ZLAR-AU ยท Open Source ยท Apache 2.0

ZLAR-AU

Your auditor called. You're ready.

Turns the hash-chained audit trail from ZLAR Gate into compliance reports. PCI-DSS, SOC 2, OSFI B-13, SOX, EU AI Act โ€” mapped and formatted. Hash chain verification included.

Get Started โ†’ Read the Legal

Commands

Six commands. One audit tool.

CommandWhat it does
summaryOverview of events, decisions, and risk distribution for a time period
queryFilter audit events by domain, action, risk level, time range, or regex
verifyVerify the SHA-256 hash chain โ€” detect tampering or gaps
exportExport audit data as CSV, JSON, JSONL, or Splunk CIM format
reportGenerate full compliance, incident, or executive summary reports
digestGenerate daily, weekly, or monthly digest for scheduled reporting

Reports

Three report types.

Compliance Report

Full HTML report with framework mapping table. Shows which audit events map to which compliance controls across all supported frameworks.

PCI-DSS 10 SOC 2 OSFI B-13 SOX EU AI Act
Incident Report

Denied and high-risk events for security review. Timeline of blocked actions, risk scores, policy rules matched, and agent identifiers.

Executive Summary

One-page overview for board reporting. Total actions, allow/deny ratio, high-risk events, hash chain integrity, and trend lines.

Reports are HTML, designed for browser print-to-PDF. All report data is derived from the ZLAR Gate audit trail โ€” what the gate observed, formatted for human consumption.

Compliance Framework Mapping

FrameworkWhat AU covers
PCI-DSS 10Audit log requirements โ€” all access to cardholder data, tool calls, policy decisions, admin actions
SOC 2Availability, security, and change management โ€” tool call audit trail, deny events, policy version history
OSFI B-13Technology risk and operational resilience โ€” agent action logging, risk scoring, incident-level events
SOXIT general controls โ€” access logs, change controls, segregation of duties evidence from audit trail
EU AI ActHigh-risk AI system logging requirements โ€” decision records, human oversight events, risk classifications

Export Formats

Your format, your tools.

FormatBest for
CSVAuditor analysis in Excel or Google Sheets
JSONStructured data for custom processing or dashboards
JSONLFiltered raw audit trail โ€” subset of original events
Splunk CIMDrop into your SIEM using Common Information Model field mapping

Hash Chain Verification

Tamper detection built in.

ZLAR Gate writes every audit event with a SHA-256 hash that includes the previous event's hash. This creates a chain: if any event is modified or deleted, all subsequent hashes become invalid.

zlar-au verify walks the entire chain and reports the first broken link, if any.

What it proves: The audit trail has not been modified since it was written.

What it doesn't prove: That the gate recorded everything. The hash chain protects against post-hoc modification, not against a compromised gate that failed to log events in the first place. See Legal for complete terms.


Known Limitations

What ZLAR-AU doesn't do.

HTML reports only. Reports are designed for browser print-to-PDF. There is no native PDF generation.

Splunk CIM mapping is best-effort. Validate against your schema before ingestion into a production SIEM.

Reports reflect what the gate observed. They do not constitute a guarantee of complete containment or a compliance certification.

Compliance mappings are informational. ZLAR-AU does not guarantee compliance with PCI-DSS, SOC 2, OSFI B-13, SOX, or the EU AI Act. Consult qualified professionals for formal compliance guidance.

The tool reduces compliance burden. It does not replace professional audit guidance.


The ZLAR Family

Seven products. One thesis.

ProductPlatformWhat it does
ZLAR-OCOpenClawOS-level containment โ€” user isolation, kernel sandbox, pf firewall, gate daemon, signed policy, audit trail
ZLAR-CCClaude CodeHook-based gate โ€” tool-call interception, risk classification, signed policy, Telegram approval
ZLAR GateClaude Code + Cursor + WindsurfUniversal gate โ€” one policy across multiple editors, framework-specific adapters
ZLAR-LTClaude Code + Cursor + WindsurfZero-config governance โ€” one command, instant protection, deny-heavy defaults
ZLAR-AUZLAR Gate audit trailCompliance reporting โ€” hash chain verification, framework mapping, Splunk export
ZLAR-NTCross-platformNetwork egress policy โ€” destination-aware, domain-level, gate-integrated
ZLAR-FLCross-platformFleet governance โ€” registry, health monitoring, audit aggregation, policy comparison

Built by Vincent Nijjar and ZLAR Inc.
Open source under Apache License 2.0. Free to use, modify, and distribute.