MCP Hub
Back to servers

EU Audit Trail

Tamper-evident audit trail MCP server for EU AI Act & GDPR compliance.

Updated
Feb 27, 2026

Quick Install

uvx eu-audit-mcp

eu-audit-mcp

Tamper-evident audit trail MCP server for EU AI Act and GDPR compliance. Designed to be integrated into a local desktop application via stdio transport.

Features

  • Tamper-evident logging — HMAC-SHA256 hash chain over all events
  • PII scanning — Automatic detection and redaction via Microsoft Presidio (EU patterns)
  • GDPR erasure — Article 17 right-to-erasure support with audit trail
  • Compliance checks — Technical checklist against EU AI Act Articles 12/19 and GDPR Article 30
  • Local-first — All data stays on your machine in a single SQLite file

Regulatory context

This server implements technical measures for the following EU regulations:

RegulationArticlesWhat it requires
EU AI Act (2024/1689)Art. 12Automatic recording of events (logs) for high-risk AI systems
Art. 19Retention of automatically generated logs for at least 6 months
GDPR (2016/679)Art. 17Right to erasure of personal data ("right to be forgotten")
Art. 30Records of processing activities, including purposes and data categories

The EU AI Act high-risk obligations enter into force on 2 August 2026.

See LEGAL_REFERENCES.md for the full article texts and a detailed mapping of how each tool addresses each requirement.

Disclaimer: This tool provides a technical checklist, not legal advice. Consult qualified legal counsel for compliance decisions.

Quick start

pip install -e ".[dev]"

Run the server (stdio)

python -m eu_audit_mcp.server

MCP client configuration

{
  "mcpServers": {
    "eu-audit": {
      "command": "python",
      "args": ["-m", "eu_audit_mcp.server"],
      "env": {
        "AUDIT_CONFIG": "./audit_config.yaml"
      }
    }
  }
}

Run tests

pytest tests/

MCP Tools

ToolDescription
log_eventRecord an audit event with automatic PII scanning
log_inferenceLog an LLM inference call (model, tokens, cost)
log_data_accessLog a document/data access event
query_logSearch events by time range, type, session
get_session_traceFull ordered trace of a session
get_statsSummary statistics over a time period
compliance_checkCheck against EU AI Act Art. 12/19 and GDPR Art. 30
execute_erasureGDPR Article 17 right-to-erasure
get_pii_summarySummary of detected PII types (counts only)
verify_chainVerify hash chain integrity

Configuration

Copy the example config and customize:

cp audit_config.example.yaml audit_config.yaml

Set the AUDIT_CONFIG environment variable to point to your config file. Do not commit audit_config.yaml if it contains a chain_secret — it is in .gitignore by default.

Security

See SECURITY.md for the threat model, security measures, and vulnerability reporting.

License

Apache-2.0

Reviews

No reviews yet

Sign in to write a review