Back to Eul Bite
Spine

Spine

Tamper-Evident Audit Backbone

Transform application events into cryptographically verifiable evidence. Built for organizations where audit trail integrity is a regulatory requirement.

The Problem Spine Solves

Traditional logs are mutable, unsigned, and unverifiable. When a regulator or forensic investigator asks "prove this record hasn't been tampered with," most systems cannot provide cryptographic proof. Spine creates evidence that stands up to scrutiny.

Core Guarantees

What Spine provides that traditional logging cannot.

Immutability

Append-only WAL with hash chaining. Every entry links to the previous—modifications break the chain.

Authenticity

Ed25519 digital signatures on sealed batches prove who created the records and when.

Verifiability

Independent CLI validates the entire chain without trusting the running system.

Non-Repudiation

Cryptographic proof of event sequence. Records cannot be denied or disputed.

Architecture

How events flow through Spine to become forensic evidence.

Spine Architecture Diagram
1

Event Ingest

Events enter via REST API. Each event is validated, timestamped with nanosecond precision, and assigned a monotonic sequence number.

2

Pipeline & Sealing

Events are hashed with BLAKE3 and linked to the previous entry. Batches are sealed with Ed25519 signatures and Merkle roots for efficient verification.

3

Independent Verification

The verification CLI reads the raw data files and cryptographically validates every hash and signature—without connecting to Spine runtime.

Technical Specifications

Cryptography

  • BLAKE3 hash function
  • Ed25519 signatures
  • Merkle tree batches
  • Genesis block config

Performance

  • 100k+ events/sec
  • Sub-ms append latency
  • Configurable fsync
  • Checkpoint recovery

Deployment

  • Single Rust binary
  • ~15MB footprint
  • Docker / K8s ready
  • 2GB RAM minimum

Monitoring

  • Real-time dashboard
  • WebSocket streaming
  • Anomaly detection
  • Chain integrity alerts

Independent Verification

The verification CLI requires no access to Spine runtime. It validates the cryptographic chain independently.

terminal
$ spine-verify ./audit-data/ --verbose

Spine Verification Tool v1.0
══════════════════════════════════════════════════

Loading genesis block...
  Hash Algorithm:    BLAKE3
  Signature Algo:    Ed25519
  Public Key:        0x7a2b...f9c1

Scanning segments...
  Segments found:    1,247
  Total events:      2,341,892
  Sealed batches:    4,683

Verifying hash chain...
   All 2,341,892 entries linked correctly

Verifying batch signatures...
   4,683/4,683 signatures valid

Verifying Merkle roots...
   All batch roots match computed values

══════════════════════════════════════════════════
✓ VERIFICATION PASSED
  Chain integrity: INTACT
  Tampering detected: NONE
══════════════════════════════════════════════════

Integration

Send events to Spine via REST API. Minimal code changes required.

// Example: Submit an audit event

POST /api/v1/events HTTP/1.1
Content-Type: application/json

{
  "event_type": "user.login",
  "source": "auth-service",
  "payload": {
    "user_id": "usr_12345",
    "ip_address": "10.0.0.1",
    "method": "oauth2"
  }
}

REST API

Direct HTTP integration for any language or platform

Sidecar Mode

Deploy alongside services to capture events transparently

Log Forwarding

Ingest from existing logging systems (syslog, fluentd)

Proof of Concept

See Spine in action in your environment. No long-term commitment.

What's Included

  • Integration with one event source
  • Basic anomaly rules configured
  • Dashboard deployment
  • Verification workflow demo
  • Integration documentation

Details

Duration2-3 weeks
EnvironmentYour infrastructure
Data egressNone
CommitmentNone required

Ready to see Spine in action?

Let's discuss how Spine can fit into your compliance infrastructure.

Request a PoC