ago
member.invited
Mike Chen14 min ago
permission.changed
Sarah Kim1 hr ago
export.requested
Jane Doe3 hrs ago

Your customers need their own audit trail.

Tenant-scoped by default. Each customer sees only their own events. Embed the pre-built viewer directly in your app with a single React component or iframe.

  • Row-level tenant isolation
  • Embeddable React viewer
  • JWT-scoped access tokens
  • Full-text search per tenant

Your security team needs real-time alerts.

Webhooks fire on every event. SIEM streaming pushes to Splunk, Datadog, and S3 in real time. Built-in anomaly detection flags suspicious patterns before they become incidents.

  • HMAC-signed webhooks with retries
  • SIEM streaming (Splunk, Datadog, S3)
  • AI anomaly detection
  • Slack/Discord notifications
webhook payload
{
  "type": "anomaly.detected",
  "severity": "high",
  "reason": "Bulk export from new IP",
  "actor": "user_123",
  "tenant": "org_acme"
}
compliance export
const report = await audit.export({
  format: 'pdf',
  standard: 'ocsf',
  range: 'last-quarter',
  tenantId: 'org_acme',
});

// => SOC 2 evidence PDF ready

Your compliance officer needs exports.

One-click exports in CSV, JSON, and PDF. Industry-standard OCSF and CEF formats. Generate SOC 2 evidence packages that auditors actually accept.

  • CSV, JSON, PDF exports
  • OCSF + CEF standard formats
  • SOC 2 evidence packages
  • Scheduled compliance reports
NEW: SOC 2 Audit Prep

SOC 2 evidence collection eats 60-80 hours every quarter

Your auditor just sent a 200-item evidence request list. Your team is screenshotting admin consoles, digging through Google Drive folders, and formatting CSVs at 2am. AuditKit automates the 70% of SOC 2 prep that's just evidence collection — the part your team hates most.

60-80 hrs/quarter

Manual evidence collection

"I soon got overwhelmed by the sheer amount of evidence I had to gather." Every quarter, your team stops shipping features to screenshot admin consoles.

$25K-$80K

First-year SOC 2 cost

"It costs $40K in year one." Tool subscriptions, auditor fees, consultant hours, and the hidden cost of engineering time diverted from product.

38 pages

of audit feedback

"How hard could it really be?" Then the pre-audit readiness review came back as 38 pages of feedback on every aspect of our business.

AuditKit replaces the spreadsheet scramble with one platform

Evidence Vault

Upload, organize, and hash-verify every piece of audit evidence. Tagged to SOC 2 controls. Auditor-ready export.

Control Catalog

Pre-built SOC 2 checklist with 51 controls. Track readiness per category. Know exactly where you stand.

15 Policy Templates

Pre-written security policies ready to customize. Save $5K-$15K in consultant fees. Employee acknowledgment tracking.

Access Reviews

Quarterly access review campaigns. Pull user lists, assign reviewers, track approve/revoke decisions. No more spreadsheets.

Vendor Tracking

Vendor inventory with SOC 2 report tracking, DPA storage, and expiration alerts. 89% of audits check vendors.

Risk Register

Document risks with likelihood/impact scoring. Treatment plans and owner assignment. Connects to anomaly detection.

Every piece of evidence is tamper-proof

SHA-256 hash chains, Merkle tree proofs, and Ed25519 digital signatures on every upload. After the Delve scandal — where 494 fake SOC 2 reports were exposed — auditors want proof your evidence is real. AuditKit provides cryptographic proof that nothing has been altered since collection.

Try it now

See your SOC 2 readiness in real time

This is a live preview of AuditKit's SOC 2 dashboard. Click controls to mark them ready and watch your readiness score update.

0%Readiness

Click controls below to mark them as ready

Controls

Category Readiness

CC6 — Access Controls0%
CC7 — System Operations0%
CC8 — Change Management0%
CC3 — Risk Assessment0%
CC1 — Control Environment0%

Evidence Vault

AWS IAM user list
2 days ago
CC6.1
Incident Response Plan v2.1
1 week ago
CC7.3
Q1 Access Review
3 weeks ago
CC6.2
GitHub branch protection config
1 month ago
CC8.1

Tamper-Proof Hash Chain

Each evidence item's SHA-256 hash incorporates the previous hash, creating an immutable chain.

AWS IAM user listCC6.1
sha256:a3f7c1d8e92b4506f1de8a3b7c9204e5...
prev:a3f7c1d8e92b4506...
Incident Response Plan v2.1CC7.3
sha256:b8d2e4f6a1c3d5e7f9a2b4c6d8e0f1a3...
prev:b8d2e4f6a1c3d5e7...
Q1 Access ReviewCC6.2
sha256:c4e6f8a0b2d4e6f8a1b3c5d7e9f0a2b4...
prev:c4e6f8a0b2d4e6f8...
GitHub branch protection configCC8.1
sha256:d5f7a9b1c3e5f7a9b2c4d6e8f0a1b3c5...

How AuditKit compares

The only tool that's open source, managed, self-hostable, and cryptographically immutable.

FeatureAuditKitWorkOSPangeaRetracedCustom Build
Open source
Managed cloud
Tamper-proof (hash chain)
Merkle tree proofs
Tenant-scoped access
Embeddable viewer
SIEM streaming
Multi-language SDKs
Self-hostable
GraphQL API
AI anomaly detection
Setup time5 min1 day2 hrs1 week2-4 weeks
Price (100K events)$39/mo$99+/moContactFreeDev time

See detailed comparisons: AuditKit vs Vanta · AuditKit vs Drata · AuditKit vs Spreadsheets

Audit logging + SOC 2 prep. One platform.

Published pricing. Monthly billing. No lock-in contracts. No surprise renewals.

Starter

$99/mo

50K events/mo

90-day retention

Start Free Trial
  • SDK + hash chaining
  • Embedded audit viewer
  • SOC 2 control catalog (51 controls)
  • 15 policy templates
  • Evidence vault (5 GB)
  • Readiness dashboard
  • Anomaly detection
  • 3 projects · 5 seats
Most Popular

Pro

$299/mo

500K events/mo

1-year retention

Start Pro Trial
  • Everything in Starter
  • Access review campaigns
  • Vendor tracking + risk register
  • Incident tracker
  • SIEM streaming (Splunk, Datadog)
  • Compliance exports (OCSF/CEF)
  • Data residency (EU/US)
  • PII redaction
  • 10 projects · 15 seats

Business

$499/mo

2M events/mo

3-year retention

Start Business Trial
  • Everything in Pro
  • Auditor collaboration portal
  • Personnel tracker
  • Trust center
  • Merkle tree proofs
  • System description builder
  • Unlimited integrations
  • Unlimited projects · 50 seats

Supersize + Milkshake

$999/mo

10M events/mo

7-year retention

Go Supersize
  • Everything in Business
  • Legal hold
  • SSO/SCIM
  • GraphQL API
  • 99.99% SLA
  • Unlimited everything
  • Dedicated support
  • Priority support + extra milkshakes
Trusted by builders

Teams ship faster with AuditKit

From secure document sharing to AI-powered operations, teams choose AuditKit to handle the compliance work they'd rather not build.

We needed tamper-proof audit trails for every document view, download, and watermark event. AuditKit gave us enterprise-grade logging in an afternoon — would have taken us weeks to build the hash-chaining alone.

C

Engineering Team

CloakShare

Open-source secure document & video sharing with dynamic watermarks

Our enterprise customers asked for full audit visibility into every crawl, every report, every user action. AuditKit’s tenant-scoped logs and embeddable viewer meant we could ship that feature same-day instead of next quarter.

S

Product Team

SiteCrawlIQ

AI-driven SEO & geographic website auditing platform

When you’re handling SOPs and sensitive operational data, you need an immutable record of who accessed what and when. AuditKit’s SIEM streaming and compliance exports made our SOC 2 prep painless.

D

Operations Team

DocOpsIQ

AI-powered SOP retrieval with cited sources

Stop spending sprints on audit logging

Your enterprise customers need audit trail access. Ship it today, not next quarter.

What is AuditKit?

AuditKit is an open-source audit logging and SOC 2 compliance platform for B2B SaaS companies. It provides tamper-evident audit trails using SHA-256 hash chaining and Merkle tree proofs, tenant-scoped access controls, and automated SOC 2 evidence collection. AuditKit helps companies ship enterprise-grade audit logging in minutes and prepare for SOC 2 audits at a fraction of the cost of traditional compliance platforms.

Frequently asked questions

Everything you need to know about AuditKit.

What is AuditKit?+
AuditKit is an open-source, tamper-evident audit logging platform built for B2B SaaS. It gives your application immutable, tenant-scoped audit trails with SHA-256 hash chaining and Merkle tree cryptographic proofs. You can use the managed cloud or self-host on your own infrastructure.
How does tamper-proof logging work?+
Every audit event is linked to the previous one using SHA-256 hash chaining. AuditKit also builds Merkle tree proofs over batches of events. If any event is modified or deleted, the hash chain breaks and the tampering is immediately detectable. This gives you cryptographic proof that your audit trail has not been altered.
What compliance standards does AuditKit support?+
AuditKit generates compliance-ready exports for SOC 2, ISO 27001, HIPAA, and GDPR. It supports industry-standard OCSF and CEF event formats, and can produce PDF evidence packages that auditors accept. SIEM streaming to Splunk, Datadog, and Elastic is also included for continuous monitoring.
Can I self-host AuditKit?+
Yes. AuditKit is fully self-hostable using Docker Compose. The project is licensed under AGPLv3 with a commercial license option for enterprises that need it. You get zero vendor lock-in and full control over your data residency.
How fast is setup?+
Most teams are logging their first audit event within 5 minutes. Install the SDK (TypeScript, Python, Go, or Java), call audit.log() with your event data, and you are done. The embeddable React viewer can be dropped into your customer dashboard with a single component.
What is the difference between free and paid plans?+
The Free plan includes 1K events per month, 7-day retention, SDK access with hash chaining, and basic search. Pro ($39/mo) adds the embedded viewer, webhooks, anomaly detection, and 50K events. Business ($99/mo) includes SIEM streaming, compliance exports, data residency, and 500K events. Supersize ($349/mo) adds Merkle tree proofs, SSO/SCIM, GraphQL API, 99.99% SLA, and 5M events.
What SDKs and APIs are available?+
AuditKit provides official SDKs for TypeScript, Python, Go, and Java, all with full type safety. The platform also offers a GraphQL API with filtering, pagination, and real-time subscriptions. Webhooks can push events to Slack, Discord, or any HTTP endpoint.
How does tenant-scoped access work?+
Every audit event is associated with a tenant ID. Your customers can only see their own logs, and access is enforced at the API level. The embeddable viewer component automatically scopes to the current tenant, so you can safely embed it in multi-tenant dashboards without any extra access control logic.
Free & Open Source

aidevshield

Security scanner for AI coding tool configurations. Like npm audit, but for AI workflows.

Catches prompt injection in GitHub Actions, supply chain attacks in npm lifecycle scripts, invisible Unicode backdoors in AI config files, and more. The same patterns behind Clinejection, Cacheract, and the Shai-Hulud npm worm.

$ npx aidevshield scan .

aidevshield v1.0.0 — AI Workflow Security Scanner

Scanning: ./my-project

Checks: workflows | package.json | AI configs

[CRITICAL] .github/workflows/ai-triage.yml:18

Wildcard user permissions on AI workflow

[CRITICAL] .cursorrules:1

Hidden Unicode characters detected

[HIGH] node_modules/evil-pkg/package.json

curl | sh in postinstall script

6 issues found (2 critical, 1 high, 2 medium, 1 low)